Upload
networksguy
View
6.864
Download
2
Tags:
Embed Size (px)
Citation preview
8: Network Management 1
Chapter 8 – Network Management
networkdata linkphysical
application
transportnetworkdata linkphysical
As we have learned thus far, computer networks are complex systems of numerous hardware and software components. As such, they are subject to operational problems involving outage, malfunction, mis-configuration, poor performance, and other issues. In this final chapter, we will briefly look at the architecture, protocols and tools available to identify and solve these problems.
networkdata linkphysical
networkdata linkphysical
networkdata linkphysical
networkdata linkphysical
networkdata linkphysical
networkdata linkphysical
networkdata linkphysical
application
transportnetworkdata linkphysical
application
transportnetworkdata linkphysical
8: Network Management 2
Chapter 8: Network ManagementChapter goals: introduction to network management
motivation major components
Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for network management security and administration
presentation services: ASN.1 firewalls
8: Network Management 3
Network management motivation networks are complex autonomous systems
Consisting of 100s (or 1000s) of interacting hardware and software components
"Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost."
the network management infrastructure does NOT: dictate decision making policies address resource provisioning/service management
issues
8: Network Management 4
Motivation for network management – “stuff happens”
managed device
managed device
managed device
managed deviceperformance problems
device faultsconfiguration issues
security problems
software bugs
accounting/billing issues
numerous potential issues/problems to deal with…
For example:UTA ACS
Abilene Net
8: Network Management 5
Network management: 4 key goals Monitor…
see what’s happening host interfaces, traffic levels, service levels,
security, performance, routing table changes, etc.
Analyze… determine what it means
Reactively control… take action based on what is happening
Proactively manage… take action based on what current trends
tell you to will happen
8: Network Management 6
Infrastructure for network management
agent data
agent data
agent data
agent data
managed device
managed device
managed device
managed device
managingentity data
networknetworkmanagementmanagement
protocolprotocol
definitions:
managed devicesmanaged devices containmanaged objects whose data is gathered into a
Management InformationBase (MIB)
managing entitymanaging entity**
* AKA - Network Management * AKA - Network Management Station (NMS)Station (NMS)
8: Network Management 7
SNMP Protocol(Commands, Replies,Traps)
A typical Network Management Systems
NetworkManagement
Console
NetworkManagement
MIB
ManagedDevices
8: Network Management 8
Network Management standards
OSI CMIP Common
Management Information Protocol
designed 1980’s: the unifying net management standard
too slowly standardized
SNMP: Simple Network Management Protocol
Internet roots (SGMP… ISMF)
started simple deployed, adopted
rapidly growth: size, complexity currently: SNMP V3
(released April 1999) de facto network
management standard
8: Network Management 9
SNMP overview: 4 key parts of the Internet network management framework Management information base (MIB):
distributed information store of network management data (MIB objects)
Structure of Management Information (SMI): data definition language for MIB objects
SNMP protocol convey manager<->managed object info,
commands Security & administration capabilities
major addition in SNMPv3
8: Network Management 10
SMI: data definition language (RFC 2578)
Purpose: syntax, semantics of management data well-defined, unambiguous
base data types: straightforward, boring
OBJECT-TYPE data type, status,
semantics of managed object
MODULE-IDENTITY groups related objects
into MIB module
Basic Data Types
INTEGERInteger32
Unsigned32OCTET STRING
OBJECT IDENTIFIERIPaddressCounter32Counter64Guage32
Time TicksOpaque
8: Network Management 11
SNMP MIB
OBJECT-TYPE:
OBJECT-TYPE:OBJECT-TYPE:
objects specified via SMIOBJECT-TYPE construct
MIB module specified via SMI MODULE-IDENTITY
(100’s of standardized MIBs, more vendor-specific)
MODULE
8: Network Management 12
SMI: Object, module examples
OBJECT-TYPE: ipInDelivers MODULE-IDENTITY: ipMIB
ipInDelivers OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION “The total number of input datagrams successfully delivered to IP user- protocols (including ICMP)”::= { ip 9}
ipMIB MODULE-IDENTITY LAST-UPDATED “941101000Z” ORGANZATION “IETF SNPv2 Working Group” CONTACT-INFO “ Keith McCloghrie ……” DESCRIPTION “The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.” REVISION “019331000Z” ………::= {mib-2 48}Note: RFC 2011-IP MIB,
RFC 2012-TCP MIB, RFC 2013-UDP MIB, …
8: Network Management 13
SNMP Naming (OBJECT IDENTIFIER)
question: how to name every possible standard object (protocol, data, more..) in every possible network standard??
answer: ISO Object Identifier tree: hierarchical naming of all objects each branchpoint has name, number
1.3.6.1.2.1.7.1ISO
ISO-ident. Org.US DoDInternet
udpInDatagramsUDPMIB2management
8: Network Management 14
Check out www.alvestrand.no/harald/objectid/top.html
ISO Object Identifier Tree
8: Network Management 15
MIB example: UDP module
Object ID Name Type Comments
1.3.6.1.2.1.7.1 UDPInDatagrams Counter32 # UDP datagrams delivered
at this node
1.3.6.1.2.1.7.2 UDPNoPorts Counter32 # undeliverable datagrams,
no application at port
1.3.6.1.2.1.7.3 UDInErrors Counter32 # undeliverable datagrams,
all other reasons
1.3.6.1.2.1.7.4 UDPOutDatagrams Counter32 # UDP datagrams sent
1.3.6.1.2.1.7.5 udpTable SEQUENCE one entry for each port
UDP Entry in use by app, gives port #
and IP address
8: Network Management 16
SNMP protocol
Two ways to convey MIB info, commands:
agent data
Managed device
managingentity
response
agent data
Managed device
managingentity
trap msg.request
request/response mode trap mode
8: Network Management 17
SNMP protocol: message types
GetRequest (0)GetNextRequest (1)GetBulkRequest (5)
Mgr-to-Agent: “get me data”(instance,next in list, block)
Message type Function
InformRequest (6)
Mgr-to-Mgr: here’s MIB value
SetRequest (3) Mgr-to-Agent: set MIB value
Response (2) Agent-to-Mgr: value, response to Request
Trap (7) Agent-to-Mgr: inform managerof exceptional event
8: Network Management 18
SNMP protocol: message formats
Trapmessages
Get…,Set,
Inform,Responsemessages
8: Network Management 19
SNMP security and administration
encryption: DES-encrypt SNMP message authentication: compute, send
MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)
protection against playback: use nonce view-based access control
SNMP entity maintains database of access rights, policies for various users
database itself accessible as managed object!
