Module 6 – Introduction to Network Administration


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Module 6 – Introduction to Network Administration

  1. 1. Cisco Systems CCNA Version 3 Semester 4 Module 6
  2. 2. <ul><li>OUTLINE </li></ul><ul><li>6.1 Workstations and Servers </li></ul><ul><ul><li>6.1.1 Workstations </li></ul></ul><ul><ul><li>6.1.2 Servers </li></ul></ul><ul><ul><li>6.1.3 Client-server relationship </li></ul></ul><ul><ul><li>6.1.4 Introduction to NOS </li></ul></ul><ul><ul><li>6.1.5 Microsoft NT, 2000, and .NET </li></ul></ul><ul><ul><li>6.1.6 UNIX, Sun, HP, and LINUX </li></ul></ul><ul><ul><li>6.1.7 Apple </li></ul></ul><ul><ul><li>6.1.8 Concept of service on servers </li></ul></ul><ul><li>6.2 Network Management </li></ul><ul><ul><li>6.2.1 Introduction to network management </li></ul></ul><ul><ul><li>6.2.2 OSI and network management model </li></ul></ul><ul><ul><li>6.2.3 SNMP and CMIP standards </li></ul></ul><ul><ul><li>6.2.4 SNMP operation </li></ul></ul><ul><ul><li>6.2.5 Structure of management information and MIBs </li></ul></ul><ul><ul><li>6.2.6 SNMP protocol </li></ul></ul><ul><ul><li>6.2.7 Configuring SNMP </li></ul></ul><ul><ul><li>6.2.8 RMON </li></ul></ul><ul><ul><li>6.2.9 Syslog </li></ul></ul>
  3. 4. 6.1.1 Workstations <ul><li>Intercepts user data and application commands </li></ul><ul><li>Directs the command to either </li></ul><ul><ul><li>the local operating system or </li></ul></ul><ul><ul><li>the network interface card (NIC) </li></ul></ul><ul><li>Delivers transmissions from the network to the application </li></ul>UNIX or Linux can also serve as a desktop operating system but are usually found on high-end computers Work Station Docking Station
  4. 5. 6.1.1 Workstations <ul><li>A diskless workstation is a special computer that runs on a network. </li></ul><ul><li>It has no disk drives but otherwise is a normal computer. </li></ul><ul><li>Because they have no disk drives, it is not possible to upload data from the workstation or download anything to it. </li></ul><ul><li>A diskless workstation cannot pass a virus onto the network, nor can it be used to take data from the network by copying this information to a disk drive. </li></ul><ul><li>For this reason, such workstations are used in networks where security is paramount. </li></ul>
  5. 6. 6.1.2 Servers Some Windows operating systems may be installed on both workstations and servers. The NT/2000/XP versions of Windows software provide network server capability. <ul><li>Hypertext Transfer Protocol (HTTP) </li></ul><ul><li>File Transfer Protocol (FTP) </li></ul><ul><li>Domain Name System (DNS) </li></ul><ul><li>Simple Mail Transfer Protocol (SMTP) </li></ul><ul><li>Post Office Protocol 3 (POP3) </li></ul><ul><li>Internet Messaging Access Protocol (IMAP) </li></ul><ul><li>File sharing protocols include Sun Microsystems Network File System (NFS) </li></ul><ul><li>Microsoft Server Message Block (SMB).   </li></ul><ul><li>Print services </li></ul><ul><li>Dynamic Host Configuration Protocol (DHCP) </li></ul><ul><li>Firewall: Proxy or Network Address Translation (NAT)  </li></ul>
  6. 7. 6.1.2 Servers <ul><li>Servers are typically larger systems than workstations </li></ul><ul><li>Extra memory for multiple tasks that are active or resident in memory at the same time. </li></ul><ul><li>Extra disk space for shared files and as an extension to the internal memory on the system. </li></ul><ul><li>Extra expansion slots to connect shared devices, such as printers and multiple network interfaces. </li></ul>
  7. 8. 6.1.2 Servers <ul><li>Multiprocessor systems are capable of executing multiple tasks in parallel by assigning each task to a different processor. </li></ul><ul><li>Must function effectively under heavy loads. </li></ul><ul><li>Redundancy is a feature of fault tolerant systems that are designed to survive failures and can be repaired without interruption while the systems are up and running. </li></ul>
  8. 9. 6.1.2 Servers One Very Busy Spigot
