Network Management Services Flashcards
SSH
Secure Shell
- Principal means of secure remote access to UNIX and Linux servers and most types of network appliances
- Can be used to secure SFTP
- Port 22 by default
- Server must be configured with key pair, but client can use key pair or other authentication method, like a password
SSH Host Key
- Public/private key pair that identifies SSH server
- Map of host names to public keys can be kept manually by each SSH client
- Must be changed if any compromise of host is suspected, as the attacked could masquerade as the server
SSH Client Authentication Kerberos
- Client submits Kerberos credentials obtained when user logged into workstation to the server using the generic Security Services Application Program Interface (GSSAPI)
- Server contacts ticket Granting Service(often DC) to validate credential
SSHD
- Starts SSH Daemon
- Parameters like host’s certificate file, port to listen on and logging options can be set
ssh-keygen
- Create a key pair to access servers
- Private key must be stored securely on local computer
- Public key must be copied to server
ssh-agent
- Configure service to use to store the keys used to access multiple hosts.
- Reduces the number of times key must be confirmed with passphrase
- Provides SSO mechanism for multiple SSH servers
- SSH-ADD used to add key to agent
ssh host
Use SSH Client to connect to the server running host.
- host can be FQDN or IP address
ssh Username@host
- Use SSH client to connect to server running at host with a different username
SNMP
Simple Network Management Protocol
- Widely used framework for remote management and monitoring of servers and network appliances
- Uses agents and a monitoring system
SNMP Agents
- Process running on network device or server
- Maintains database of statistics relating to activity of device called MIB (Management Information Base)
- Each parameter in MIB is call OID(Object Identifier)
- Passes information top management system, with same community name
SNMP Monitor
- Management system where you can oversee network activity
- Polls agents at intervals for MIBs
- Gets information by “Get” regular polling
or Trap, based on certain threshold meeting events
Syslog
- protocol and supporting software that facilitates log collection
- De facto standard for logging events from distributed systems
- Usually listens on port 514
Logging level
- Determines maximum level at which events are recorded or forwarded
- 0 is highest priority
- If it is set to 4, levels 5-7 are not forwarded
Jitter
- Variation in transmission delay
- Mainly a problem for real-time applications
Diffserv
Differentiated Services
- Classifies each packet passing through a device
- Policies can be applied to router to prioritize delivery
- Works at layer-3
Traffic Shapers
- delay certain packet types based on content to ensure other packets have priority
- Helps reduce latency for critical services
- Stores packet until there is bandwidth available
Top Talker/Listener
- Interfaces generating most outgoing traffic(in terms of bandwidth)
- Listeners receive most traffic
- Identifying these and routes can be useful to eliminate bottlenecks
Netflow
- Gathers traffic metadata only and reports to structured database
- Use sapling to reduce processing demands
- Utilizes exporters, collectors and analyzers
Link State
- Whether or not an interface is up or down
- Alerts can be configured for when an interface goes down
- You can also track downtime percentage
Reset
- Number of times an interface has restarted in sample time.
- If interface is continually resetting it is described as flapping
Speed
- rated speed of interface in Mbps or Gbps
- Should be the same for host and switch ports
Duplex
- Most ethernet interfaces operate in full duplex
- If operating in half, indicates a problem
Utilization
- Data transferred over a period of time
- calculated as amount transferred or as % of available bandwidth
Per-Protocol Untilization
- Packet or byte count for a specific protocol
Error Rate
- Number of packets per second that cause errors
- May be caused from interference or bad link quality
Discard and drops
- Interface may discard frames for reasons like checksum errors, mismatched MTUs, too small packets (runts) to big (giants).
Retransmissions
- Caused by packet loss necessitating retransmission
CRC
Cyclic Redundancy Check
- Calculated by an interface when it sends a frame
- Derives a 32 bit value from contents of fram
- Added to header
- Receiving interface runs same calculation and rejects different value
- Errors caused by interference on Layer 1
Public Key Management
- Critical security task
- If a users private key is compromised, public key must be deleted and regenerated
- Always delete public keys if user access had been revoked
System Log
- Records Startup events and subsequent changes to configuration at OS level
- Includes Kernel Processes and drivers but also core services
Application Log
- Records data for single, specific service like DNS, HTTP or RDBMS
- Complex application could write multiple log files
Audit Logs
- Records use of authentication and authorization privileges
- Generally records success/fail type events
- Also called access or security log
- Done at OS level or per application level
Performance/Traffic Logs
- Record statistics for compute, storage and network resources over defines period
Latency
- Time it takes for transmission to reach recipient
- Measures in ms
- Problem for real time applications
- Can test with ping, pathping and mtr
- Need to consider RTT(Round Trip Time)
- VoIP RTT is required to have less than 300 ms.
802.1p
- Used at layer 2 to classify and prioritize traffic passing through switch or WAP
- Defines tagging mechanism in VLAN field (802.1Q/p)
- Value is set to 0-7, with 0 being highest priority
Class of Service Mechanisms
- Categorize protocols into groups that require different service levels and provide tagging mechanism to identify them
- DiffServ and 802.1p
Control Plane
- Division of network function for QoS
- Makes decisions about how traffic should be prioritized and where it should be switched
Data Plane
- Division of network function for QoS
- Handles actual switching of traffic
Management Plane
- Division of network function for QoS
- Monitors traffic conditions
Traffic Shapers
- Delay certain packet types based on their content
- Will store packets until bandwidth is available
Throughput testers
- Divides file size by time it took to transfer file
- Should be used at a time representative of real-world network usage
- iperf, ttcp, bwping can be used as throughput testers
Encapsulation Errors
- Error in the frame format expected by the interface
- Prevents transmission and reception
- Physical link will appear as up, but line protocol will be listed as down
Issue could be: - Wrong frame type
- Ethernet trunk error
- Router framing