SlideShare a Scribd company logo
1 of 42
Download to read offline
CCNA 4 - CHAPTER 8
MONITORING THE NETWORK
Ahmed Fawzy Gad
ahmed.fawzy@ci.menofia.edu.eg
MENOUFIA UNIVERSITY
FACULTY OF COMPUTERS AND
INFORMATION
INFORMATION TECHNOLOGY DEPARTMENT
DIGITAL NETWORKS
‫المنوفية‬ ‫جامعة‬
‫والمعلومات‬ ‫الحاسبات‬ ‫كلية‬
‫المعلومات‬ ‫تكنولوجيا‬ ‫قسم‬
‫الرقمية‬ ‫الشبكات‬
‫المنوفية‬ ‫جامعة‬
INTRODUCTION
Monitoring an operational network can provide a network administrator with
information to manage the network and collect network usage statistics.
Monitoring is not meant to modify any node in the network. Network monitoring just
reports information to the administrator and then the administrator itself can decide
what to do.
Error Rates Link Status
Monitoring
Protocols
Syslog
SNMP
NetFlow
NTP
Network Time Protocol
MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Syslog SNMP NetFLow
Log Trap IP
MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Cisco Device
Interface Up/Down
IP Change
Protocol Activated
Monitoring Options
MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Cisco Device
Interface Up/Down
IP Address Confliction
Protocol Activated
Console
MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
Node
Node
Node
Node
Node
NodeSNMP
Server
CPU Usage
Interface Status
Objects
Set Get
Messages
MONITORING PROTOCOLS
SYSLOG VS. SNMP VS. NETFLOW
SNMP
Device
CPU - Memory
IP
Protocols
Interfaces
Modifications
NetFLow
Use NetFlow to focus only
on just IP traffic.
SYSLOG
SYSLOG
Systlog is a standard protocol that uses UDP port 514.
Syslog uses client-server architecture.
Client sends system log messages to the Syslog server.
Syslog server is the message collector that receives
messages from different devices.
Many networking devices support the syslog protocol like
routers, switches, firewalls, and others.
Syslog allows networking devices to send their system
messages across an IP network.
SYSLOG
PRIMARY FUNCTIONS
The ability to gather logging information for
monitoring and troubleshooting.
The ability to select the type of logging
information that is captured.
The ability to specify the destinations of
captured syslog messages.
Popular destinations for syslog messages include:
1. Logging buffer (RAM inside a router or switch)
2. Console line
3. Terminal line
4. Syslog server
SYSLOG
PRIMARY FUNCTIONS
The ability to specify the destinations of
captured syslog messages.
SYSLOG
MESSAGE FORMAT
Every syslog message contains a severity level and a facility.
The smaller the numerical value of the severity level, the more critical syslog alarms.
The severity level of the messages can be set to control where each type of message
is displayed.
Severity Name/Facility = Category.
MNEMONIC => More Information.
Facility Severity Mnemonic Description
SYSLOG
MESSAGE FORMAT
Facility Severity Mnemonic Description
SYSLOG CONFIGURATION
DEFAULT LOGGING
By default, Cisco routers and switches
send log messages for all severity
levels to the console.
On some IOS versions, the device also
buffers log messages by default.
Use show logging user-privileged
executive mode command to show
destination of the log messages.
level debugging means that level 7
and all lower levels are activated.
R1(global)#logging console : Enable
console logging.
R1(global)#logging buffered :
Enable buffer logging.
SYSLOG CONFIGURATION
SERVER ACTIVATION
SYSLOG CONFIGURATION
CLIENT CONFIGURATION
Step 1. Configure the destination hostname or IP address of the syslog server in global configuration
mode:
R1(config)#logging 10.0.0.1
Step 2. Control the messages that will be sent to the syslog server with the logging trap level global
configuration mode command. For example, to limit the messages to levels 4 and lower (0 to 4), use one of
the two equivalent commands:
R1(config)#logging trap 4
R1(config)#logging trap warning
Step 3. Optionally, configure the source interface with the logging source-interface interface-type
interface number global configuration mode command.
R1(config)#logging source-interface g0/0
SYSLOG
SERVER LOG INSPECTION
Change the status of another interface other than one used to connect the server or
