Network Security Management
Network Security Management
MANAGEMENT
Chapter 2: Network Management
Objectives
1. Illustrate Network Management goals & standards
2. Examine Network Management Model
3. Describe Network Management Platforms & Applications
4. Identify Network Management Protocols
What is network management?
• Network management is the top-level administration and maintenance of large networks.
• Network management is a service that uses a variety of tools, applications, protocol analyser and
devices to assist network managers in monitoring and maintaining networks.
• Network management manages the network resources comprising clients, servers, printers, hubs,
switches, routers and links and connectivity between network resources.
• Routing: which refers to the process of selecting the paths in a computer network
on which to send data, is an important area of network management.
• In this area of network management, logically addressed packets are passed from
their source to their destination through nodes, which are called routers, in a process
called forwarding.
• This is usually based on routing tables that maintain a record of the most efficient
routes.
CMIS/CMIP is the network management protocol specified by the ISO/OSI Network management model and is further
defined by the ITU-T in the X.700 series of recommendations.
CMIP models management information in terms of managed objects and allows both modification and performing
actions on managed objects.
Configuration Management
• The goal of configuration management is to monitor network and system configuration
information so that the effects on network operation of various versions of hardware and
software elements can be tracked and managed.
• The configuration of certain network devices controls the behavior of the data network.
• (Example: Configuring routing protocols like BGP, OSPF, in router will control the routing)
• Configuration management is the process of finding and setting up (configuring) these critical
devices
• (Example: SNMP is used to manage the network, but different versions are there SNMP Version1,
Version2 and Version 3)
Fault Management :
FM is the process of locating problems, or faults, on the data network.
• Isolate the rest of the network from the rest of the failure so that it can continue the
operation without interference.
• Reconfigure or modify the network in such a way as to minimize the impact of operation
without failed components.
• Repair the failed component to restore the network to its initial state.
Security Management
• Security management is concerned with managing information protection and controlling
access to information on the data network
• Provides a way to monitor access points and records information on a periodic basis
• Provides audit trails and sounds alarms for security breaches
Performance Management
Involves measuring the performance of the network resources like hardware, software,
and media
They are:
• OSI model,
• The Internet model,
• Telecommunications Management Network (TMN),
• IEEE LAN/WAN and
• Web-based management.
The OSI management protocol standard is developed from Common Management
Information Protocol (CMIP).
Common Management Information Service (CMIS),
• that specify the basic services needed to perform the various functions.
• It is the most set of specifications and address all seven layers of the OSI reference
model.
• The specifications are object-oriented and hence managed object are based on object
classes and inheritance rules.
• LAN and WAN can be managed using CMIP/CMIS.
web-based management:
• which is based on using web technology,
• a web server for the management system, and web browsers for network management stations.
• Because this is an evolving technology, no standard exists at present.
• Two technologies are vogue, Web-based Enterprise Management (WBEM) and Java Management
Extensions (JMX).
• A recently formed task force, Desktop Management Task Force (DMTF) is developing specifications
for WBEM.
• JMX is based on a special subset of Java applets developed by Sun Micro Systems that runs in the
network components.
Network Management Model
• Agent
• Gathers information from objects
• Configures parameters of objects
• Responds to managers’ requests
• Generates alarms and sends them to mangers
• Managed object
• Network element that is managed
• Houses management agent
• All objects are not managed / manageable
Information model
Deals with the structure and organization of management information.
Describes the:
Structure of management information (SMI)
information database,
Management information base (MIB).
SMI describes:
how the management information is structured and
MIB deals with the relationship and storage of management
information.
Structure and Storage of Management Information
• SMI (Structure of Management Information)
• Defines the syntax and semantics of management information.
• MIB (Management Information Base)
• Conceptual storage of management information
SMI (Structure of Management Information)
SMI defines for a managed object
• Syntax
• Semantics
• plus additional information such as status
Example
sysDescr: { system 1 }
Syntax: OCTET STRING
Definition: "A textual description of the entity. "
Access: read-only
Status: mandatory
Management Information Base (MIB)
• Information base contains information about objects organized by grouping
of related objects
• Defines relationship between objects, It is NOT a physical database.
• It is a virtual database that is compiled into management module.
Agent MIB vs. Manager MIB MIB View
Communication model
Which has three components:
management application processes:
that function in the application layer,
layer management
Works in between layers
layer operation
Works within the layers.
Operations /
Requests
Manager Agent
SNMP (Internet)
Communication Communication
CMIP (OSI)
Module Module
UDP / IP (Internet)
Transport Layers Transport Layers
OSI Lower Layer Profiles (OSI)
c-l vs. c-o/c-l
Physical Medium
Functional model
Deals with the user-oriented requirement of network management.
OSI defines five functional application areas namely :
Configuration Management,
Fault Management,
Performance Management,
Security Management
Accounting management.
These are defined as system management functions in OSI.
• Centralized,
• Hierarchical,
• Distributed.
Centralized Architecture
Pros:
• Single location to view events & alerts
• Single place to access network management applications and information
Cons:
• Single system is not redundant or fault tolerant
• As network elements are added, may be difficult or expensive to scale
system to handle load
• Having to query all devices from a single location
Hierarchical Architecture
• Uses multiple computer systems
– One system acting as the central server
– Other systems working as clients
• Central server requires backups for redundancy
Key features:
• Not dependent on a single system
• Distribution of network management tasks
• Network monitoring distributed throughout
network
• Centralized information storage
Pros:
• Multiple systems to manage the network
Cons:
• Information gathering is more difficult and time consuming
• The list of managed devices managed by each client needs to be predetermined and manually configured
Distributed Architecture
• Combines the centralized and
hierarchical architectures
• Uses multiple peer network
management systems
• Each peer can have a complete
database
• Each peer can perform various tasks
and report back to a central system
An advanced protocol
• remotely executes network management tasks,
• is independent of the network protocol layer
SNMPv2
• greatly enhances the SNMP feature set
CMIS/CMIP
• approaches the advanced tool,
• but implementation issues have limited its use
SNMP Message Format
• SNMP is an application protocol, which is encapsulated in UDP.
The general SNMP message format for all versions is shown below:
Community –
• Community name used for authenticating the manager before allowing
access to the agent.
• Authorization and authentication relies on this Community String.
SNMP Trap
• SNMP traps enable an agent to notify the management station of significant events by way of an
unsolicited SNMP message.
In this diagram,
• the setup on the left shows a network management system that polls information and
gets a response.
• The setup on the right shows an agent that sends an unsolicited or asynchronous trap to
the network management system (NMS).
SNMPv1 and SNMPv2,
• with the associated Management Information Base (MIB),
• encourage trap-directed notification.
Disclosure results
when an unauthorized entity extracts values stored in managed objects, or learns of
notifiable events by monitoring exchanges between managers and agents.
• Because SNMP does not implement authentication, many vendors do not implement Set
operations, thereby reducing SNMP to a monitoring facility.
SNMP Interoperability
SNMPv2 is incompatible with SNMPv1 in two key areas: message formats and protocol
operations.
SNMPv2 messages use different header and protocol data unit (PDU) formats than
SNMPv1 messages.
SNMPv2 also uses two protocol operations that are not specified in SNMPv1