  9. 10. 6.1.2 Servers
  10. 11. 6.1.2 Servers
  11. 12. 6.1.2 Servers
  12. 13. <ul><li>One server running a NOS may work well when serving only a handful of clients. </li></ul><ul><li>Most organizations use several servers. </li></ul><ul><li>Typically </li></ul><ul><ul><li>one server for e-mail </li></ul></ul><ul><ul><li>one server for file sharing </li></ul></ul><ul><ul><li>one for FTP. </li></ul></ul>6.1.2 Servers
  13. 14. The concentration of network resources makes the data easier to back up and maintain. 6.1.2 Servers
  14. 15. 6.1.3 Client-server relationship From a NETWORK point of view, any computer running TCP/IP (workstation or a server) is considered a host. <ul><li>In a typical file server environment, the client would retrieve large portions of the database files to process the files locally. </li></ul><ul><li>With client-server computing, the large database is stored, and the processing takes place on the server. </li></ul><ul><li>A relatively small amount of data or results might be passed across the network. </li></ul>
  15. 16. 6.1.3 Client-server relationship <ul><li>The workstation and server normally would be connected to the LAN by a hub or switch. </li></ul>
  16. 17. 6.1.4 Introduction to NOS <ul><li>Performance A NOS must perform well at reading and writing files across the network between clients and servers. It must be able to maintain fast performance under heavy loads, when many clients are making requests. Consistent performance under heavy demand is an important standard for a NOS. </li></ul><ul><li>Management and monitoring The management interface on the NOS server provides the tools for server monitoring, client administration, file, print, and disk storage management. The management interface provides tools for the installation of new services and the configuration of those services. Additionally, servers require regular monitoring and adjustment. </li></ul>6.1.4 Introduction to NOS
  17. 18. 6.1.4 Introduction to NOS <ul><li>Security A NOS must protect the shared resources under its control. Security includes authenticating user access to services to prevent unauthorized access to the network resources. Security also performs encryption to protect information as it travels between clients and servers. </li></ul><ul><li>Scalability Scalability is the ability of a NOS to grow without degradation in performance. The NOS must be capable of sustaining performance as new users join the network and new servers are added to support them. </li></ul><ul><li>Robustness/fault tolerance A measure of robustness is the ability to deliver services consistently under heavy load and to sustain its services if components or processes fail. Using redundant disk devices and balancing the workload across multiple servers can improve NOS robustness. </li></ul>6.1.4 Introduction to NOS
  18. 19. Windows 2000 Professional is not designed to be a full NOS. It does not provide a domain controller, DNS server, DHCP server, or render any of the services that can be deployed with Windows 2000 Server. <ul><li>Windows 2000 Server adds the normal server-specific functions. </li></ul><ul><li>It provides integrated connectivity with Novell NetWare, UNIX, and AppleTalk systems and can also be configured as a communications server. </li></ul><ul><li>Windows .NET Server is built on the Windows 2000 Server kernel to run enterprise-level web and FTP sites. </li></ul><ul><li>Equivalent to Linux and UNIX server operating systems. </li></ul>6.1.5 Microsoft NT, 2000, and .NET
  19. 20. <ul><li>UNIX is the name of a group of operating systems that trace their origins back to 1969 at Bell Labs. </li></ul><ul><li>Since its inception, UNIX was designed to support multiple users and multitasking. </li></ul><ul><li>It was originally sold to run powerful network servers, not desktop computers. </li></ul><ul><li>Solaris is currently the most widely used version of UNIX in the world for large networks and Internet websites. </li></ul>6.1.6 UNIX, Sun, HP, and LINUX