create a loopback interface then change its state to create logging messages.
These messages will be received by the server.
SNMP
SNMP
SNMP uses UDP, port number 162, to retrieve and send management information.
SNMP was developed to allow administrators to manage nodes, such as servers,
workstations, routers, switches, and security appliances, on an IP network.
SNMP is an application layer protocol that provides a message format for
communication between managers and agents. The SNMP system consists of three
elements:
1. SNMP manager
2. SNMP agents (managed node)
3. Management Information Base (MIB)
SNMP SYSTEM ELEMENTS
The SNMP manager is part of a network
management system (NMS).
The SNMP manager is part of a network management
system (NMS). The SNMP manager runs SNMP
management software.
The SNMP manager can collect information from an
SNMP agent using the “get” action and can change
configurations on an agent using the “set” action.
Network devices that must be managed, such as
switches, routers, servers, firewalls, and workstations,
are equipped with an SMNP agent software module
SNMP agents can forward information directly to an
NMS using “traps”.
SNMP SYSTEM ELEMENTS
MIBs store data about the device operation and
are meant to be available to authenticated
remote users. The SNMP agent is responsible for
providing access to the local MIB of objects that
reflects resources and activity.
The SNMP manager then uses the SNMP agent to
access information within the MIB.
SNMP SERVER REQUESTS
There are two primary SNMP manager
requests
1. Get: A get request is used by the NMS to
query the device for data.
2. Set: A set request is used by the NMS to
change configuration variables in the agent
device. A set request can also initiate
actions within a device. For example, a set
can cause a router to reboot, send a
configuration file, or receive a configuration
file.
SNMP AGENT RESPONSES TO SNMP
SERVER
The SNMP agent responds to SNMP manager requests as follows:
1. Get an MIB variable - The SNMP agent performs this function in response to a GetRequest-
PDU from the NMS. The agent retrieves the value of the requested MIB variable and
responds to the NMS with that value.
2. Set an MIB variable - The SNMP agent performs this function in response to a SetRequest-
PDU from the NMS. The SNMP agent changes the value of the MIB variable to the value
specified by the NMS. An SNMP agent reply to a set request includes the new settings in the
device.
COMMUNITY STRINGS
For SNMP to operate, the NMS must have access to the MIB. To ensure that access requests are valid,
some form of authentication must be in place.
SNMPv1 and SNMPv2c use community strings that control access to the MIB. Community strings are
plaintext passwords. SNMP community strings authenticate access to MIB objects.
There are two types of community strings:
1. Read-only (ro) - Provides access to the MIB variables, but does not allow these variables to be
changed, only read. Because security is minimal in version 2c, many organizations use SNMPv2c in
read-only mode.
2. Read-write (rw) - Provides read and write access to all objects in the MIB.
To view or set MIB variables, the user must specify the appropriate community string for read or write
access.
Note: Plaintext passwords are not considered a security mechanism. This is because plaintext
passwords are highly vulnerable to man-in-the-middle attacks, in which they are compromised through
the capture of packets.
MANAGEMENT INFORMATION BASE
OBJECT IDENTIFIER (MIBOID)
The MIB organizes variables hierarchically. MIB
variables enable the management software to monitor
and control the network device. Formally, the MIB
defines each variable as an object ID (OID). OIDs
uniquely identify managed objects in the MIB
hierarchy.
The MIB tree for any given device includes some
branches with variables common to many networking
devices and some branches with variables specific to
that device or vendor.
OIDs belonging to Cisco are numbered as follows: .iso
(1).org (3).dod (6).internet (1).private (4).enterprises
