SlideShare a Scribd company logo
1 of 42
Download to read offline
Automatic topology detection in NAV
    NORDUnet 2011, Reykjavik
        Morten Brekkevold
In the beginning...

   A large, heterogenous campus network
   Norwegian University of Science and    2

    Technology, in Trondheim
   20.000 students
   Student villages connected
Basic NMS needs

   Status monitoring
   Alerts               3

   Traffic statistics
The real challenges

   Who's connected, where and when?
   Filtered outage alerts             4

   Network weather map
Abuse handling

   Given an IP address, date and time
   Where was the perpetrator            5

    connected?
   Block access!
The real challenges

   Who's connected, where and when?
   Filtered outage alerts             6

   Network weather map
Central node outage

   Router goes down
   100 switches ping-unreachable   7

   Want a single alert, not 100
The real challenges

   Who's connected, where and when?
   Filtered outage alerts             8

   Network weather map
Weather maps

   Layers 2 and 3
   Traffic load       9

   Automatic layout
What is needed?

   A good understanding of the network
    topology                              10
But?

   It's 1999!
   Proprietary discovery protocols   11

   LLDP not invented yet
   No 802.1X authentication
The birth of NAV

   Current commercial NMS-es tested
    and rejected                        12

   Let's write our own!
   Network Administration Visualized
    was born
   Made free in 2004, under a GPL
    license
Approach

   Collect SNMP data
     IETF MIBs                 13

     Vendor proprietary MIBs

   Process data
First task

   Port classification
     Uplink/downlink                       14

     Access port

   How?
     It's in the MAC address!
     Let's find the MAC addresses of all

      monitored nodes
IP / MAC mappings

   Routers know which IP and MAC
    addresses are associated        15

     ARP for IPv4
     ND for IPv6

   NAV has the IPs of all
    switches/routers
Interface MAC addresses

   Each interface on an Ethernet device
    has a unique MAC address               16

   These may appear in other switches'
    forwarding tables
Now what?

   We know the MAC addresses used
    by all monitored infrastructure      17

   Let's get the switches' forwarding
    tables!
Getting forward

   Infrastructure MAC found on port →
    Uplink/downlink port                 18

   Otherwise → Access port
Processing

   Multiple adjacency candidates per
    uplink/downlink must be pruned               19

   Trust data from any port with a single
    candidate                                X



                                  B

                                             Y



         R           A           C
                                             Z
Upshot

   Now we also know the switch port
    and MAC/IP addresses of every end-   20

    user
   Log them!
For added accuracy

   CDP (Cisco proprietary)
   LLDP (IEEE standard)      21
Cisco Discovery Protocol

   Reports adjacent device and port
    without processing                          22

   BUT:
     CDP frames are forwarded as regular
      ethernet frames through non-CDP
      switches
     Non-CDP switches become

      “invisible”


         A                B                 C
Link Layer Discovery
Protocol
   Improves on CDP
   Uses multicast destination addresses     23

    that a standards-conforming ethernet
    switch must not forward
       Should eliminate “invisible device
        problem”
Solved challenges

   A full layer 2 topology has been
    obtained                               24

   A complete log of end-user
    connectivity
   We can filter outage alerts based on
    topology
Filtering outage alert

 NAV
 server

                         25
What about layer 3?

   Collect routers' IP addresses and
    prefixes                            26

   Give complete overview of subnet
    allocations
Layer 3 links

   Discernable through:
     Prefix mask size                27

     Number of connected routers

        1  router → Elink (or LAN)
         2 routers → Link

         > 2 routers → Core
What about VLANs?

   IEEE 802.1Q
   Subsets of layer 2 topology   28

   Need to collect more data!
SNMP 802.1Q & 802.1D

   Get:
     Native VLAN of each switch port     29

     Tagged VLANs on trunk ports

     STP blocked VLANs on switch ports

   Map VLAN IDs to IP subnets
VLAN topology

   Each routed VLAN's topology can
    now be seen as                       30

     a subset of the layer 2 topology
     rooted at one or possibly more

      router ports
The larger picture

   Physical topology
        ARP/ND
        CAM
        CDP(/LLDP)
                                       31
   VLAN topology
        Trunks
        STP
Weather maps


               32
Geographical maps


                    33
What else?

   There's more to NAV than this
   There are always other ways to use   34

    this data
End-user detention

   NAV can help track abusers and
    restrict access on their switch port:      35

     by shutting it down
     or configuring a restricted quarantine

      VLAN
IPv6 deployment stats

   IP/MAC mappings include both IPv4
    and IPv6 addresses                    36

   Can be (and are being) used to
    generate IPv6 deployment statistics
IPv6 deployment graph

   Consolidated data of 31 HE institutions
   2 year period                             37
UNINETTs involvement

   Saw the potential of NAV as beneficial
    to entire HE community                   38

   Provided funding for development
    since 2001
   Took control of development in 2006
Deployment in Norway

   Success in Norwegian HE community
   36 universities and colleges run NAV   39

   Contributions from all major
    universities
Nordic collaboration?