  20. 21. 6.1.6 UNIX, Sun, HP, and LINUX <ul><li>Linux is one of the most powerful and reliable operating systems in the world today. </li></ul><ul><li>Linux has already made inroads as a platform for power users and in the enterprise server arena. </li></ul><ul><li>Linux is less often deployed as a corporate desktop operating system. </li></ul><ul><li>Recent distributions of Linux have networking components built in for connecting to a LAN, establishing a dialup connection to the Internet, or other remote network. </li></ul><ul><li>TCP/IP is integrated into the Linux kernel instead of being implemented as a separate subsystem. </li></ul>
  21. 22. 6.1.6 UNIX, Sun, HP, and LINUX <ul><li>In 1991, a Finnish student named Linus Torvalds began work on an operating system for an Intel 80386-based computer. </li></ul>
  22. 23. Torvald's work led to a world-wide collaborative effort to develop Linux, an open source operating system that looks and feels like UNIX. 6.1.6 UNIX, Sun, HP, and LINUX
  23. 24. <ul><li>Some advantages of Linux as a desktop operating system and network client: </li></ul><ul><li>It is a true 32-bit operating system. </li></ul><ul><li>It supports preemptive multitasking and virtual memory. </li></ul><ul><li>The code is open source and thus available for anyone to enhance and improve. </li></ul>6.1.6 UNIX, Sun, HP, and LINUX
  24. 25. <ul><li>Mac OS X provides a new feature that allows for AppleTalk and Windows connectivity. </li></ul><ul><li>The Mac OS X core operating system is UNIX-based. </li></ul><ul><li>The Mac GUI resembles a cross between Windows XP and Linux X-windows GUI. </li></ul>6.1.7 Apple
  25. 26. 6.1.8 Concept of service on servers <ul><li>Remote management allows administrators to configure networked systems that are miles apart. </li></ul><ul><li>Network processes are referred to as </li></ul><ul><ul><li>services in Windows 2000 </li></ul></ul><ul><ul><li>daemons in UNIX and Linux. </li></ul></ul>
  26. 27. 6.1.8 Concept of service on servers <ul><li>The two most common web server software packages are </li></ul><ul><li>Microsoft Internet Information Services (IIS) – Windows platform </li></ul><ul><li>Apache Web Server – Unix and Linux platform </li></ul>
  27. 28. 6.1.8 Concept of service on servers <ul><li>Most popular network processes rely on the TCP/IP suite of protocols. </li></ul><ul><li>TCP/IP are vulnerable to unauthorized scans and malicious attacks. </li></ul><ul><ul><li>Denial of service (DoS) attacks </li></ul></ul><ul><ul><li>computer viruses </li></ul></ul><ul><ul><li>fast-spreading Internet worms </li></ul></ul><ul><li>Recent versions of popular NOSs restrict the default network services. </li></ul>
  28. 29. <ul><li>OUTLINE </li></ul><ul><li>6.1 Workstations and Servers </li></ul><ul><ul><li>6.1.1 Workstations </li></ul></ul><ul><ul><li>6.1.2 Servers </li></ul></ul><ul><ul><li>6.1.3 Client-server relationship </li></ul></ul><ul><ul><li>6.1.4 Introduction to NOS </li></ul></ul><ul><ul><li>6.1.5 Microsoft NT, 2000, and .NET </li></ul></ul><ul><ul><li>6.1.6 UNIX, Sun, HP, and LINUX </li></ul></ul><ul><ul><li>6.1.7 Apple </li></ul></ul><ul><ul><li>6.1.8 Concept of service on servers </li></ul></ul><ul><li>6.2 Network Management </li></ul><ul><ul><li>6.2.1 Introduction to network management </li></ul></ul><ul><ul><li>6.2.2 OSI and network management model </li></ul></ul><ul><ul><li>6.2.3 SNMP and CMIP standards </li></ul></ul><ul><ul><li>6.2.4 SNMP operation </li></ul></ul><ul><ul><li>6.2.5 Structure of management information and MIBs </li></ul></ul><ul><ul><li>6.2.6 SNMP protocol </li></ul></ul><ul><ul><li>6.2.7 Configuring SNMP </li></ul></ul><ul><ul><li>6.2.8 RMON </li></ul></ul><ul><ul><li>6.2.9 Syslog </li></ul></ul>
  29. 30. 6.2.1 Introduction to network management
  30. 31. 6.2.1 Introduction to network management
  31. 32. 6.2.1 Introduction to network management
  32. 33. 6.2.1 Introduction to network management
  33. 34. 6.2.2 OSI and network management model OSI standard.