(1).cisco (9). This is displayed as 1.3.6.1.4.1.9.
SNMP SERVER CONFIGURATION
REQUIRED COMAMNDS
Step 1. Configure the community string and access level (read-only or read-write)
with this command:
R1(config)#snmp-server community string ro | rw
For example, two create a read-only community string:
R1(config)#snmp-server community ahmed ro
For example, two create a read-write community string:
R1(config)#snmp-server community ahmedd rw
SNMP CLIENT
MIB BROWSER
Query the host for a variable value using the previously entered community strings.
SNMP CLIENT
MIB BROWSER
1. IP Address
2. Port Number
3. Read Community String
4. Write Community String
5. Version
SNMP CLIENT
SERVER DETAILS
SNMP CLIENT
OID
Example of valid OID:
.1.3.6.1.4.1.9.9.449.1.3.1.1.5
It tells if the route to the destination has
failed and an active search for
alternative path is in progress.
SNMP VERIFICATION
R1#show snmp
SNMP VERIFICATION
R1#show snmp community
NETFLOW
NETFLOW
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a Cisco
router or multilayer switch.
NetFlow technology was developed because networking professionals needed a simple and
efficient method for tracking TCP/IP flows in the network, and SNMP was not sufficient for
these purposes.
While SNMP attempts to provide a very wide range of network management features and
options, NetFlow is focused on providing statistics on IP packets flowing through network
devices.
Another difference between NetFlow and SNMP is that NetFlow only gathers traffic
statistics, whereas SNMP can also collect many other performance indicators, such as
interface errors, CPU usage, and memory usage.
On the other hand, the traffic statistics collected using NetFlow have a lot more granularity
than the traffic statistics that can be collected using SNMP.
NETFLOW USES
Organizations use NetFlow for some or all of the following important data collection
purposes:
1. Measuring who is using what network resources for what purpose.
2. Accounting and charging back according to the resource utilization level.
3. Using the measured information to do more effective network planning so that
resource allocation and deployment is well-aligned with customer requirements.
4. Using the information to better structure and customize the set of available
applications and services to meet user needs and customer service requirements.
NETFLOW PACKET FIELDS
Original NetFlow distinguished flows using a combination of seven fields:
1. Source IP address
2. Destination IP address
3. Source port number
4. Destination port number
5. Layer 3 protocol type (TCP/UDP)
6. Type of Service (ToS) marking: The ToS byte in the IPv4 header holds information
about how devices should apply quality of service (QoS) rules to the packets in
that flow.
7. Input logical interface
NETFLOW CONFIGURATION
A NetFlow flow is unidirectional. This means that one user
connection to an application exists as two NetFlow flows, one
for each direction. To define the data to be captured for
NetFlow in interface configuration mode:
Capture NetFlow data for monitoring incoming packets on the
interface using this command:
R1(config-if)#ip flow ingress
Capture NetFlow data for monitoring outgoing packets on the
interface using this command:
R1(config-if)#ip flow eggress
NETFLOW CONFIGURATION
To enable the NetFlow data to be sent to the NetFlow collector,
there are several items to configure on the router in global
configuration mode:
NetFlow collector’s IP address and UDP port number - Use
this command:
R1(config)#ip flow-export destination ip-address udp-port
The collector has one or more ports, by default, for NetFlow
data capture. The software allows the administrator to specify
which port or ports to accept for NetFlow capture. Some
common UDP ports allocated are 99, 2055, and 9996.
VERIFYING NETFLOW
R1#show ip cache flow
This command gives details about the following:
1. IP Packet Size Distribution
2. Protocol Statistics
3. Interface Statistics
VERIFYING NETFLOW
PROTOCOL
R1#show ip cache flow
VERIFYING NETFLOW
INTERFACE
R1#show ip cache flow
VERIFYING NETFLOW
R1#show ip flow interface

