Network Management Services Flashcards
SSH
Secure Shell
- Principal means of secure remote access to UNIX and Linux servers and most types of network appliances
- Can be used to secure SFTP
- Port 22 by default
- Server must be configured with key pair, but client can use key pair or other authentication method, like a password
SSH Host Key
- Public/private key pair that identifies SSH server
- Map of host names to public keys can be kept manually by each SSH client
- Must be changed if any compromise of host is suspected, as the attacked could masquerade as the server
SSH Client Authentication Kerberos
- Client submits Kerberos credentials obtained when user logged into workstation to the server using the generic Security Services Application Program Interface (GSSAPI)
- Server contacts ticket Granting Service(often DC) to validate credential
SSHD
- Starts SSH Daemon
- Parameters like host’s certificate file, port to listen on and logging options can be set
ssh-keygen
- Create a key pair to access servers
- Private key must be stored securely on local computer
- Public key must be copied to server
ssh-agent
- Configure service to use to store the keys used to access multiple hosts.
- Reduces the number of times key must be confirmed with passphrase
- Provides SSO mechanism for multiple SSH servers
- SSH-ADD used to add key to agent
ssh host
Use SSH Client to connect to the server running host.
- host can be FQDN or IP address
ssh Username@host
- Use SSH client to connect to server running at host with a different username
SNMP
Simple Network Management Protocol
- Widely used framework for remote management and monitoring of servers and network appliances
- Uses agents and a monitoring system
SNMP Agents
- Process running on network device or server
- Maintains database of statistics relating to activity of device called MIB (Management Information Base)
- Each parameter in MIB is call OID(Object Identifier)
- Passes information top management system, with same community name
SNMP Monitor
- Management system where you can oversee network activity
- Polls agents at intervals for MIBs
- Gets information by “Get” regular polling
or Trap, based on certain threshold meeting events
Syslog
- protocol and supporting software that facilitates log collection
- De facto standard for logging events from distributed systems
- Usually listens on port 514
Logging level
- Determines maximum level at which events are recorded or forwarded
- 0 is highest priority
- If it is set to 4, levels 5-7 are not forwarded
Jitter
- Variation in transmission delay
- Mainly a problem for real-time applications
Diffserv
Differentiated Services
- Classifies each packet passing through a device
- Policies can be applied to router to prioritize delivery
- Works at layer-3
Traffic Shapers
- delay certain packet types based on content to ensure other packets have priority
- Helps reduce latency for critical services
- Stores packet until there is bandwidth available
Top Talker/Listener
- Interfaces generating most outgoing traffic(in terms of bandwidth)
- Listeners receive most traffic
- Identifying these and routes can be useful to eliminate bottlenecks
Netflow
- Gathers traffic metadata only and reports to structured database
- Use sapling to reduce processing demands
- Utilizes exporters, collectors and analyzers
Link State
- Whether or not an interface is up or down
- Alerts can be configured for when an interface goes down
- You can also track downtime percentage
Reset
- Number of times an interface has restarted in sample time.
- If interface is continually resetting it is described as flapping
Speed
- rated speed of interface in Mbps or Gbps
- Should be the same for host and switch ports
Duplex
- Most ethernet interfaces operate in full duplex
- If operating in half, indicates a problem
Utilization
- Data transferred over a period of time
- calculated as amount transferred or as % of available bandwidth
Per-Protocol Untilization
- Packet or byte count for a specific protocol