MIC: Message Integrity Code (like a digital signature)
8: Network Management 20
The presentation problem
Q: does perfect memory-to-memory copy solve “the communication problem”?
A: not always!
problem: different data format, storage conventions (e.g. big-endian, little-endian)
struct { char code; int x; } test;test.x = 259;test.code=‘a’
a0000000100000011
a
0000001100000001
test.codetest.x
test.code
test.x
host 1 format host 2 format
8: Network Management 21
Solving the presentation problem
1. Translate local-host format to host-independent format
2. Transmit data in host-independent format3. Translate host-independent format to remote-host
format
8: Network Management 22
ASN.1: Abstract Syntax Notation 1
“The language of standards writers.”
ISO standard X.680 used extensively in Internet
defined data types, object constructors like SMI
BER: Basic Encoding Rules (ITU-T X.209, X.690)
specify how ASN.1-defined data objects to be transmitted
each transmitted object has Type, Length, Value (TLV) encoding
8: Network Management 23
ASN.1: Abstract Syntax Notation 1Encoding Rules BER - for management of the Internet,
exchange of electronic mail, control of telephone/computer interactions
DER - specialized form of BER that is used in security-conscious applications
CER – another specialized form of BER that is meant for use with huge messages
PER - recent version with more efficient algorithms that result in faster and more compact encodings; used in applications that are bandwidth or CPU starved, such as air traffic control and audio-visual telecommunications
8: Network Management 24
TLV Encoding
Idea: transmitted data is self-identifying T: data type, one of ASN.1-defined types L: length of data in bytes V: value of data, encoded according to
ASN.1 standard
1234569
BooleanIntegerBit StringOctet stringNullObject IdentifierReal
Tag Value Type
8: Network Management 25
TLV encoding: example
Value, 5 octets (chars)Length, 5 bytes
Type=4, octet string
Value, 259Length, 2 bytes
Type=2, integer
8: Network Management 26
TLV encoding - another example:
A Personnel Record:
Name: John P Smith Date of Birth: 17 July 1959 (other data)
The ASN.1 description of a personnel record (the standard) might be:
PersonnelRecord ::= [APPLICATION 0] IMPLICIT SET {
Name, title [0] VisibleString, dateOfBirth [1] Date, (other types defined) }
Name ::= [APPLICATION 1] IMPLICIT SEQUENCE {
givenName VisibleString, initial VisibleString, familyName VisibleString }
The application maps the personnel data into the personnel record structure (ASN.1 data format), and then applies the Basic Encoding Rules (BER) to the ASN.1 data:
Personnel Record Length Contents 60 8185 Name Length Contents 61 10 VisibleString Length Contents 1A 04 "John" VisibleString Length Contents 1A 01 "P" VisibleString Length Contents 1A 05 "Smith" DateofBirth Length Contents A0 0A Date Length Contents 43 08 "19590717"
Finally, what gets transmitted (sent as application data to the layer below in the protocol stack)would be:
60 81 85 61 10 1A 04 ……………
8: Network Management 27
Firewalls
Two firewall types: packet filter application gateway
To prevent denial of service attacks: SYN flooding: attacker
establishes many bogus TCP connections. Attacked host allocates TCP buffers for bogus connections, none left for “real” connections.
To prevent illegal modification of internal data. e.g., attacker replaces
CIA’s homepage with something else
To prevent intruders from obtaining secret info.
isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others.
firewall
8: Network Management 28
Packet Filtering
Internal network is typically connected to Internet through a router.
Router manufacturer provides options for filtering packets, based on (for example): source IP address destination IP address TCP/UDP source and
destination port numbers
ICMP message type TCP SYN and ACK bits
Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or destination port = 23. All incoming and outgoing
UDP flows and telnet connections are blocked.
Example 2: Block inbound TCP segments with ACK bit=0. Prevents external clients
from making TCP connections with internal clients, but allows internal clients to connect to outside.
8: Network Management 29
Application gateways
Filters packets on application data as well as on IP/TCP/UDP fields.
Example: allow select internal users to telnet outside.
host-to-gatewaytelnet session
gateway-to-remote host telnet session
applicationgateway
router and filter
1. Require all telnet users to telnet through gateway.2. For authorized users, gateway sets up telnet
connection to dest host. Gateway relays data between 2 connections
3. Router filter blocks all telnet connections not originating from gateway.
8: Network Management 30
Limitations of firewalls and gateways
IP spoofing: router can’t know if data “really” comes from claimed source
If multiple app’s. need special treatment, each has own app. gateway.
Client software must know how to contact gateway. e.g., must set IP address
of proxy in Web browser
Filters often use all or nothing policy for UDP.
Tradeoff: degree of communication with outside world, level of security
Many highly protected sites still suffer from attacks.