More Related Content

What's hot

Linux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverLinux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverMidhun Lohidakshan
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)Mohammad Awais Javaid
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configurationHamed Moghaddam
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Shahrukh Ali Khan
 
Networking basics and basic cisco commands
Networking basics and basic cisco commandsNetworking basics and basic cisco commands
Networking basics and basic cisco commandsKrishna Mohan
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 

What's hot (20)

Linux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverLinux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driver
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
SNMP
SNMPSNMP
SNMP
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Mpls Services
Mpls ServicesMpls Services
Mpls Services
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
 
Networking basics and basic cisco commands
Networking basics and basic cisco commandsNetworking basics and basic cisco commands
Networking basics and basic cisco commands
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 

Similar to CCNA4v5 Chapter 8 - Monitoring the Netwok

Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
TelScale SNMP and JMX management - Mobicents Summit 2011
TelScale SNMP and JMX management - Mobicents Summit 2011TelScale SNMP and JMX management - Mobicents Summit 2011
TelScale SNMP and JMX management - Mobicents Summit 2011telestax
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessmentSupriya G
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptxLilyMkayula
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptuseonlyfortech140
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logRafat Khandaker
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibilityHamdamboy (함담보이)
 
NetSim Technology Library - Software defined networks
NetSim Technology Library - Software defined networksNetSim Technology Library - Software defined networks
NetSim Technology Library - Software defined networksVishal Sharma
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8koolkampus
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 

Similar to CCNA4v5 Chapter 8 - Monitoring the Netwok (20)

SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
White Paper on SNMPv3
White Paper on SNMPv3White Paper on SNMPv3
White Paper on SNMPv3
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
snmp
snmpsnmp
snmp
 
TelScale SNMP and JMX management - Mobicents Summit 2011
TelScale SNMP and JMX management - Mobicents Summit 2011TelScale SNMP and JMX management - Mobicents Summit 2011
TelScale SNMP and JMX management - Mobicents Summit 2011
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
Snmp vulnerability assessment
Snmp vulnerability assessmentSnmp vulnerability assessment
Snmp vulnerability assessment
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptx
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Packet Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-logPacket Tracer: SNMP, Netflow, Sys-log
Packet Tracer: SNMP, Netflow, Sys-log
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
NetSim Technology Library - Software defined networks
NetSim Technology Library - Software defined networksNetSim Technology Library - Software defined networks
NetSim Technology Library - Software defined networks
 
Snmp
SnmpSnmp
Snmp
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 

More from Ahmed Gad

ICEIT'20 Cython for Speeding-up Genetic Algorithm
ICEIT'20 Cython for Speeding-up Genetic AlgorithmICEIT'20 Cython for Speeding-up Genetic Algorithm
ICEIT'20 Cython for Speeding-up Genetic AlgorithmAhmed Gad
 
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...Ahmed Gad
 
Python for Computer Vision - Revision 2nd Edition
Python for Computer Vision - Revision 2nd EditionPython for Computer Vision - Revision 2nd Edition
Python for Computer Vision - Revision 2nd EditionAhmed Gad
 
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...Ahmed Gad
 
M.Sc. Thesis - Automatic People Counting in Crowded Scenes
M.Sc. Thesis - Automatic People Counting in Crowded ScenesM.Sc. Thesis - Automatic People Counting in Crowded Scenes
M.Sc. Thesis - Automatic People Counting in Crowded ScenesAhmed Gad
 
Derivation of Convolutional Neural Network from Fully Connected Network Step-...
Derivation of Convolutional Neural Network from Fully Connected Network Step-...Derivation of Convolutional Neural Network from Fully Connected Network Step-...
Derivation of Convolutional Neural Network from Fully Connected Network Step-...Ahmed Gad
 
Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)Ahmed Gad
 
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...Ahmed Gad
 
Avoid Overfitting with Regularization
Avoid Overfitting with RegularizationAvoid Overfitting with Regularization
Avoid Overfitting with RegularizationAhmed Gad
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleAhmed Gad
 
ICCES 2017 - Crowd Density Estimation Method using Regression Analysis
ICCES 2017 - Crowd Density Estimation Method using Regression AnalysisICCES 2017 - Crowd Density Estimation Method using Regression Analysis
ICCES 2017 - Crowd Density Estimation Method using Regression AnalysisAhmed Gad
 
Backpropagation: Understanding How to Update ANNs Weights Step-by-Step
Backpropagation: Understanding How to Update ANNs Weights Step-by-StepBackpropagation: Understanding How to Update ANNs Weights Step-by-Step
Backpropagation: Understanding How to Update ANNs Weights Step-by-StepAhmed Gad
 
Computer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and GradientComputer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and GradientAhmed Gad
 
Python for Computer Vision - Revision
Python for Computer Vision - RevisionPython for Computer Vision - Revision
Python for Computer Vision - RevisionAhmed Gad
 