  34. 35. 6.2.2 OSI and network management model
  35. 36. 6.2.2 OSI and network management model
  36. 37. 6.2.2 OSI and network management model
  37. 38. 6.2.2 OSI and network management model
  38. 39. 6.2.3 SNMP and CMIP standards <ul><li>Simple Network Management Protocol – IETF community </li></ul><ul><li>Common Management Information Protocol – Telecommunications community </li></ul>
  39. 40. Simple Network Management Protocol (SNMP) - application layer protocol that facilitates the exchange of management information between network devices. 6.2.4 SNMP operation Eg. Packets per second sent on an interface Eg. Number of open TCP connections Eg. Color of the technician’s shirt. SNMP uses UDP over ports 161 and 162.
  40. 41. 6.2.4 SNMP operation <ul><li>Number and state of its virtual circuits </li></ul><ul><li>Number of certain kinds of error messages received </li></ul><ul><li>Number of bytes and packets in and out of the device </li></ul><ul><li>Maximum output queue length, for routers and other internetworking devices </li></ul><ul><li>Broadcast messages sent and received </li></ul><ul><li>Network interfaces going down and coming up </li></ul><ul><li>Get – Enables the management station to retrieve the value of MIB objects from the agent. </li></ul><ul><li>Set – Enables the management station to set the value of MIB objects at the agent. </li></ul><ul><li>Trap – Enables the agent to notify the management station of significant events. </li></ul>
  41. 42. 6.2.4 SNMP operation SNMP Proprietary The RMON probe gathers management information locally, The network manager periodically retrieves a summary of this data.
  42. 43. 6.2.4 SNMP operation <ul><li>The NMS is an ordinary workstation.     </li></ul><ul><li>Large RAM, to hold all the co-resident management applications. </li></ul><ul><li>Typical network protocol stack, such as TCP/IP. </li></ul>
  43. 44. AdventNet
  44. 45. MG-SOFT MIB Browser
  45. 46. NetworkView Demo US$59.
  46. 47. Ethereal
  47. 48. 6.2.4 SNMP operation
  48. 49. 6.2.4 SNMP operation Aspen Systems
  49. 50. 6.2.4 SNMP operation <ul><li>Linux SNMP Network Management Tools </li></ul><ul><li>This page assumes that you already have a working knowledge of the basic tools -- ping, netstat, traceroute, nslookup, dig, tcpdump, /proc/net, ipfwadmin, tcpwrapper, maskd and are looking for graphical, distributed tools. </li></ul><ul><li>SNMP FAQ Frequently asked questions about SNMP. </li></ul><ul><li>Linux CMU SNMP Project -- provides the standard bilingual SNMPv1/v2 agent, incl USEC support, as well as command line tools; includes MIB-2 (RFC 1213) Identification MIB (RFC 1414) Host Resources MIB (RFC 1514) and the TUBS Linux MIB, as well as pointers to the Tcl and Perl snmp libs. </li></ul><ul><li>SUNY Bufallo Network Management Archives -- the most complete archive around, including tools, MIB compilers, documentation. Not Linux specific. </li></ul><ul><li>The Simple Web site maintains info on internet management. </li></ul><ul><li>Simple Times A periodical for Internet network management. </li></ul>
  50. 51. 6.2.4 SNMP operation
  51. 52. 6.2.4 SNMP operation Central Manager sends out queries to all agents, no matter where they are located.
  52. 53. 6.2.4 SNMP operation <ul><li>In a distributed network NMS can act in a client-server architecture. </li></ul><ul><li>The clients send their data to the master server for centralized storage </li></ul>
  53. 54. 6.2.4 SNMP operation <ul><li>Distributed NMSs have equal responsibility, with their own manager databases. </li></ul><ul><li>Management information is distributed over the peer NMSs. </li></ul>
  54. 55. 6.2.5 Structure of management information and MIBs A MIB is used to store the structured information representing network elements and their attributes. All vendors are encouraged to make their MIB definitions known.