   We hope to see a wider Nordic
    adoption of NAV                           40

   Collaboration on development efforts
    to make useful for all involved parties
   How?
In closing...

   http://metanav.uninett.no/
   morten.brekkevold@uninett.no   41
MIB references

   IP related MIBs
     IP-MIB (RFC 4293)
     IPv6-MIB (deprecated)                  42


     CISCO-IETF-IP-MIB

   Interface details
       IF-MIB (RFCs 1573, 2863, 1229)
   Switch forwarding tables
       BRIDGE-MIB (RFC 4188)
   VLAN MIBs
     Q-BRIDGE-MIB (RFC 4363)
     Community indexed BRIDGE-MIB (Cisco)

     Other proprietary MIBs

More Related Content

What's hot

Iaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd Iaetsd
 
OTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOMEOTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOMEnetworkershome
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Maximilan Wilhelm
 
MPLS SDN 2016 - Microloop avoidance with segment routing
MPLS SDN 2016 - Microloop avoidance with segment routingMPLS SDN 2016 - Microloop avoidance with segment routing
MPLS SDN 2016 - Microloop avoidance with segment routingStephane Litkowski
 
RINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFiRINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFiARCFIRE ICT
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRouteBruno Decraene
 
Fabric Path PPT by NETWORKERS HOME
Fabric Path PPT by NETWORKERS HOMEFabric Path PPT by NETWORKERS HOME
Fabric Path PPT by NETWORKERS HOMEnetworkershome
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.igede tirtanata
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 

What's hot (20)

SS7 & SIGTRAN
SS7 & SIGTRANSS7 & SIGTRAN
SS7 & SIGTRAN
 
Vlans
VlansVlans
Vlans
 
Lin protocol
Lin protocolLin protocol
Lin protocol
 
Iaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilog
 
OTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOMEOTV PPT by NETWORKERS HOME
OTV PPT by NETWORKERS HOME
 
Wan
WanWan
Wan
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
 
MPLS SDN 2016 - Microloop avoidance with segment routing
MPLS SDN 2016 - Microloop avoidance with segment routingMPLS SDN 2016 - Microloop avoidance with segment routing
MPLS SDN 2016 - Microloop avoidance with segment routing
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Iot rpl
Iot rplIot rpl
Iot rpl
 
Luxbg fringe
Luxbg fringeLuxbg fringe
Luxbg fringe
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Batch 25(a)
Batch 25(a)Batch 25(a)
Batch 25(a)
 
Introduction to PPP
Introduction to PPPIntroduction to PPP
Introduction to PPP
 
RINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFiRINA Distributed Mobility Management over WiFi
RINA Distributed Mobility Management over WiFi
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
 
Fabric Path PPT by NETWORKERS HOME
Fabric Path PPT by NETWORKERS HOMEFabric Path PPT by NETWORKERS HOME
Fabric Path PPT by NETWORKERS HOME
 
Cisco discovery drs ent module 10 - v.4 in english.
Cisco discovery   drs ent module 10 - v.4 in english.Cisco discovery   drs ent module 10 - v.4 in english.
Cisco discovery drs ent module 10 - v.4 in english.
 
Chapter2 ppp
Chapter2   pppChapter2   ppp
Chapter2 ppp
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 

Viewers also liked

Gamecock Campaing For Excellence
Gamecock Campaing For ExcellenceGamecock Campaing For Excellence
Gamecock Campaing For ExcellenceJSUGamecocks
 
Chapter 8 - Groups at Work
Chapter 8 - Groups at WorkChapter 8 - Groups at Work
Chapter 8 - Groups at Workgrayea
 
Garfield amigos
Garfield amigosGarfield amigos
Garfield amigoswpsly
 
Eye Catching Photos
Eye Catching PhotosEye Catching Photos
Eye Catching Photosguest91186fa
 
Iain Forsyth and Jane Pollard\'s Press Pack
Iain Forsyth and Jane Pollard\'s Press PackIain Forsyth and Jane Pollard\'s Press Pack
Iain Forsyth and Jane Pollard\'s Press Packjanepollard
 
Iain Forsyth & Jane Pollard\'s CV
Iain Forsyth & Jane Pollard\'s CVIain Forsyth & Jane Pollard\'s CV
Iain Forsyth & Jane Pollard\'s CVjanepollard
 