Anime Studio Pro 10 Tutorial as Part of Multimedia Course
Anime Studio Pro 10 Tutorial as Part of Multimedia CourseAnime Studio Pro 10 Tutorial as Part of Multimedia Course
Anime Studio Pro 10 Tutorial as Part of Multimedia CourseAhmed Gad
 
Brief Introduction to Deep Learning + Solving XOR using ANNs
Brief Introduction to Deep Learning + Solving XOR using ANNsBrief Introduction to Deep Learning + Solving XOR using ANNs
Brief Introduction to Deep Learning + Solving XOR using ANNsAhmed Gad
 
Operations in Digital Image Processing + Convolution by Example
Operations in Digital Image Processing + Convolution by ExampleOperations in Digital Image Processing + Convolution by Example
Operations in Digital Image Processing + Convolution by ExampleAhmed Gad
 
MATLAB Code + Description : Real-Time Object Motion Detection and Tracking
MATLAB Code + Description : Real-Time Object Motion Detection and TrackingMATLAB Code + Description : Real-Time Object Motion Detection and Tracking
MATLAB Code + Description : Real-Time Object Motion Detection and TrackingAhmed Gad
 
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...Ahmed Gad
 
Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
 

More from Ahmed Gad (20)

ICEIT'20 Cython for Speeding-up Genetic Algorithm
ICEIT'20 Cython for Speeding-up Genetic AlgorithmICEIT'20 Cython for Speeding-up Genetic Algorithm
ICEIT'20 Cython for Speeding-up Genetic Algorithm
 
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...
 
Python for Computer Vision - Revision 2nd Edition
Python for Computer Vision - Revision 2nd EditionPython for Computer Vision - Revision 2nd Edition
Python for Computer Vision - Revision 2nd Edition
 
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...
 
M.Sc. Thesis - Automatic People Counting in Crowded Scenes
M.Sc. Thesis - Automatic People Counting in Crowded ScenesM.Sc. Thesis - Automatic People Counting in Crowded Scenes
M.Sc. Thesis - Automatic People Counting in Crowded Scenes
 
Derivation of Convolutional Neural Network from Fully Connected Network Step-...
Derivation of Convolutional Neural Network from Fully Connected Network Step-...Derivation of Convolutional Neural Network from Fully Connected Network Step-...
Derivation of Convolutional Neural Network from Fully Connected Network Step-...
 
Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)
 
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...
 
Avoid Overfitting with Regularization
Avoid Overfitting with RegularizationAvoid Overfitting with Regularization
Avoid Overfitting with Regularization
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
 
ICCES 2017 - Crowd Density Estimation Method using Regression Analysis
ICCES 2017 - Crowd Density Estimation Method using Regression AnalysisICCES 2017 - Crowd Density Estimation Method using Regression Analysis
ICCES 2017 - Crowd Density Estimation Method using Regression Analysis
 
Backpropagation: Understanding How to Update ANNs Weights Step-by-Step
Backpropagation: Understanding How to Update ANNs Weights Step-by-StepBackpropagation: Understanding How to Update ANNs Weights Step-by-Step
Backpropagation: Understanding How to Update ANNs Weights Step-by-Step
 
Computer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and GradientComputer Vision: Correlation, Convolution, and Gradient
Computer Vision: Correlation, Convolution, and Gradient
 
Python for Computer Vision - Revision
Python for Computer Vision - RevisionPython for Computer Vision - Revision
Python for Computer Vision - Revision
 
Anime Studio Pro 10 Tutorial as Part of Multimedia Course
Anime Studio Pro 10 Tutorial as Part of Multimedia CourseAnime Studio Pro 10 Tutorial as Part of Multimedia Course
Anime Studio Pro 10 Tutorial as Part of Multimedia Course
 
Brief Introduction to Deep Learning + Solving XOR using ANNs
Brief Introduction to Deep Learning + Solving XOR using ANNsBrief Introduction to Deep Learning + Solving XOR using ANNs
Brief Introduction to Deep Learning + Solving XOR using ANNs
 
Operations in Digital Image Processing + Convolution by Example
Operations in Digital Image Processing + Convolution by ExampleOperations in Digital Image Processing + Convolution by Example
Operations in Digital Image Processing + Convolution by Example
 
MATLAB Code + Description : Real-Time Object Motion Detection and Tracking
MATLAB Code + Description : Real-Time Object Motion Detection and TrackingMATLAB Code + Description : Real-Time Object Motion Detection and Tracking
MATLAB Code + Description : Real-Time Object Motion Detection and Tracking
 
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
 
Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...Graduation Project - Face Login : A Robust Face Identification System for Sec...
Graduation Project - Face Login : A Robust Face Identification System for Sec...
 

