Oromia Police College
Oromia Police College
By: Group 5
April, 4,2017
Adama
Comprehensive Questions on LO1: Implementing Network Monitoring
1. Device Logs
- System events (reboots, crashes, hardware failures)
- Configuration changes (admin access, firmware updates)
- Interface status (up/down events, port errors)
3. Security Logs
- Firewall/IDS/IPS alerts (blocked attacks, intrusion attempts)
- Authentication events (successful/failed logins)
- Malware detection and quarantine actions
4. Application Logs
- Web server access logs (HTTP requests, user agents)
- Database queries and transaction records
- API calls and errors
5. Performance Logs
- CPU, memory, and disk utilization
- Latency and response times
- SLA compliance metrics
The primary purpose of monitoring network activity is to ensure optimal performance, security,
and reliability of a network by continuously tracking traffic, devices, and events.
- Identifies issues (e.g., outages, bottlenecks, failures) before they escalate, minimizing
downtime.
- Detects suspicious behavior (e.g., unauthorized access, DDoS attacks) in real time, enabling
rapid response.
- Helps allocate bandwidth efficiently, reduce latency, and plan for future capacity needs.
Additional Benefits
4. Define MIB (Management Information Base) and explain its role in SNMP.
- MIBs act as a "map" that SNMP managers use to request and interpret data from SNMP agents.
- MIBs provide a common language for SNMP managers to query data (e.g., CPU usage,
interface status) from different vendors’ devices.
- Specifies which parameters (e.g., bandwidth, error counts, uptime) can be monitored or
configured via SNMP.
- SNMP managers use MIBs to request specific OIDs (e.g., `1.3.6.1.2.1.1.5` for a device’s
hostname).
iso (1) → org (3) → dod (6) → internet (1) → mgmt (2) → mib-2 (1) → system (1) → sysName
(5) → OID: 1.3.6.1.2.1.1.5
- Without MIBs, SNMP would not know what data to collect or how to interpret it.
- Vendor-specific MIBs extend monitoring for proprietary features (e.g., Cisco, Juniper).
5. What are Object Identifiers (OIDs), and how are they used in MIBs?
An Object Identifier (OID) is a globally unique numeric address (written in dot notation) that
identifies a specific manageable object in a Management Information Base (MIB). OIDs
follow a hierarchical tree structure, similar to a filesystem path, ensuring no two objects have the
same identifier.
Structure of OIDs
OIDs are organized under the International Standards Organization (ISO) tree, with branches
for different standards bodies and vendors.
1 (ISO)
3 (ORG)
6 (DOD – U.S. Department of Defense)
1 (Internet)
2 (IETF Management)
1 (MIB-2)
1 (System Group)
This OID returns the device’s configured hostname when queried via SNMP.
o The SNMP agent (on the device) responds with the current value.
o Vendors add custom OIDs under their own branch (e.g., Cisco uses 1.3.6.1.4.1.9).
hy OIDs Matter
Precision: Allow exact data retrieval (e.g., "Get me the uptime of this device").
Vendor Extensions: Enable monitoring of proprietary features (e.g., Cisco VoIP stats).
6. Name three types of network monitoring tools and describe what each one does.
Purpose: Collect and analyze data from network devices (routers, switches, servers) using
SNMP.
Key Functions:
Polls devices for metrics like bandwidth usage, CPU load, memory, and interface
status.
Triggers alerts for threshold breaches (e.g., high latency, packet loss).
OpenNMS (Open-source)
Purpose: Capture and inspect raw network traffic for troubleshooting, security, and
performance analysis.
Key Functions:
Decodes protocols (e.g., HTTP, DNS, TCP) to identify latency issues, malware, or
misconfigurations.
Purpose: Analyze traffic flows (source/destination IPs, ports, protocols) for bandwidth and
security insights.
Key Functions:
Aggregates flow data to show top talkers, applications, and traffic trends.
Comparison Table
Helps define normal behavior (e.g., "Latency should be <50ms under typical load").
Detects deviations (e.g., sudden latency spikes indicate congestion or hardware failure).
Tests if new hardware (e.g., switches, firewalls) or configurations (QoS, routing) improve
performance.
Example: If latency exceeds the benchmark, investigate QoS policies or ISP problems.
Types of Benchmarking
1. Active Benchmarking
o Injects test traffic (e.g., iPerf generates UDP/TCP streams).
2. Passive Benchmarking
o Monitors real traffic (e.g., NetFlow, SNMP).
3. Synthetic Benchmarking
o Simulates user behavior (e.g., ThousandEyes mimics web transactions).
