SHARKFEST 10 | Stanford University | June 14–17, 2010 Where NetFlow and Packet Capture Complement Each Other June 17 th, 2010 Michael Patterson CEO | Plixer.

Slides:



Advertisements
Similar presentations
NETFLOW & NETWORK-BASED APPLICATION RECOGNITION
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
MPLS VPN.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Identifying MPLS Applications
SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm –
Chapter 1: Introduction to Scaling Networks
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS TE Overview Configuring MPLS TE on Cisco IOS Platforms.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
powerful network monitoring & management solution
ICmyNet.Flow Network Traffic Analysis System If You Want to See Your Net
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 ETHERNET Derived From CCNA Network Fundamentals – Chapter 9 EN0129 PC AND NETWORK TECHNOLOGY.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Р АЗВЕРТЫВАНИЕ БЕСПЛАТНОЙ КРОССПЛАТФОРМЕННОЙ СИСТЕМЫ УЧЕТА СЕТЕВОГО ТРАФФИКА Максим Белов зима 2010.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 Expose VoIP Problems With Wireshark June 15, 2010 Sean Walberg Vantage Media SHARKFEST ‘10 Stanford.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Digital Video Solution for Multiple Viewers i MPath N e t w o r k s Multicast Solution How does it work ? Hit left mouse key, the Enter key or Page Up.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—4-1 Implementing Inter-VLAN Routing Deploying Multilayer Switching with Cisco Express Forwarding.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
SHARKFEST '09 | Stanford University | June 15–18, 2009 plixer International Successful Ways to use NetFlow and IP SLA Wednesday June 17 th 10:45am – 12:15pm.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
Virtual Data Systems, Inc. Value Proposition of IP Telephony Voice over IP Technologies.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How Routing Works INTRO v2.0—4-1.
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
1 Netflow 6/12/07. 2 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
Chapter 4: Managing LAN Traffic
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Module 10: How Middleboxes Impact Performance
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Flow Aware Packet Sampling
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
IPv6 Flow. IPv6 Flow Options Netflow v9 (aka cflow/jflow) Sflow IPFix.
D-Link TSD 2009 workshop D-Link Net-Defends Firewall Training ©Copyright By D-Link HQ TSD Benson Wu.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Solving Real-World Problems with Wireshark
Monitoring MIPv6 Traffic with IPFIX
Top-Down Network Design Chapter Four Characterizing Network Traffic
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Fire-wall.
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

SHARKFEST 10 | Stanford University | June 14–17, 2010 Where NetFlow and Packet Capture Complement Each Other June 17 th, 2010 Michael Patterson CEO | Plixer International, Inc. SHARKFEST 10 Stanford University June 14-17, 2010

SHARKFEST 10 | Stanford University | June 14–17, 2010 Course Outline What NetFlow is and how it works Egress or Ingress Comparison of the data exported by NetFlow vs. Packet Analysis Whats next in NetFlow, where the technology is going Summary

SHARKFEST 10 | Stanford University | June 14–17, 2010 What is NetFlow? How does it work?

SHARKFEST 10 | Stanford University | June 14–17, 2010 Voice Traffic Database Traffic Instant Messenger Web Browsing Private & Business Video Conferencing Music streaming

SHARKFEST 10 | Stanford University | June 14–17, 2010 A B A - sending to B is one flow entry on every NetFlow capable router / switch in the path B - acknowledging A is a 2 nd flow

SHARKFEST 10 | Stanford University | June 14–17, 2010 Scrutinizer Accepts NetFlow all Versions sFlow version 2,4 and 5 IPFIX NetStream

SHARKFEST 10 | Stanford University | June 14–17, Flows per Connection AB AB Router A B 3

SHARKFEST 10 | Stanford University | June 14–17, 2010 Who Supports NetFlow? 3Com Adtran Cisco Enterasys Expand Juniper Mikrotik nProbe Riverbed VMWare Vyatta Others…

SHARKFEST 10 | Stanford University | June 14–17, 2010 Cisco Enterasys Foundry Hewlett Packard Nortel nProbe, nBox Many More

SHARKFEST 10 | Stanford University | June 14–17, 2010 MAC Addresses and VLAN IDs MAC addresses via Cisco Flexible NetFlow (aka NetFlow v9)

SHARKFEST 10 | Stanford University | June 14–17, 2010 NetFlow or sFlow sFlow is an RFC not a standard Sampling of every N packets technology – Cant be used for IP accounting like NetFlow Maintained by Inmon Much less expensive for vendors to implement Vendors: 3Com, AlaxalA, Alcatel-Lucent, Allied Telesis, Brocade, D-Link, Extreme Networks, Enterasys, Force10 Networks, H3C, Hewlett-Packard, Hitachi, Juniper Networks, NEC and many others

SHARKFEST 10 | Stanford University | June 14–17, 2010 NetFlow NBAR NBAR stands for Network Based Application Recognition How many of you care if skype or pandora is on your network? Perhaps you dont mind it but, want to know how much there is. Well, NBAR helps us with deeper packet inspection that isnt available with traditional NetFlow.

SHARKFEST 10 | Stanford University | June 14–17, 2010

Router CPU Impact Typically, the impact on the routers CPU is negligible. However, NetFlow NBAR can clobber some routers.