Recently uploaded

Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 

Recently uploaded (20)

Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 

CCNA4v5 Chapter 8 - Monitoring the Netwok

  • 1. CCNA 4 - CHAPTER 8 MONITORING THE NETWORK Ahmed Fawzy Gad ahmed.fawzy@ci.menofia.edu.eg MENOUFIA UNIVERSITY FACULTY OF COMPUTERS AND INFORMATION INFORMATION TECHNOLOGY DEPARTMENT DIGITAL NETWORKS ‫المنوفية‬ ‫جامعة‬ ‫والمعلومات‬ ‫الحاسبات‬ ‫كلية‬ ‫المعلومات‬ ‫تكنولوجيا‬ ‫قسم‬ ‫الرقمية‬ ‫الشبكات‬ ‫المنوفية‬ ‫جامعة‬
  • 2. INTRODUCTION Monitoring an operational network can provide a network administrator with information to manage the network and collect network usage statistics. Monitoring is not meant to modify any node in the network. Network monitoring just reports information to the administrator and then the administrator itself can decide what to do. Error Rates Link Status Monitoring Protocols Syslog SNMP NetFlow NTP Network Time Protocol
  • 3. MONITORING PROTOCOLS SYSLOG VS. SNMP VS. NETFLOW Syslog SNMP NetFLow Log Trap IP
  • 4. MONITORING PROTOCOLS SYSLOG VS. SNMP VS. NETFLOW Cisco Device Interface Up/Down IP Change Protocol Activated Monitoring Options
  • 5. MONITORING PROTOCOLS SYSLOG VS. SNMP VS. NETFLOW Cisco Device Interface Up/Down IP Address Confliction Protocol Activated Console
  • 6. MONITORING PROTOCOLS SYSLOG VS. SNMP VS. NETFLOW Node Node Node Node Node NodeSNMP Server CPU Usage Interface Status Objects Set Get Messages
  • 7. MONITORING PROTOCOLS SYSLOG VS. SNMP VS. NETFLOW SNMP Device CPU - Memory IP Protocols Interfaces Modifications NetFLow Use NetFlow to focus only on just IP traffic.
  • 9. SYSLOG Systlog is a standard protocol that uses UDP port 514. Syslog uses client-server architecture. Client sends system log messages to the Syslog server. Syslog server is the message collector that receives messages from different devices. Many networking devices support the syslog protocol like routers, switches, firewalls, and others. Syslog allows networking devices to send their system messages across an IP network.
  • 10. SYSLOG PRIMARY FUNCTIONS The ability to gather logging information for monitoring and troubleshooting. The ability to select the type of logging information that is captured. The ability to specify the destinations of captured syslog messages.
  • 11. Popular destinations for syslog messages include: 1. Logging buffer (RAM inside a router or switch) 2. Console line 3. Terminal line 4. Syslog server SYSLOG PRIMARY FUNCTIONS The ability to specify the destinations of captured syslog messages.
  • 12. SYSLOG MESSAGE FORMAT Every syslog message contains a severity level and a facility. The smaller the numerical value of the severity level, the more critical syslog alarms. The severity level of the messages can be set to control where each type of message is displayed. Severity Name/Facility = Category. MNEMONIC => More Information. Facility Severity Mnemonic Description
  • 14. SYSLOG CONFIGURATION DEFAULT LOGGING By default, Cisco routers and switches send log messages for all severity levels to the console. On some IOS versions, the device also buffers log messages by default. Use show logging user-privileged executive mode command to show destination of the log messages. level debugging means that level 7 and all lower levels are activated. R1(global)#logging console : Enable console logging. R1(global)#logging buffered : Enable buffer logging.
  • 16. SYSLOG CONFIGURATION CLIENT CONFIGURATION Step 1. Configure the destination hostname or IP address of the syslog server in global configuration mode: R1(config)#logging 10.0.0.1 Step 2. Control the messages that will be sent to the syslog server with the logging trap level global configuration mode command. For example, to limit the messages to levels 4 and lower (0 to 4), use one of the two equivalent commands: R1(config)#logging trap 4 R1(config)#logging trap warning Step 3. Optionally, configure the source interface with the logging source-interface interface-type interface number global configuration mode command. R1(config)#logging source-interface g0/0
  • 17. SYSLOG SERVER LOG INSPECTION Change the status of another interface other than one used to connect the server or create a loopback interface then change its state to create logging messages. These messages will be received by the server.
