30
8: Network Management 1 Chapter 8 – Network Management network data link physical applicat ion transpor t network data link physical As we have learned thus far, computer networks are complex systems of numerous hardware and software components. As such, they are subject to operational problems involving outage, malfunction, mis-configuration, poor performance, and other issues. In this final chapter, we will briefly look at the architecture, protocols and tools available to identify and solve these problems. network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical applicat ion transpor t network data link physical applicat ion transpor t network data link physical

SNMP.ppt

Embed Size (px)

Citation preview

Page 1: SNMP.ppt

8: Network Management 1

Chapter 8 – Network Management

networkdata linkphysical

application

transportnetworkdata linkphysical

As we have learned thus far, computer networks are complex systems of numerous hardware and software components. As such, they are subject to operational problems involving outage, malfunction, mis-configuration, poor performance, and other issues. In this final chapter, we will briefly look at the architecture, protocols and tools available to identify and solve these problems.

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

application

transportnetworkdata linkphysical

application

transportnetworkdata linkphysical

Page 2: SNMP.ppt

8: Network Management 2

Chapter 8: Network ManagementChapter goals: introduction to network management

motivation major components

Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network management security and administration

presentation services: ASN.1 firewalls

Page 3: SNMP.ppt

8: Network Management 3

Network management motivation networks are complex autonomous systems

Consisting of 100s (or 1000s) of interacting hardware and software components

"Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost."

the network management infrastructure does NOT: dictate decision making policies address resource provisioning/service management

issues

Page 4: SNMP.ppt

8: Network Management 4

Motivation for network management – “stuff happens”

managed device

managed device

managed device

managed deviceperformance problems

device faultsconfiguration issues

security problems

software bugs

accounting/billing issues

numerous potential issues/problems to deal with…

For example:UTA ACS

Abilene Net

Page 5: SNMP.ppt

8: Network Management 5

Network management: 4 key goals Monitor…

see what’s happening host interfaces, traffic levels, service levels,

security, performance, routing table changes, etc.

Analyze… determine what it means

Reactively control… take action based on what is happening

Proactively manage… take action based on what current trends

tell you to will happen

Page 6: SNMP.ppt

8: Network Management 6

Infrastructure for network management

agent data

agent data

agent data

agent data

managed device

managed device

managed device

managed device

managingentity data

networknetworkmanagementmanagement

protocolprotocol

definitions:

managed devicesmanaged devices containmanaged objects whose data is gathered into a

Management InformationBase (MIB)

managing entitymanaging entity**

* AKA - Network Management * AKA - Network Management Station (NMS)Station (NMS)

Page 7: SNMP.ppt

8: Network Management 7

SNMP Protocol(Commands, Replies,Traps)

A typical Network Management Systems

NetworkManagement

Console

NetworkManagement

MIB

ManagedDevices

Page 8: SNMP.ppt

8: Network Management 8

Network Management standards

OSI CMIP Common

Management Information Protocol

designed 1980’s: the unifying net management standard

too slowly standardized

SNMP: Simple Network Management Protocol

Internet roots (SGMP… ISMF)

started simple deployed, adopted

rapidly growth: size, complexity currently: SNMP V3

(released April 1999) de facto network

management standard

Page 9: SNMP.ppt

8: Network Management 9

SNMP overview: 4 key parts of the Internet network management framework Management information base (MIB):

distributed information store of network management data (MIB objects)

Structure of Management Information (SMI): data definition language for MIB objects

SNMP protocol convey manager<->managed object info,

commands Security & administration capabilities

major addition in SNMPv3

Page 10: SNMP.ppt

8: Network Management 10

SMI: data definition language (RFC 2578)

Purpose: syntax, semantics of management data well-defined, unambiguous

base data types: straightforward, boring

OBJECT-TYPE data type, status,

semantics of managed object

MODULE-IDENTITY groups related objects

into MIB module

Basic Data Types

INTEGERInteger32

Unsigned32OCTET STRING

OBJECT IDENTIFIERIPaddressCounter32Counter64Guage32

Time TicksOpaque

Page 11: SNMP.ppt

8: Network Management 11

SNMP MIB

OBJECT-TYPE:

