290 likes | 608 Views
8: Network Management. 2. Chapter 8: Network Management. Chapter goals: introduction to network managementmotivationmajor componentsInternet network management frameworkMIB: management information baseSMI: data definition languageSNMP: protocol for network managementsecurity and administrati
E N D
1. 8: Network Management 1 Chapter 8 – Network Management As we have learned thus far, computer networks are complex systems of numerous hardware and software components. As such, they are subject to operational problems involving outage, malfunction, mis-configuration, poor performance, and other issues. In this final chapter, we will briefly look at the architecture, protocols and tools available to identify and solve these problems.
2. 8: Network Management 2 Chapter 8: Network Management Chapter goals:
introduction to network management
motivation
major components
Internet network management framework
MIB: management information base
SMI: data definition language
SNMP: protocol for network management
security and administration
presentation services: ASN.1
firewalls
3. 8: Network Management 3 Network management motivation networks are complex autonomous systems
Consisting of 100s (or 1000s) of interacting hardware and software components
4. 8: Network Management 4 Motivation for network management – “stuff happens”
5. 8: Network Management 5 Network management: 4 key goals Monitor…
see what’s happening
host interfaces, traffic levels, service levels, security, performance, routing table changes, etc.
Analyze…
determine what it means
Reactively control…
take action based on what is happening
Proactively manage…
take action based on what current trends tell you to will happen
6. 8: Network Management 6 Infrastructure for network management
7. 8: Network Management 7 A typical Network Management Systems
8. 8: Network Management 8 Network Management standards OSI CMIP
Common Management Information Protocol
designed 1980’s: the unifying net management standard
too slowly standardized
SNMP: Simple Network Management Protocol
Internet roots (SGMP… ISMF)
started simple
deployed, adopted rapidly
growth: size, complexity
currently: SNMP V3 (released April 1999)
de facto network management standard
9. 8: Network Management 9 SNMP overview: 4 key parts of the Internet network management framework Management information base (MIB):
distributed information store of network management data (MIB objects)
Structure of Management Information (SMI):
data definition language for MIB objects
SNMP protocol
convey manager<->managed object info, commands
Security & administration capabilities
major addition in SNMPv3
10. 8: Network Management 10 SMI: data definition language (RFC 2578) Purpose: syntax, semantics of management data well-defined, unambiguous
base data types:
straightforward, boring
OBJECT-TYPE
data type, status, semantics of managed object
MODULE-IDENTITY
groups related objects into MIB module
11. 8: Network Management 11 SNMP MIB
12. 8: Network Management 12 SMI: Object, module examples OBJECT-TYPE: ipInDelivers MODULE-IDENTITY: ipMIB
13. 8: Network Management 13 SNMP Naming (OBJECT IDENTIFIER) question: how to name every possible standard object (protocol, data, more..) in every possible network standard??
answer: ISO Object Identifier tree:
hierarchical naming of all objects
each branchpoint has name, number
14. 8: Network Management 14 ISO Object Identifier Tree
15. 8: Network Management 15 MIB example: UDP module
16. 8: Network Management 16 SNMP protocol Two ways to convey MIB info, commands:
17. 8: Network Management 17 SNMP protocol: message types
18. 8: Network Management 18 SNMP protocol: message formats
19. 8: Network Management 19 SNMP security and administration encryption: DES-encrypt SNMP message
authentication: compute, send MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)
protection against playback: use nonce
view-based access control
SNMP entity maintains database of access rights, policies for various users
database itself accessible as managed object!
20. 8: Network Management 20 The presentation problem Q: does perfect memory-to-memory copy solve “the communication problem”?
A: not always!
21. 8: Network Management 21 Solving the presentation problem 1. Translate local-host format to host-independent format
2. Transmit data in host-independent format
3. Translate host-independent format to remote-host format
22. 8: Network Management 22 ASN.1: Abstract Syntax Notation 1 “The language of standards writers.”
ISO standard X.680
used extensively in Internet
defined data types, object constructors
like SMI
BER: Basic Encoding Rules (ITU-T X.209, X.690)
specify how ASN.1-defined data objects to be transmitted
each transmitted object has Type, Length, Value (TLV) encoding
23. 8: Network Management 23 ASN.1: Abstract Syntax Notation 1 Encoding Rules
BER - for management of the Internet, exchange of electronic mail, control of telephone/computer interactions
DER - specialized form of BER that is used in security-conscious applications
CER – another specialized form of BER that is meant for use with huge messages
PER - recent version with more efficient algorithms that result in faster and more compact encodings; used in applications that are bandwidth or CPU starved, such as air traffic control and audio-visual telecommunications
24. 8: Network Management 24 TLV Encoding Idea: transmitted data is self-identifying
T: data type, one of ASN.1-defined types
L: length of data in bytes
V: value of data, encoded according to ASN.1 standard
25. 8: Network Management 25 TLV encoding: example
26. 8: Network Management 26 TLV encoding - another example:
27. 8: Network Management 27 Firewalls Two firewall types:
packet filter
application gateway
28. 8: Network Management 28 Packet Filtering Internal network is typically connected to Internet through a router.
Router manufacturer provides options for filtering packets, based on (for example):
source IP address
destination IP address
TCP/UDP source and destination port numbers
ICMP message type
TCP SYN and ACK bits Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or destination port = 23.
All incoming and outgoing UDP flows and telnet connections are blocked.
Example 2: Block inbound TCP segments with ACK bit=0.
Prevents external clients from making TCP connections with internal clients, but allows internal clients to connect to outside.
29. 8: Network Management 29 Application gateways Filters packets on application data as well as on IP/TCP/UDP fields.
Example: allow select internal users to telnet outside.
30. 8: Network Management 30 Limitations of firewalls and gateways IP spoofing: router can’t know if data “really” comes from claimed source
If multiple app’s. need special treatment, each has own app. gateway.
Client software must know how to contact gateway.
e.g., must set IP address of proxy in Web browser Filters often use all or nothing policy for UDP.
Tradeoff: degree of communication with outside world, level of security
Many highly protected sites still suffer from attacks.