  • 18. SNMP
  • 19. SNMP SNMP uses UDP, port number 162, to retrieve and send management information. SNMP was developed to allow administrators to manage nodes, such as servers, workstations, routers, switches, and security appliances, on an IP network. SNMP is an application layer protocol that provides a message format for communication between managers and agents. The SNMP system consists of three elements: 1. SNMP manager 2. SNMP agents (managed node) 3. Management Information Base (MIB)
  • 20. SNMP SYSTEM ELEMENTS The SNMP manager is part of a network management system (NMS). The SNMP manager is part of a network management system (NMS). The SNMP manager runs SNMP management software. The SNMP manager can collect information from an SNMP agent using the “get” action and can change configurations on an agent using the “set” action. Network devices that must be managed, such as switches, routers, servers, firewalls, and workstations, are equipped with an SMNP agent software module SNMP agents can forward information directly to an NMS using “traps”.
  • 21. SNMP SYSTEM ELEMENTS MIBs store data about the device operation and are meant to be available to authenticated remote users. The SNMP agent is responsible for providing access to the local MIB of objects that reflects resources and activity. The SNMP manager then uses the SNMP agent to access information within the MIB.
  • 22. SNMP SERVER REQUESTS There are two primary SNMP manager requests 1. Get: A get request is used by the NMS to query the device for data. 2. Set: A set request is used by the NMS to change configuration variables in the agent device. A set request can also initiate actions within a device. For example, a set can cause a router to reboot, send a configuration file, or receive a configuration file.
  • 23. SNMP AGENT RESPONSES TO SNMP SERVER The SNMP agent responds to SNMP manager requests as follows: 1. Get an MIB variable - The SNMP agent performs this function in response to a GetRequest- PDU from the NMS. The agent retrieves the value of the requested MIB variable and responds to the NMS with that value. 2. Set an MIB variable - The SNMP agent performs this function in response to a SetRequest- PDU from the NMS. The SNMP agent changes the value of the MIB variable to the value specified by the NMS. An SNMP agent reply to a set request includes the new settings in the device.
  • 24. COMMUNITY STRINGS For SNMP to operate, the NMS must have access to the MIB. To ensure that access requests are valid, some form of authentication must be in place. SNMPv1 and SNMPv2c use community strings that control access to the MIB. Community strings are plaintext passwords. SNMP community strings authenticate access to MIB objects. There are two types of community strings: 1. Read-only (ro) - Provides access to the MIB variables, but does not allow these variables to be changed, only read. Because security is minimal in version 2c, many organizations use SNMPv2c in read-only mode. 2. Read-write (rw) - Provides read and write access to all objects in the MIB. To view or set MIB variables, the user must specify the appropriate community string for read or write access. Note: Plaintext passwords are not considered a security mechanism. This is because plaintext passwords are highly vulnerable to man-in-the-middle attacks, in which they are compromised through the capture of packets.
  • 25. MANAGEMENT INFORMATION BASE OBJECT IDENTIFIER (MIBOID) The MIB organizes variables hierarchically. MIB variables enable the management software to monitor and control the network device. Formally, the MIB defines each variable as an object ID (OID). OIDs uniquely identify managed objects in the MIB hierarchy. The MIB tree for any given device includes some branches with variables common to many networking devices and some branches with variables specific to that device or vendor. OIDs belonging to Cisco are numbered as follows: .iso (1).org (3).dod (6).internet (1).private (4).enterprises (1).cisco (9). This is displayed as 1.3.6.1.4.1.9.
  • 26. SNMP SERVER CONFIGURATION REQUIRED COMAMNDS Step 1. Configure the community string and access level (read-only or read-write) with this command: R1(config)#snmp-server community string ro | rw For example, two create a read-only community string: R1(config)#snmp-server community ahmed ro For example, two create a read-write community string: R1(config)#snmp-server community ahmedd rw
