




已阅读5页,还剩19页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
8: Network Management,1,Chapter 8: Network Management,Chapter goals: introduction to network managementmotivationmajor componentsInternet network management frameworkMIB: management information baseSMI: data definition languageSNMP: protocol for network managementsecurity and administrationpresentation services: ASN.1firewalls,8: Network Management,2,What is network management?,autonomous systems (aka “network”): 100s or 1000s of interacting hw/sw componentsother complex systems requiring monitoring, control:jet airplanenuclear power plantothers?,Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost.,8: Network Management,3,Infrastructure for network management,managed device,managed device,managed device,managed device,networkmanagementprotocol,definitions:,managed devices containmanaged objects whose data is gathered into aManagement InformationBase (MIB),managing entity,8: Network Management,4,Network Management standards,OSI CMIPCommon Management Information Protocoldesigned 1980s: the unifying net management standardtoo slowly standardized,SNMP: Simple Network Management ProtocolInternet roots (SGMP)started simpledeployed, adopted rapidlygrowth: size, complexitycurrently: SNMP V3de facto network management standard,8: Network Management,5,SNMP overview: 4 key parts,Management information base (MIB):distributed information store of network management dataStructure of Management Information (SMI):data definition language for MIB objectsSNMP protocolconvey managermanaged object info, commandssecurity, administration capabilitiesmajor addition in SNMPv3,8: Network Management,6,SMI: data definition language,Purpose: syntax, semantics of management data well-defined, unambiguousbase data types: straightforward, boringOBJECT-TYPEdata type, status, semantics of managed objectMODULE-IDENTITYgroups related objects into MIB module,Basic Data Types,INTEGERInteger32Unsigned32OCTET STRINGOBJECT IDENTIFIEDIPaddressCounter32Counter64Guage32Tie TicksOpaque,8: Network Management,7,SNMP MIB,OBJECT TYPE:,OBJECT TYPE:,OBJECT TYPE:,objects specified via SMIOBJECT-TYPE construct,MIB module specified via SMI MODULE-IDENTITY(100 standardized MIBs, more vendor-specific),8: Network Management,8,SMI: Object, module examples,OBJECT-TYPE: ipInDelivers,MODULE-IDENTITY: ipMIB,ipInDelivers OBJECT TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION “The total number of input datagrams successfully delivered to IP user- protocols (including ICMP)”:= ip 9,ipMIB MODULE-IDENTITY LAST-UPDATED “941101000Z” ORGANZATION “IETF SNPv2 Working Group” CONTACT-INFO “ Keith McCloghrie ” DESCRIPTION “The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.” REVISION “019331000Z” := mib-2 48,8: Network Management,9,MIB example: UDP module,Object ID Name Type Comments. UDPInDatagrams Counter32 total # datagrams delivered at this node. UDPNoPorts Counter32 # underliverable datagrams no app at portl. UDInErrors Counter32 # undeliverable datagrams all other reasons. UDPOutDatagrams Counter32 # datagrams sent. udpTable SEQUENCE one entry for each port in use by app, gives port # and IP address,8: Network Management,10,SNMP Naming,question: how to name every possible standard object (protocol, data, more.) in every possible network standard?answer: ISO Object Identifier tree: hierarchical naming of all objectseach branchpoint has name, number,.,ISOISO-ident. Org.US DoDInternet,udpInDatagramsUDPMIB2management,8: Network Management,11,Check out www.alvestrand.no/harald/objectid/top.html,OSI Object Identifier Tree,8: Network Management,12,SNMP protocol,Two ways to convey MIB info, commands:,Managed device,response,Managed device,trap msg,request/response mode,trap mode,8: Network Management,13,SNMP protocol: message types,GetRequestGetNextRequestGetBulkRequest,Mgr-to-agent: “get me data”(instance,next in list, block),Message type,Function,InformRequest,Mgr-to-Mgr: heres MIB