Example Workflow
The ideal time for benchmark testing depends on the purpose of the test, but key moments
include:
- Why: Establishes a baseline to compare performance before vs. after the change.
- Example: Test a new firewall’s throughput before replacing the old one.
- Why: Minimizes interference from user traffic, providing a "clean" performance snapshot.
- When: During high-usage periods (e.g., business hours for corporate networks).
Best Practices
2. Combine Active + Passive Tests (e.g., iPerf + SNMP for full insights).
3. Align with Business Needs (e.g., test e-commerce networks before Black Friday).
How it Works: Injects controlled test traffic (e.g., UDP/TCP streams) into the network to
measure performance.
Metrics Measured:
Packet Loss
Tools:
How it Works: Observes live network traffic without injecting test data.
Metrics Measured:
How it Works: Simulates user actions (e.g., loading a webpage, VoIP call) to test performance
from the user’s perspective.
Metrics Measured:
Comparison Table
Example Workflow:
o Enables quick identification of deviations (e.g., "Latency is 200ms vs. the usual
50ms").
o Example: If packet loss spikes after a router upgrade, rollback may be needed.
3. Reduces Guesswork & Downtime
o Without documentation, engineers waste time on trial-and-error fixes.
3. Use Automated Tools (e.g., PRTG for SNMP trends, Grafana for dashboards).
Example Scenario:
Troubleshooting Steps:
1. Compare current jitter (50ms) to documented baseline (10ms).
Key Takeaway
Documentation turns benchmarks into a troubleshooting playbook, saving time, money, and
frustration. Without it, you’re diagnosing in the dark.
11.What are some common network bottlenecks, and how can they be eliminated?
Network bottlenecks occur when a component limits overall performance, causing slowdowns,
latency, or outages. Here are the most frequent culprits and how to fix them:
1. Bandwidth Congestion
Symptoms: Slow file transfers, buffering videos, high latency during peak hours.
Causes
Solutions:
2. Hardware Limitations
Causes:
Solutions:
Tools: SNMP monitors (PRTG, LibreNMS), CLI diagnostics (`show process cpu`).
Causes:
- Channel overlap (neighbors using same 2.4GHz channels).
Solutions:
Causes:
Solutions:
Causes:
Solutions:
6. Security-Related Bottlenecks
Causes:
Solutions:
Example Workflow:
1. Detect bottleneck (e.g., high latency).
How it works: QoS assigns different priority levels (e.g., "High," "Medium," "Low") to traffic
types.
Example: VoIP packets get priority over file downloads to prevent call drops.
Protocols used:
o DiffServ (Differentiated Services) – Marks packets with DSCP values (e.g., EF for
VoIP).
Techniques:
o Policing – Drops/throttles traffic exceeding limits.
o Shaping – Buffers excess traffic to smooth out bursts.
How it works: QoS prevents network overload by intelligently dropping low-priority packets
first.
Example: If a link is saturated, QoS drops Netflix traffic before VoIP.
Protocol: WRED (Weighted Random Early Detection) – Proactively drops packets to avoid
TCP retransmissions.
How it works: Ensures business-critical apps perform well even during peak usage.
Example: A hospital’s MRI image transfers won’t be slowed down by guest Wi-Fi.
Key Takeaway
QoS is like a "VIP lane" for network traffic—it ensures critical applications run smoothly, even during
congestion. Without QoS, all traffic competes equally, leading to poor performance for real-time
services.
- **Problem:** Users often hog bandwidth with non-work activities (streaming 4K videos, large
personal downloads).
- **Problem:** Uninformed users are the #1 cause of breaches (e.g., phishing, malware from
shady downloads).
- **Problem:** Users tweak settings (e.g., VPNs, proxies) or connect unauthorized devices,
breaking policies.
- **Solution:** Explain:
- **Problem:** IT teams waste time fixing avoidable issues (e.g., "Wi-Fi is slow" due to a user
downloading 100GB of games).
- **Problem:** Users don’t leverage network-optimized tools (e.g., sending 1GB files via email
instead of SharePoint).
- **Solution:** Promote:
- **Problem:** Heavy usage (e.g., constant video calls on old routers) accelerates hardware
failure.
2. **Cheat Sheets** – Simple guides (e.g., "How to Check Wi-Fi Signal Strength").
User education turns **end-users from liabilities into allies** for network optimization. Even the
best QoS and hardware fail if users don’t follow basic best practices.
14. What steps would you take if a security breach is detected through log analysis?
15. Compare SNMP-based monitoring vs. packet-sniffing tool when would each be more useful?
16. How can a company ensure compliance with data protection laws using network monitoring?