Distribuert versjonskontroll med Mercurial
Distribuert versjonskontroll med MercurialDistribuert versjonskontroll med Mercurial
Distribuert versjonskontroll med MercurialMorten Brekkevold
 

Viewers also liked (13)

Gamecock Campaing For Excellence
Gamecock Campaing For ExcellenceGamecock Campaing For Excellence
Gamecock Campaing For Excellence
 
Chapter 8 - Groups at Work
Chapter 8 - Groups at WorkChapter 8 - Groups at Work
Chapter 8 - Groups at Work
 
Offer Letter
Offer LetterOffer Letter
Offer Letter
 
Garfield amigos
Garfield amigosGarfield amigos
Garfield amigos
 
Eye Catching Photos
Eye Catching PhotosEye Catching Photos
Eye Catching Photos
 
The campus NMS tool NAV
The campus NMS tool NAVThe campus NMS tool NAV
The campus NMS tool NAV
 
Iain Forsyth and Jane Pollard\'s Press Pack
Iain Forsyth and Jane Pollard\'s Press PackIain Forsyth and Jane Pollard\'s Press Pack
Iain Forsyth and Jane Pollard\'s Press Pack
 
Iain Forsyth & Jane Pollard\'s CV
Iain Forsyth & Jane Pollard\'s CVIain Forsyth & Jane Pollard\'s CV
Iain Forsyth & Jane Pollard\'s CV
 
Gender Roles
Gender RolesGender Roles
Gender Roles
 
Distribuert versjonskontroll med Mercurial
Distribuert versjonskontroll med MercurialDistribuert versjonskontroll med Mercurial
Distribuert versjonskontroll med Mercurial
 
Projecten ARA
Projecten ARAProjecten ARA
Projecten ARA
 
NAV 3.6 nyheter
NAV 3.6 nyheterNAV 3.6 nyheter
NAV 3.6 nyheter
 
NAV Alert Profiles
NAV Alert ProfilesNAV Alert Profiles
NAV Alert Profiles
 

Similar to Automatic topology detection in NAV

Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsAndriy Berestovskyy
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo Network Technologies
 
SDN: an introduction
SDN: an introductionSDN: an introduction
SDN: an introductionLuca Profico
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Tendencias de Uso y Diseño de Redes de Interconexión en Computadores Paralel...
Tendencias de Uso y Diseño de Redes de Interconexión  en Computadores Paralel...Tendencias de Uso y Diseño de Redes de Interconexión  en Computadores Paralel...
Tendencias de Uso y Diseño de Redes de Interconexión en Computadores Paralel...Facultad de Informática UCM
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackMaximilan Wilhelm
 
Software defined network
Software defined networkSoftware defined network
Software defined networkBogamoga1
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2Tutun Juhana
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2Juli Yaret
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
Basic networking course
Basic networking courseBasic networking course
Basic networking courseLuxoftTraining
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxShehanMarasinghe1
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPROIDEA
 

Similar to Automatic topology detection in NAV (20)

Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
SDN: an introduction
SDN: an introductionSDN: an introduction
SDN: an introduction
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Tendencias de Uso y Diseño de Redes de Interconexión en Computadores Paralel...
Tendencias de Uso y Diseño de Redes de Interconexión  en Computadores Paralel...Tendencias de Uso y Diseño de Redes de Interconexión  en Computadores Paralel...
Tendencias de Uso y Diseño de Redes de Interconexión en Computadores Paralel...
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
Et4045-3-attacks-2
Et4045-3-attacks-2Et4045-3-attacks-2
Et4045-3-attacks-2
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
 
Day-3 PowerPoint
Day-3 PowerPointDay-3 PowerPoint
Day-3 PowerPoint
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Basic networking course
Basic networking courseBasic networking course
Basic networking course
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
PLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDNPLNOG 13: Nicolai van der Smagt: SDN
PLNOG 13: Nicolai van der Smagt: SDN
 
Opencontrail network virtualization
Opencontrail network virtualizationOpencontrail network virtualization
Opencontrail network virtualization
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Automatic topology detection in NAV