value,SetRequest,Mgr-to-agent: set MIB value,Response,Agent-to-mgr: value, response to Request,Trap,Agent-to-mgr: inform managerof exceptional event,8: Network Management,14,SNMP protocol: message formats,8: Network Management,15,SNMP security and administration,encryption: DES-encrypt SNMP message authentication: compute, send MIC(m,k): compute hash (MIC) over message (m), secret shared key (k)protection against playback: use nonceview-based access controlSNMP entity maintains database of access rights, policies for various usersdatabase itself accessible as managed object!,8: Network Management,16,The presentation problem,Q: does perfect memory-to-memory copy solve “the communication problem”?A: not always!,problem: different data format, storage conventions,struct char code; int x; test;test.x = 256;test.code=a,test.codetest.x,test.codetest.x,host 1 format,host 2 format,8: Network Management,17,Solving the presentation problem,1. Translate local-host format to host-independent format2. Transmit data in host-independent format3. Translate host-independent format to remote-host format,8: Network Management,18,ASN.1: Abstract Syntax Notation 1,ISO standard X.680used extensively in Internetlike eating vegetables, knowing this “good for you”!defined data types, object constructors like SMIBER: Basic Encoding Rulesspecify how ASN.1-defined data objects to be transmittedeach transmitted object has Type, Length, Value (TLV) encoding,8: Network Management,19,TLV Encoding,Idea: transmitted data is self-identifyingT: data type, one of ASN.1-defined typesL: length of data in bytesV: value of data, encoded according to ASN.1 standard,1234569,BooleanIntegerBitstringOctet stringNullObject IdentifierReal,Tag Value Type,8: Network Management,20,TLV encoding: example,Value, 5 octets (chars)Length, 5 bytesType=4, octet string,Value, 259Length, 2 bytesType=2, integer,8: Network Management,21,Firewalls,Two firewall types:packet filterapplication gateways,To prevent denial of service attacks:SYN flooding: attacker establishes many bogus TCP connections. Attacked host allocs TCP buffers for bogus connections, none left for “real” connections. To prevent illegal modification of internal data.e.g., attacker replaces CIAs homepage with something elseTo prevent intruders from obtaining secret info.,isolates organizations internal net from larger Internet, allowing some packets to pass, blocking others.,8: Network Management,22,Packet Filtering,Internal network is connected to Internet through a router.Router manufacturer provides options for filtering packets, based on:source IP addressdestination IP addressTCP/UDP source and destination port numbersICMP message typeTCP SYN and ACK bits,Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or dest port = 23.All incoming and outgoing UDP flows and telnet connections are blocked.Example 2: Block inbound TCP segments with ACK=0.Prevents external clients from making TCP connections with internal clients, but allows internal clients to connect to outside.,8: Network Management,23,Application gateways,Filters packets on
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 【正版授权】 ISO/TS 24315-3:2025 EN Intelligent transport systems - Management of electronic traffic regulations (METR) - Part 3: System of systems requirements and architecture (SoSR)
- 2025福建厦门夏商集团有限公司招聘2人考前自测高频考点模拟试题(含答案详解)
- 2025福建福州市仓山区卫健系统招聘编内31人模拟试卷及答案详解(名校卷)
- 2025贵州传媒职业学院第十三届贵州人才博览会引才1人模拟试卷及答案详解(新)
- 2025海南陵水黎族自治县中医院(陵水黎族自治县中医院医共体总院)考核招聘(第二批)员额人员模拟试卷及参考答案详解一套
- “百万英才汇南粤”2025年佛山市高明区公开招聘中小学教师(第四场)考前自测高频考点模拟试题及答案详解(网校专用)
- 2025江苏苏州高新区通安镇退管协管员招聘2人模拟试卷及答案详解(考点梳理)
- 2025呼伦贝尔五九煤炭集团招聘26人模拟试卷附答案详解(黄金题型)
- 第四单元第二课《活灵活现》 教学设计- 人教版(2024)初中美术七年级上册
- 2025年河北雄安新区新建片区学校公开选聘校长及骨干教师13人考前自测高频考点模拟试题及答案详解(易错题)
- 2025-2030儿童心理健康服务市场需求分析与行业趋势及发展策略报告
- 人工智能+新能源设备研发应用分析报告
- 公路施工汇报材料
- 对银行消防培训课件
- 保安节前安全培训课件
- 临床运动处方实践专家共识(2025)解读 3
- 2025-2030礼品包装品牌化运营策略及消费者偏好与市场营销渠道研究
- 小学数学课堂教学提问的教学策略讲座稿
- 石化产业链数字化转型-洞察及研究
- 绿色供应链的发展趋势
- 2025年邮储银行招聘笔试试题及答案(可下载)
评论
0/150
提交评论