  55. 56. 6.2.5 Structure of management information and MIBs <ul><li>The structure itself is defined in the Structure of Management Information (SMI) </li></ul><ul><ul><li>the data types that can be used to store an object, </li></ul></ul><ul><ul><li>how those objects are named, and </li></ul></ul><ul><ul><li>how they are encoded for transmission over a network. </li></ul></ul>
  56. 57. 6.2.5 Structure of management information and MIBs Page 1 of 46 <ul><li>A unique object identifier, which is a number in dot notation, identifies each managed object </li></ul><ul><li>Each object identifier is described using abstract syntax notation (ASN.1). </li></ul>
  57. 58. 6.2.5 Structure of management information and MIBs <ul><li>A unique object identifier, which is a number in dot notation, identifies each managed object </li></ul><ul><li>Each object identifier is described using abstract syntax notation (ASN.1). </li></ul>Win2000Pro
  58. 59. 6.2.5 Structure of management information and MIBs Formatted Raw Win2000Pro
  59. 60. 6.2.5 Structure of management information and MIBs Page 46 of 46
  60. 61. 6.2.5 Structure of management information and MIBs IEEE reference
  61. 62. 6.2.5 Structure of management information and MIBs
  62. 63. 6.2.5 Structure of management information and MIBs Once an assigned enterprise value has been given, the vendor is responsible for creating and maintaining sub-trees.
  63. 64. 6.2.6 SNMP protocol The agent is a software function embedded in most networked devices, such as routers, switches, managed hubs, printers, and servers.
  64. 65. 6.2.6 SNMP protocol <ul><li>Interaction between the manager and the agent is facilitated by (SNMP). </li></ul><ul><li>The term simple comes from the restricted number of message types that are part of the initial protocol specification. </li></ul>The initial protocol specification is referred to as SNMPv1
  65. 66. 6.2.6 SNMP protocol SNMPv2c addressed limitations in SNMPv1 introduced the GetBulkRequest message type and the addition of 64-bit counters to the MIB. NMS has the ability to issue changes of a value in the managed device. This allows an administrator to configure a managed device using SNMP.
  66. 67. 6.2.6 SNMP protocol <ul><li>The interaction between the manager and the managed device introduces traffic to the network. </li></ul><ul><li>Aggressive monitoring strategies can negatively affect network performance. </li></ul><ul><li>Bandwidth utilizations will go up, which may be an issue for WAN environments. </li></ul><ul><li>Moreover, monitoring has a performance impact on the devices themselves being monitored, since they are required to process the manager requests. </li></ul><ul><li>This processing should not take precedence over production services. </li></ul><ul><li>A general rule is that a minimum amount of information should be polled as infrequently as possible. </li></ul><ul><li>Determine which devices and links are most critical and what type of data is required. </li></ul>
  67. 68. 6.2.6 SNMP protocol Each SNMP message contains a clear text string, called a community string. The community string is used like a password to restrict access to managed devices.
  68. 69. 6.2.6 SNMP protocol An example of an SNMPv2c message.