  • 27. SNMP CLIENT MIB BROWSER Query the host for a variable value using the previously entered community strings.
  • 29. 1. IP Address 2. Port Number 3. Read Community String 4. Write Community String 5. Version SNMP CLIENT SERVER DETAILS
  • 30. SNMP CLIENT OID Example of valid OID: .1.3.6.1.4.1.9.9.449.1.3.1.1.5 It tells if the route to the destination has failed and an active search for alternative path is in progress.
  • 34. NETFLOW NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch. NetFlow technology was developed because networking professionals needed a simple and efficient method for tracking TCP/IP flows in the network, and SNMP was not sufficient for these purposes. While SNMP attempts to provide a very wide range of network management features and options, NetFlow is focused on providing statistics on IP packets flowing through network devices. Another difference between NetFlow and SNMP is that NetFlow only gathers traffic statistics, whereas SNMP can also collect many other performance indicators, such as interface errors, CPU usage, and memory usage. On the other hand, the traffic statistics collected using NetFlow have a lot more granularity than the traffic statistics that can be collected using SNMP.
  • 35. NETFLOW USES Organizations use NetFlow for some or all of the following important data collection purposes: 1. Measuring who is using what network resources for what purpose. 2. Accounting and charging back according to the resource utilization level. 3. Using the measured information to do more effective network planning so that resource allocation and deployment is well-aligned with customer requirements. 4. Using the information to better structure and customize the set of available applications and services to meet user needs and customer service requirements.
  • 36. NETFLOW PACKET FIELDS Original NetFlow distinguished flows using a combination of seven fields: 1. Source IP address 2. Destination IP address 3. Source port number 4. Destination port number 5. Layer 3 protocol type (TCP/UDP) 6. Type of Service (ToS) marking: The ToS byte in the IPv4 header holds information about how devices should apply quality of service (QoS) rules to the packets in that flow. 7. Input logical interface
  • 37. NETFLOW CONFIGURATION A NetFlow flow is unidirectional. This means that one user connection to an application exists as two NetFlow flows, one for each direction. To define the data to be captured for NetFlow in interface configuration mode: Capture NetFlow data for monitoring incoming packets on the interface using this command: R1(config-if)#ip flow ingress Capture NetFlow data for monitoring outgoing packets on the interface using this command: R1(config-if)#ip flow eggress
  • 38. NETFLOW CONFIGURATION To enable the NetFlow data to be sent to the NetFlow collector, there are several items to configure on the router in global configuration mode: NetFlow collector’s IP address and UDP port number - Use this command: R1(config)#ip flow-export destination ip-address udp-port The collector has one or more ports, by default, for NetFlow data capture. The software allows the administrator to specify which port or ports to accept for NetFlow capture. Some common UDP ports allocated are 99, 2055, and 9996.
  • 39. VERIFYING NETFLOW R1#show ip cache flow This command gives details about the following: 1. IP Packet Size Distribution 2. Protocol Statistics 3. Interface Statistics

Editor's Notes

  1. For example, syslog messages may be sent across the network to an external syslog server. These messages can be retrieved without the need of accessing the actual device. Log messages and outputs stored on the external server can be pulled into various reports for easier reading. Alternatively, syslog messages may be sent to an internal buffer. Messages sent to the internal buffer are only viewable through the CLI of the device.
  2. The second highlighted line states that this router logs to an internal buffer. Because this router has enabled logging to an internal buffer, the show logging command also lists the messages in that buffer. You can view some of the system messages that have been logged at the end of the output.