SHARKFEST 10 | Stanford University | June 14–17, 2010 Egress or Ingress Most of us are exporting NetFlow v5 which only supports ingress NetFlow. This means that traffic coming in on an interface is monitored and exported in NetFlow datagrams. NetFlow v5NetFlow datagrams Most NetFlow vendors look at where an ingress flow is headed by looking at the destination interface. Using this information, we can determine outbound utilization on any given interface as long as AND THIS IS IMPORTANT, you enable NetFlow v5 on all interfaces of the switch or router.

SHARKFEST 10 | Stanford University | June 14–17, 2010 When to use Egress In WAN compression environments (e.g. Cisco WAAS, Riverbed, etc.), we need to see traffic after it was compressed. Using Ingress flows causes an over stated outbound utilization on the WAN interface. Egress flows are calculated after compression.Cisco WAAS In multicast environments, ingress multicast flows have a destination interface of 0 because the router doesnt know what interface they will go out until after it processes the datagrams. Exporting egress flows delivers the destination interface and as a result multiple flows are exported if the flow is headed for multiple interfaces. When exporting NetFlow on only one interface of the router or switch. Enabling both on a single interface means that all traffic in and out is exported in NetFlow datagrams.

SHARKFEST 10 | Stanford University | June 14–17, 2010 Demonstration Scrutinizer NetFlow & sFlow Analyzer

SHARKFEST 10 | Stanford University | June 14–17, 2010 NetFlow and Packet Analysis?

SHARKFEST 10 | Stanford University | June 14–17, 2010 Example 1: FTP Comparison Steps for the Lab I started WireShark I logged in and FTPd a file I logged out I stopped WireShark 6 Ingress Flows represent 2221 packets 6 Egress Flows represent 1123 packets

SHARKFEST 10 | Stanford University | June 14–17, 2010 Ingress Lets count packets and compare with Wireshark

SHARKFEST 10 | Stanford University | June 14–17, 2010 Displaying Ingress Total = 2221 packets

SHARKFEST 10 | Stanford University | June 14–17, 2010 Displaying Ingress

SHARKFEST 10 | Stanford University | June 14–17, 2010 Egress Lets count packets and compare with Wireshark

SHARKFEST 10 | Stanford University | June 14–17, 2010 Displaying Ingress Total = 1123 packets

SHARKFEST 10 | Stanford University | June 14–17, 2010 Displaying Egress

SHARKFEST 10 | Stanford University | June 14–17, 2010 Capture Details Lets compare NetFlow details to Packet details

SHARKFEST 10 | Stanford University | June 14–17, 2010

What about Flags?

SHARKFEST 10 | Stanford University | June 14–17, 2010 Example 2: Steps for the Lab I started WireShark I surfed to I went to another web site I stopped WireShark 2 Ingress Flows represents 11 packets going out from my PC 1 Ingress Flow represents 13 packets coming back from llbean.com

SHARKFEST 10 | Stanford University | June 14–17, packets From my PC ( ) NATd by the firewall ( ) 2 flows Cisco Router

SHARKFEST 10 | Stanford University | June 14–17, packets Enterasys Switch From my PC ( ) On the Enterasys switch before the router.

SHARKFEST 10 | Stanford University | June 14–17, packets From

SHARKFEST 10 | Stanford University | June 14–17, packets From

SHARKFEST 10 | Stanford University | June 14–17, 2010 Example 3: VoIP Steps for the Lab I started WireShark I started iaxLite I made a call The other end picked up I hung up I closed iaxLite I stopped WireShark 1 Ingress Flow represents 1364 UDP packets 1 Egress Flow represents 1364 UDP packets

SHARKFEST 10 | Stanford University | June 14–17, packets My Computer to the PBX

SHARKFEST 10 | Stanford University | June 14–17, packets My Computer to the PBX

SHARKFEST 10 | Stanford University | June 14–17, packets PBX to My Computer

SHARKFEST 10 | Stanford University | June 14–17, packets PBX to My Computer

SHARKFEST 10 | Stanford University | June 14–17, 2010 Distributed Collectors

SHARKFEST 10 | Stanford University | June 14–17, 2010

Detecting Malware

SHARKFEST 10 | Stanford University | June 14–17, 2010 Network Behavior Analysis – Constantly monitor NetFlow and sFlow from selected routers and switches – Looks for traffic patterns defined in behavioral algorithms – Additional filters can be created to look for unique circumstances Demonstration

SHARKFEST 10 | Stanford University | June 14–17, 2010 Future of NetFlow Current Innovations

SHARKFEST 10 | Stanford University | June 14–17, 2010 Latency via NetFlow

SHARKFEST 10 | Stanford University | June 14–17, 2010 RTT and Server Latency These fields got cut.

SHARKFEST 10 | Stanford University | June 14–17, 2010 URL Information

SHARKFEST 10 | Stanford University | June 14–17, 2010 WAN Optimization Sizing

SHARKFEST 10 | Stanford University | June 14–17, 2010 Procflow from Gerald Combs

SHARKFEST 10 | Stanford University | June 14–17, 2010 What is next from NetFlow? Packet captures Sampling Flows IPv6 is here and we are reporting on it. Syslogs: Cisco ASA. We already provide reports on this.

SHARKFEST 10 | Stanford University | June 14–17, 2010 Summary Ingress Vs. Egress NetFlow Advanced Filtering to narrow in on problems How and When to leverage reports The differences between NetFlow and Packet Capture Where the technology is going