APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
NetComm Wireless Logging Architecture Feature Spotlight.
Syslog and log files1-1 Syslog and Log Files  From logfiles, you can find m important information m History m Errors/warnings  Logging policies m Reset.
CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Unix Network Programming Chapter 13: Daemon processes and the inetd superserver Jani Peusaari.
Daemon Processes and inetd Superserver
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management.
Va-scanCopyright 2002, Marchany Securing Solaris Servers Randy Marchany.
New SA Training Topic 9: Logging, Monitoring, and Performance  Logging  Windows – “Auditing”  Linux – syslog  Monitoring  MRTG  Big Brother  Performance.
NMS Labs Mikko Suomi LAB1 Choose SNMP device managment software Features: –Gives Nice overview of network –Bandwith monitoring –Multible.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
System Monitoring and Automation CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
System logging and monitoring
Windows 7 Firewall.
Vodafone MachineLink 3G
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
Backups, Logging, Troubleshooting. Dates for Last Week of Class Homework 7 – Due Tuesday 5/1 by midnight Labs 7 & 8 – 8 is extra credit – Due Thursday.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
Generating Reports and Analyzing Logs 黃雁亭 陳麗雯 廖榆恬 1.
CENT 305 Information Systems Security Overview of System Logging syslog 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
1 Periodic Processes and the cron Daemon The cron daemon is where all timed events are initiated. The cron system is serviced by the cron daemon. What.
1 Daemons & inetd Refs: Chapter Daemons A daemon is a process that: –runs in the background –not associated with any terminal Unix systems typically.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Carlos Armas Roundtrip Networks Hervey Allen NSRC.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SWATCH Chris Anderson Matt White. Swatch: Its purpose Log file watcher – Originally, Swatch was written to actively monitor messages as they are written.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
Network Management Tutorial Log management. Log management and monitoring ■ What is log management and monitoring ? ■ It's about keeping your logs in.
Cisco configuration elelements
Chapter Objectives In this chapter, you will learn:
COP 4343 Unix System Administration
CCNA Routing and Switching Routing and Switching Essentials v6.0
Cosc 4750 Log files.
ITIS 3110 IT Infrastructure II
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Log management AfNOG 2008 Rabat, Morocco.
Chapter 2: Basic Switching Concepts and Configuration
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
– Chapter 3 – Device Security (B)
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
CIT 485: Advanced Cybersecurity
CIT 470: Advanced Network and System Administration
Daemons & inetd Refs: Chapter 12.
Monitoring with logging
Presentation transcript:

APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Log monitoring APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008

Log management and monitoring What is log management and monitoring ? It's about keeping your logs in a safe place, putting them where you can easily inspect them with tools Keep an eye on your log files They tell you something important... Lots of things happen, and someone needs to keep an eye on them... Not really practictal to do it by hand!

Log management and monitoring On your routers and switches Sep 1 04:40:11.788 INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp 79.210.84.154(2167) -> 169.223.192.85(6662), 1 packet Sep 1 04:42:35.270 INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 (203.200.80.75) %CI-3-TEMP: Overtemperature warning Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down On your servers as well Aug 31 17:53:12 ubuntu nagios2: Caught SIGTERM, shutting down... Aug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from 169.223.1.130 port 2039 ssh2

Log management First, need to centralize and consolidate log files Log all messages from routers, switches and servers to a single machine – a logserver All logging from network equipment and UNIX servers is done using syslog Windows can be configured to use syslog as well, with some tools Log locally, but also to the central server

Centralized logging Local disk server syslog router switch Syslog Syslog storage

Configuring centralized logging Cisco equipment Minimum: logging ip.of.log.host UNIX host Edit /etc/syslog.conf Add a line ”*.* @ip.of.log.host” Restart syslogd Other equipments have similar options Options to control facility and level

Receiving the messages Identify the facility that the SENDING host or device will send their message on Reconfigure syslogd to listen to the network (on Ubuntu/Debian: add ”-r” to /etc/defaults/syslogd Add an entry to syslogd indicating where to write messages: local7.* /var/log/routers Create the file: touch /var/log/routers Restart syslogd /etc/init.d/sysklogd restart

Syslog basics UDP protocol, port 514 Syslog messages contain: Facility: Auth Level: Emergency (0) Authpriv | Alert (1) Console | Critical (2) Cron | Error (3) Daemon | Warning (4) Ftp | Notice (5) Kern | Info (6) Lpr Mail | Debug (7) News Ntp | Security Syslog User UUCP Local0 ...Local7

Sorting logs Using facility and level, sort by category into different files With tools like syslog-ng, sort by host, date, ... automatically into different directories Grep your way through the logs. Use standard UNIX tools to sort, and eliminate, things you want to filter out: egrep -v '(list 100 denied|logging rate-limited)' mylogfile Is there a way to do this automatically ?

SWATCH Simple Log Watcher Written in Perl Monitors log files, looking for patterns (”regular expressions”) to match in the logs Perform a given action if the pattern is found

Sample config # watchfor = /%SYS-5-CONFIG/ mail addresses=inst,subject=System configuration notice throttle 1:00 # watchfor = /%LINK-3-UPDOWN/ mail addresses=inst,subject=Link updown throttle 1:00 # watchfor = /%SEC-6-IPACCESSLOGP/ exec /usr/bin/echo $* >> /tmp/accesslist.log watchfor = /%SYS-5-CONFIG/ mail addresses=inst,subject=Configuration of router,throttle = 60:00

References http://www.loganalysis.org/ Syslog NG http://www.balabit.com/network-security/syslog-ng/ Windows Event Log to Syslog: https://engineering.purdue.edu/ECN/Resources/Documents/UNIX/evtsys SWATCH log watcher http://swatch.sourceforge.net/ http://www.loganalysis.org/sections/signatures/log-swatch-skendrick.txt http://sourceforge.net/docman/display_doc.php?docid=5332&group_id=25401

Questions ? ?