  69. 70. 6.2.6 SNMP protocol <ul><li>An example of an SNMPv3 message. </li></ul><ul><li>(SNMPv3 addresses clear text security concerns.) </li></ul>
  70. 71. 6.2.6 SNMP protocol
  71. 72. 6.2.7 Configuring SNMP ro – (Optional) Specifies read-only access. Authorized management stations are only able to retrieve MIB objects. rw – (Optional) Specifies read-write access. Authorized management stations are able to both retrieve and modify MIB objects
  72. 73. 6.2.8 RMON
  73. 74. 6.2.8 RMON <ul><li>RMON was developed to overcome limitations in the capabilities of SNMP. SNMP can store only limited amounts of information (counters for overall traffic, number of errors, etc.), and, as it is a polled system, network loading is high. </li></ul><ul><li>RMON on the other hand, provides much more detailed information and offers a simplified manner of data collection. </li></ul><ul><li>RMON makes use of a client (like a Network Management Console, a Protocol Analyzer, or a Network Analyzer like the new Fluke Networks OptiView). The client then gathers the statistics from either one or more agents. These agents can be stand-alone RMON probes (located in strategic spots in the network) and/or embedded RMON agents in routers and switches. </li></ul><ul><li>In total RMON specifies 10 services called RMON Groups. Not all devices have to support all services as some of the RMON groups require extensive overhead (memory and processor power). Most stand-alone RMON probes will typically support all services, but embedded RMON may be limited to only a few groups. </li></ul><ul><li>The RMON client communicates directly to the RMON agent. RMON1 only collects data at the MAC level, so you will only get information on the captured packets by decoding them with a Protocol Analyzer. A switch will limit your view of the network. </li></ul><ul><li>RMON2 has been developed to provide data on higher level protocols such as IP and IPX, and up through the stack to the applications layer. </li></ul><ul><li>RMON2 provides full information on which protocols are being used on the network and the mix between them, standard RMON host and matrix information also for the network an applications layers, and a customizable history function that can be used for base-lining. </li></ul>
  74. 75. 6.2.8 RMON RMON RMON2
  75. 76. 6.2.8 RMON <ul><li>Statistics (OID:  This group provides basic statistics for the given network interface type on the probe. For example, it will collect a breakdown of packet sizes on the segment over time. </li></ul><ul><li>History (OID:  The history group is responsible for storing periodic samples of the segment for later analysis. </li></ul><ul><li>Alarm (OID:  Using preconfigured thresholds on the probe, this group can generate alarm events when a parameter surpasses a threshold. </li></ul><ul><li>Hosts (OID:  This group keeps track of the MAC addresses of the devices that are communicating on this segment. </li></ul><ul><li>HostTopN (OID:  This group is used to store data regarding the top &quot;talkers&quot; based on some criteria provided by the management station. </li></ul><ul><li>Matrix (OID:  This group holds a table that defines pairs of devices who are talking to one another. </li></ul><ul><li>Filter (OID:  This group allows a Network Manager to define one or more filters, based on a value and offset, for packets that want to be captured. The definition of that filter(s) exists in this group. </li></ul><ul><li>Capture Packets (OID:  This group requires the presence of the Filter group and provides a means of capturing packet flowing through the network interface for later review. This group actually stores the contents of each packet flowing into the interface and meeting the filter criteria. </li></ul><ul><li>Event (OID:  This group provides the mechanism for the device to generate events and alarms. It is basically the holding table for any events that occur on the device, either through configuration or exception. </li></ul>
  76. 77. 6.2.8 RMON
  77. 78. 6.2.9 Syslog <ul><li>The syslog utility is a mechanism for applications, processes, and the operating system of Cisco devices to report activity and error conditions. </li></ul><ul><li>The syslog protocol is used to allow Cisco devices to issue these unsolicited messages to a network management station. </li></ul>Direct to the console raw data. To a host running an NMS client for a better display. To a server for further processing.
  78. 79. 6.2.8 RMON
  79. 80. 6.2.9 Syslog To enable logging to all supported destinations: Router(config)# logging on To send log messages to a syslog server host, such as CiscoWorks2000: Router(config)# logging hostname | ip address To set logging severity level to level 6, informational: Router(config)# logging trap informational To include timestamp with syslog message: Router(config)# service timestamps log datetime <ul><li>Emergencies </li></ul><ul><li>Alerts </li></ul><ul><li>Critical </li></ul><ul><li>Errors </li></ul><ul><li>Warnings </li></ul><ul><li>Notifications </li></ul><ul><li>Informational </li></ul><ul><li>Debugging </li></ul>
  80. 81. <ul><li>The functions of a workstation and a server </li></ul><ul><li>The roles of various equipment in a client/server environment </li></ul><ul><li>The development of Networking Operating Systems (NOS) </li></ul><ul><li>An overview of the various Windows platforms </li></ul><ul><li>An overview of some of the alternatives to Windows operating systems </li></ul><ul><li>Reasons for network management </li></ul><ul><li>The layers of OSI and network management model </li></ul><ul><li>The type and application of network management tools </li></ul><ul><li>The role that SNMP and CMIP play in network monitoring </li></ul><ul><li>How management software gathers information and records problems </li></ul><ul><li>How to gather reports on network performance </li></ul>
  81. 82. FIN