OBJECT-TYPE:OBJECT-TYPE:

objects specified via SMIOBJECT-TYPE construct

MIB module specified via SMI MODULE-IDENTITY

(100’s of standardized MIBs, more vendor-specific)

MODULE

Page 12: SNMP.ppt

8: Network Management 12

SMI: Object, module examples

OBJECT-TYPE: ipInDelivers MODULE-IDENTITY: ipMIB

ipInDelivers OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION “The total number of input datagrams successfully delivered to IP user- protocols (including ICMP)”::= { ip 9}

ipMIB MODULE-IDENTITY LAST-UPDATED “941101000Z” ORGANZATION “IETF SNPv2 Working Group” CONTACT-INFO “ Keith McCloghrie ……” DESCRIPTION “The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.” REVISION “019331000Z” ………::= {mib-2 48}Note: RFC 2011-IP MIB,

RFC 2012-TCP MIB, RFC 2013-UDP MIB, …

Page 13: SNMP.ppt

8: Network Management 13

SNMP Naming (OBJECT IDENTIFIER)

question: how to name every possible standard object (protocol, data, more..) in every possible network standard??

answer: ISO Object Identifier tree: hierarchical naming of all objects each branchpoint has name, number

1.3.6.1.2.1.7.1ISO

ISO-ident. Org.US DoDInternet

udpInDatagramsUDPMIB2management

Page 15: SNMP.ppt

8: Network Management 15

MIB example: UDP module

Object ID Name Type Comments

1.3.6.1.2.1.7.1 UDPInDatagrams Counter32 # UDP datagrams delivered

at this node

1.3.6.1.2.1.7.2 UDPNoPorts Counter32 # undeliverable datagrams,

no application at port

1.3.6.1.2.1.7.3 UDInErrors Counter32 # undeliverable datagrams,

all other reasons

1.3.6.1.2.1.7.4 UDPOutDatagrams Counter32 # UDP datagrams sent

1.3.6.1.2.1.7.5 udpTable SEQUENCE one entry for each port

UDP Entry in use by app, gives port #

and IP address

Page 16: SNMP.ppt

8: Network Management 16

SNMP protocol

Two ways to convey MIB info, commands:

agent data

Managed device

managingentity

response

agent data

Managed device

managingentity

trap msg.request

request/response mode trap mode

Page 17: SNMP.ppt

8: Network Management 17

SNMP protocol: message types

GetRequest (0)GetNextRequest (1)GetBulkRequest (5)

Mgr-to-Agent: “get me data”(instance,next in list, block)

Message type Function

InformRequest (6)

Mgr-to-Mgr: here’s MIB value

SetRequest (3) Mgr-to-Agent: set MIB value

Response (2) Agent-to-Mgr: value, response to Request

Trap (7) Agent-to-Mgr: inform managerof exceptional event

Page 18: SNMP.ppt

8: Network Management 18

SNMP protocol: message formats

Trapmessages

Get…,Set,

Inform,Responsemessages

Page 19: SNMP.ppt

8: Network Management 19

SNMP security and administration

encryption: DES-encrypt SNMP message authentication: compute, send

MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)

protection against playback: use nonce view-based access control

SNMP entity maintains database of access rights, policies for various users

database itself accessible as managed object!

MIC: Message Integrity Code (like a digital signature)

Page 20: SNMP.ppt

8: Network Management 20

The presentation problem

Q: does perfect memory-to-memory copy solve “the communication problem”?

A: not always!

problem: different data format, storage conventions (e.g. big-endian, little-endian)

struct { char code; int x; } test;test.x = 259;test.code=‘a’

a0000000100000011

a

0000001100000001

test.codetest.x

test.code

test.x

host 1 format host 2 format

Page 21: SNMP.ppt

8: Network Management 21

Solving the presentation problem

1. Translate local-host format to host-independent format

2. Transmit data in host-independent format3. Translate host-independent format to remote-host

format

Page 22: SNMP.ppt

8: Network Management 22

ASN.1: Abstract Syntax Notation 1

“The language of standards writers.”