  • 1. Automatic topology detection in NAV NORDUnet 2011, Reykjavik Morten Brekkevold
  • 2. In the beginning...  A large, heterogenous campus network  Norwegian University of Science and 2 Technology, in Trondheim  20.000 students  Student villages connected
  • 3. Basic NMS needs  Status monitoring  Alerts 3  Traffic statistics
  • 4. The real challenges  Who's connected, where and when?  Filtered outage alerts 4  Network weather map
  • 5. Abuse handling  Given an IP address, date and time  Where was the perpetrator 5 connected?  Block access!
  • 6. The real challenges  Who's connected, where and when?  Filtered outage alerts 6  Network weather map
  • 7. Central node outage  Router goes down  100 switches ping-unreachable 7  Want a single alert, not 100
  • 8. The real challenges  Who's connected, where and when?  Filtered outage alerts 8  Network weather map
  • 9. Weather maps  Layers 2 and 3  Traffic load 9  Automatic layout
  • 10. What is needed?  A good understanding of the network topology 10
  • 11. But?  It's 1999!  Proprietary discovery protocols 11  LLDP not invented yet  No 802.1X authentication
  • 12. The birth of NAV  Current commercial NMS-es tested and rejected 12  Let's write our own!  Network Administration Visualized was born  Made free in 2004, under a GPL license
  • 13. Approach  Collect SNMP data  IETF MIBs 13  Vendor proprietary MIBs  Process data
  • 14. First task  Port classification  Uplink/downlink 14  Access port  How?  It's in the MAC address!  Let's find the MAC addresses of all monitored nodes
  • 15. IP / MAC mappings  Routers know which IP and MAC addresses are associated 15  ARP for IPv4  ND for IPv6  NAV has the IPs of all switches/routers
  • 16. Interface MAC addresses  Each interface on an Ethernet device has a unique MAC address 16  These may appear in other switches' forwarding tables
  • 17. Now what?  We know the MAC addresses used by all monitored infrastructure 17  Let's get the switches' forwarding tables!
  • 18. Getting forward  Infrastructure MAC found on port → Uplink/downlink port 18  Otherwise → Access port
  • 19. Processing  Multiple adjacency candidates per uplink/downlink must be pruned 19  Trust data from any port with a single candidate X B Y R A C Z
  • 20. Upshot  Now we also know the switch port and MAC/IP addresses of every end- 20 user  Log them!
  • 21. For added accuracy  CDP (Cisco proprietary)  LLDP (IEEE standard) 21
  • 22. Cisco Discovery Protocol  Reports adjacent device and port without processing 22  BUT:  CDP frames are forwarded as regular ethernet frames through non-CDP switches  Non-CDP switches become “invisible” A B C
  • 23. Link Layer Discovery Protocol  Improves on CDP  Uses multicast destination addresses 23 that a standards-conforming ethernet switch must not forward  Should eliminate “invisible device problem”
  • 24. Solved challenges  A full layer 2 topology has been obtained 24  A complete log of end-user connectivity  We can filter outage alerts based on topology
  • 25. Filtering outage alert NAV server 25
  • 26. What about layer 3?  Collect routers' IP addresses and prefixes 26  Give complete overview of subnet allocations
  • 27. Layer 3 links  Discernable through:  Prefix mask size 27  Number of connected routers 1 router → Elink (or LAN)  2 routers → Link  > 2 routers → Core
  • 28. What about VLANs?  IEEE 802.1Q  Subsets of layer 2 topology 28  Need to collect more data!
  • 29. SNMP 802.1Q & 802.1D  Get:  Native VLAN of each switch port 29  Tagged VLANs on trunk ports  STP blocked VLANs on switch ports  Map VLAN IDs to IP subnets
  • 30. VLAN topology  Each routed VLAN's topology can now be seen as 30  a subset of the layer 2 topology  rooted at one or possibly more router ports
  • 31. The larger picture  Physical topology  ARP/ND  CAM  CDP(/LLDP) 31  VLAN topology  Trunks  STP
  • 34. What else?  There's more to NAV than this  There are always other ways to use 34 this data
  • 35. End-user detention  NAV can help track abusers and restrict access on their switch port: 35  by shutting it down  or configuring a restricted quarantine VLAN
  • 36. IPv6 deployment stats  IP/MAC mappings include both IPv4 and IPv6 addresses 36  Can be (and are being) used to generate IPv6 deployment statistics
  • 37. IPv6 deployment graph  Consolidated data of 31 HE institutions  2 year period 37
  • 38. UNINETTs involvement  Saw the potential of NAV as beneficial to entire HE community 38  Provided funding for development since 2001  Took control of development in 2006
  • 39. Deployment in Norway  Success in Norwegian HE community  36 universities and colleges run NAV 39  Contributions from all major universities
  • 40. Nordic collaboration?  We hope to see a wider Nordic adoption of NAV 40  Collaboration on development efforts to make useful for all involved parties  How?
  • 41. In closing...  http://metanav.uninett.no/  morten.brekkevold@uninett.no 41
  • 42. MIB references  IP related MIBs  IP-MIB (RFC 4293)  IPv6-MIB (deprecated) 42  CISCO-IETF-IP-MIB  Interface details  IF-MIB (RFCs 1573, 2863, 1229)  Switch forwarding tables  BRIDGE-MIB (RFC 4188)  VLAN MIBs  Q-BRIDGE-MIB (RFC 4363)  Community indexed BRIDGE-MIB (Cisco)  Other proprietary MIBs