Lecture 8
Lecture 8
Lecture 8
1
Lecture # 8: Network Management
What is network management?
3
Lecture # 8: Network Management
Functions:
1. Configuration Management
2. Fault Management
3. Performance Management
4. Security management
5. Accounting management
5
Lecture # 8: Network Management
6
Lecture # 8: Network Management
1. Configuration Management
A large network is usually made up of hundreds of entities
that are physically or logically connected to one another
These entities have an initial configuration when the network
is set up, but can change with time
Devices may be replaced by others; application software may
be updated to a newer version; and users may move from one
group to another.
Thus, the configuration management system must know, at
any time, the status of each entity and its relation to other
entities
Configuration management can be subdivided into two parts:
reconfiguration and Documentation. 7
Lecture # 8: Network Management
2. Fault Management
The goal of fault management is to log, detect, and
respond to fault conditions in the network
Falls on two categories.
Reactive fault management: is responsible for
detecting, isolating, correcting, and recording faults.
It handles short-term solutions to faults
Proactive fault management: tries to prevent
faults from occurring. Although this is not always
possible, some types of failures can be predicted and
prevented
8
Lecture # 8: Network Management
3. Performance Management
The goal of performance management is to quantify,
measure, report, analyze, and control the performance of
different network components
Example of performance metrics: network utilization,
delay and througput
4. Security Management
Security management is responsible for controlling access
to the network based on the predefined policy.
For example, the use of firewalls to monitor and control
external access points to one’s network 9
Lecture # 8: Network Management
5. Accounting Management
SNMP concept:
Management with SNMP is based on three basic ideas:
1. A manager checks an agent by requesting information that
reflects the behavior of the agent.
2. A manager forces an agent to perform a task by resetting
values in the agent database.
3. An agent contributes to the management process by warning
the manager of an unusual situation.
12
Lecture # 8: Network Management
SNMP concept:
SNMP operates in the Application Layer of the Internet
Protocol Suite
The SNMP agent receives requests on UDP port 161.
The manager may send requests from any available
source port to port 161 in the agent.
The agent response will be sent back to the source port on
the manager
The manager receives notifications (Traps and
InformRequests) on port 162.
The agent may generate notifications from any available
port.
13
Lecture # 8: Network Management
Role of SNMP:
Role of SMI:
Role of MIB:
For each entity to be managed, MIB must define the
number of objects, name them according to the rules
defined by SMI, and associate a type to each named object .
MIB creates a collection of named objects, their types,
and their relationships to each other in an entity to be
managed.
Each agent has its own MIB2, which is a collection of all
the objects that the manager can manage.
The objects in MIB2 are categorized under 10 different
groups: system, interface, address translation, ip, icmp, tcp,
udp, egp, transmission, and snmp.
16
Lecture # 8: Network Management
SNMP:
• Allobjects managed by
SNMP are given an object
identifier.
17
Lecture # 8: Network Management
21
Lecture # 8: Network Management
SNMP Security
SNMP messages are used not just to monitor, but also to
control network elements.
An intruder could intercept SNMP messages and/or
generate its own SNMP packets into the management
infrastructure
Thus, it is crucial that SNMP messages be transmitted
securely
The most recent version of SNMP that provides security
is SNMPv3 security and is known as user-based security
[RFC 3414]
22
Lecture # 8: Network Management
SNMP Security:
SNMPv3 provides:
Encryption: SNMP PDUs can be encrypted using the
Data Encryption Standard (DES) in Cipher Block Chaining
(CBC) mode
Authentication: SNMP uses the Message Authentication
Code (MAC) technique to provide authentication
Protection against playback: to ensure that a received
message is not a replay of some earlier message, the receiver
requires that the sender include a value in each message that
is based on a counter in the receiver
Access control: SNMPv3 provides a view-based access
control that controls which network management
information can be queried and/or set by which users 23