ISO standard X.680 used extensively in Internet

defined data types, object constructors like SMI

BER: Basic Encoding Rules (ITU-T X.209, X.690)

specify how ASN.1-defined data objects to be transmitted

each transmitted object has Type, Length, Value (TLV) encoding

Page 23: SNMP.ppt

8: Network Management 23

ASN.1: Abstract Syntax Notation 1Encoding Rules BER - for management of the Internet,

exchange of electronic mail, control of telephone/computer interactions

DER - specialized form of BER that is used in security-conscious applications

CER – another specialized form of BER that is meant for use with huge messages

PER - recent version with more efficient algorithms that result in faster and more compact encodings; used in applications that are bandwidth or CPU starved, such as air traffic control and audio-visual telecommunications

Page 24: SNMP.ppt

8: Network Management 24

TLV Encoding

Idea: transmitted data is self-identifying T: data type, one of ASN.1-defined types L: length of data in bytes V: value of data, encoded according to

ASN.1 standard

1234569

BooleanIntegerBit StringOctet stringNullObject IdentifierReal

Tag Value Type

Page 25: SNMP.ppt

8: Network Management 25

TLV encoding: example

Value, 5 octets (chars)Length, 5 bytes

Type=4, octet string

Value, 259Length, 2 bytes

Type=2, integer

Page 26: SNMP.ppt

8: Network Management 26

TLV encoding - another example:

A Personnel Record:

Name: John P Smith Date of Birth: 17 July 1959 (other data)

The ASN.1 description of a personnel record (the standard) might be:

PersonnelRecord ::= [APPLICATION 0] IMPLICIT SET {

Name, title [0] VisibleString, dateOfBirth [1] Date, (other types defined) }

Name ::= [APPLICATION 1] IMPLICIT SEQUENCE {

givenName VisibleString, initial VisibleString, familyName VisibleString }

The application maps the personnel data into the personnel record structure (ASN.1 data format), and then applies the Basic Encoding Rules (BER) to the ASN.1 data:

Personnel Record Length Contents 60 8185 Name Length Contents 61 10 VisibleString Length Contents 1A 04 "John" VisibleString Length Contents 1A 01 "P" VisibleString Length Contents 1A 05 "Smith" DateofBirth Length Contents A0 0A Date Length Contents 43 08 "19590717"

Finally, what gets transmitted (sent as application data to the layer below in the protocol stack)would be:

60 81 85 61 10 1A 04 ……………

Page 27: SNMP.ppt

8: Network Management 27

Firewalls

Two firewall types: packet filter application gateway

To prevent denial of service attacks: SYN flooding: attacker

establishes many bogus TCP connections. Attacked host allocates TCP buffers for bogus connections, none left for “real” connections.

To prevent illegal modification of internal data. e.g., attacker replaces

CIA’s homepage with something else

To prevent intruders from obtaining secret info.

isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others.

firewall

Page 28: SNMP.ppt

8: Network Management 28

Packet Filtering

Internal network is typically connected to Internet through a router.

Router manufacturer provides options for filtering packets, based on (for example): source IP address destination IP address TCP/UDP source and

destination port numbers

ICMP message type TCP SYN and ACK bits

Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or destination port = 23. All incoming and outgoing

UDP flows and telnet connections are blocked.

Example 2: Block inbound TCP segments with ACK bit=0. Prevents external clients

from making TCP connections with internal clients, but allows internal clients to connect to outside.

Page 29: SNMP.ppt

8: Network Management 29

Application gateways

Filters packets on application data as well as on IP/TCP/UDP fields.

Example: allow select internal users to telnet outside.

host-to-gatewaytelnet session

gateway-to-remote host telnet session

applicationgateway

router and filter

1. Require all telnet users to telnet through gateway.2. For authorized users, gateway sets up telnet

connection to dest host. Gateway relays data between 2 connections

3. Router filter blocks all telnet connections not originating from gateway.

Page 30: SNMP.ppt

8: Network Management 30

Limitations of firewalls and gateways

IP spoofing: router can’t know if data “really” comes from claimed source

If multiple app’s. need special treatment, each has own app. gateway.

Client software must know how to contact gateway. e.g., must set IP address

of proxy in Web browser

Filters often use all or nothing policy for UDP.

Tradeoff: degree of communication with outside world, level of security

Many highly protected sites still suffer from attacks.