SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Increase Wireshark’s Effectiveness by Tapping your Network Data Wednesday, April 2, 2008 Chris.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm –
Network Systems Sales LLC
Network Devices Repeaters, hubs, bridges, switches, routers, NICs.
Antonio González Torres
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Non-Intrusive Out-of-Band Network Monitoring Utilizing a Data-Access Switch April 1, 2008 Patrick.
Shared Data Access Network (SDAN)
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 TAP’s Demystified June 16 th 2010 Samuel Battaglia Technical Manager | Network Critical SHARKFEST.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
1 Chapter 8 Local Area Networks - Internetworking.
1 Chapter 8 Local Area Networks - Internetworking Data Communications and Computer Networks: A Business User’s Approach.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Net Optics Confidential and Proprietary 1 High-Availability Security Monitoring using Bypass Switches August, 2011 Intelligent Access and Monitoring Architecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
SANPoint Foundation Suite HA Robert Soderbery Sr. Director, Product Management VERITAS Software Corporation.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
COEN 252 Computer Forensics
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
Introductionto Networking Basics By Avinash Kulkarni.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Local Area Networks: Internetworking
Introduction to Wireshark Making Sense of the Matrix
Chapter 6 – Connectivity Devices
LAN Switching and Wireless – Chapter 1
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Click to edit Master subtitle style
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
1 Root-Cause VoIP Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Network design Topic 4 LAN design. Agenda Modular design Hierarchal model Campus network design Design considerations Switch features.
March 2010 Gig Zero Delay Tap. TP-CU3-ZD The Gig Zero Delay Tap is TP-CU3 enhanced with the industry’s first TRUE Zero Delay technology for 10/100/1000.
Network design Topic 2 Existing network infrastructure.
BZUPAGES.COM Introduction to Cisco Devices Interfaces and modules –LAN interfaces (Fast Ethernet, Gigabit Ethernet) –WAN interfaces(Basic Rate Interface.
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
CISCO NETWORKING ACADEMY Chabot College ELEC Ethernet Switches.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Exploration 3 Chapter 1. Access layer The access layer interfaces with end devices, such as PCs, printers, and IP phones, to provide access to the rest.
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO PathSolutions.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Cisco Study Guide
Lecture 11. Switch Hardware Nowadays switches are very high performance computers with high hardware specifications Switches usually consist of a chassis.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Target Network ISP Internal Network
LESSON 2.1_A Networking Fundamentals Understand Switches.
Optical-Based Switching Solutions
Planning and Troubleshooting Routing and Switching
Chapter 5: Inter-VLAN Routing
Introduction to Networks
Instructor: Mr. Malik Zaib
IS3120 Network Communications Infrastructure
Module 5 - Switches CCNA 3 version 3.0.
An introduction to the organization of the Internet Lab
Chapter 3 VLANs Chaffee County Academy
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Reliable Packet Captures
Presentation transcript:

SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Increase Wireshark’s Effectiveness by Tapping your Network Data Wednesday, April 2, 2008 Chris Bihary Managing Director | Network Critical SHARKFEST '08 Foothill College March 31 - April 2, 2008

Agenda Introduction Network Monitoring Basics How do I connect Wireshark to my network? What is Access Technology? New Access Technology Questions & Answers SHARKFEST '08 | Foothill College | March 31 - April 2, 2008

Introduction Chris Bihary, Network Critical Managing Director, Americas direct Mark Manion, Network Critical Channel Manager, West Coast direct Sam Battaglia, Network Critical Technical Manager (716) direct Network Critical Network Critical is the creator of the premier TAP (Traffic Access Point) solution; advancing enterprise network monitoring, device deployment, and management through a best-practice approach. Network Critical develops smarter ways to access traffic for monitoring, data capture and analysis for any enterprise mission: compliance, security, quality of service, legal intercept, analysis, and much more. Office or SHARKFEST '08 | Foothill College | March 31 - April 2, 2008

Network Monitoring Basics SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 AccessCaptureAnalyze Three Basic Components with any Network Monitoring Solution

Network Monitoring Solutions Analyze Network Appliances ◊ Software Tools ◊ Network Tools Network Monitoring, Network Analyzers, Sniffers, Security, Compliance, Analysis, Lawful Interception, Forensics, Quality of Service, Data Leakage, Intrusion Detection, Intrusion Prevention, Bandwidth Shaping, Content Filtering T1-1 I’ve downloaded Wireshark…Now what? Instructor: Betty DuBois, Wireshark U T2-2 Analyzing the TCP/IP Resolution Processes - Port, Name, Route and Hardware Address Resolution Instructor: Laura Chappell, WSU T2-4 Trace File Analysis - Identifying Wire Latency, Client Latency and Server Latency Issues (Includes Charting Techniques) Instructor: Laura Chappell, WSU T1-3 Case Studies: Solving Network Performance Problems with Wireshark Instructors: Laura Chappell, WSU and Loris Degioanni, CTO, CACE Technologies T1-3 Case Studies: Solving Network Performance Problems with Wireshark Instructors: Laura Chappell, WSU and Loris Degioanni, CTO, CACE Technologies T1-10 Expose VOIP Problems Using Wireshark Instructor: Sean Walberg

Network Monitoring Solutions Capture Line Rate Capture Appliances ◊ Data Storage ◊ Databases Network Appliances, High Speed Network Interface Cards, Storage Solutions, Disk / Server Farms, On-line and Off-line Storage T1-2 The Virtue of Continuous, Complete Packet Capture &Stream-to-Storage for Enhanced Network Forensics Capability Instructor: Paal Tveit, VP of Engineering, Solera Networks T2-5 Advanced Capture and Display Filtering Instructor: Tony Fortunato, WSU

Network Monitoring Solutions How do I access the data on my Network? Access

A network appliance / software / network tool is only as good as the access it gets. Downtime can stem from poor management practices, often where access is an afterthought. A Gartner study found that the typical large business experienced an average of 87 hours of downtime a year, at $42,000 per hour = $3.6 million annually Why worry about Network Access?

Access Technology is the Foundation Analyze Capture Access

How do I connect to Wireshark to the Network? 10/100 Hub SPAN or Mirrored Ports (switches) TAP – Traffic Access Point It’s simple, I need access to the data!

How do I connect to Wireshark to the Network? 10/100 Ethernet Hub Shared 10/100 collision based topology Cannot monitor full duplex traffic Drop Packets Does not support gigabit or fiber applications Hard find a hub Single port makes it easy when using with a laptop or portable application with Wireshark

How do I connect to Wireshark to the Network? Mirrored Port or Cisco Term SPAN (Switch Port Analyzer) With SPAN, traffic from any port on the network switch can be mirrored or copied to another port, which is designated as the SPAN port. You can then connect the SPAN port to the Network Tool Managed Ethernet Switch SPAN Port

SPAN/Mirrored Switch Port Benefits Included in the cost of your managed switch Internal Switch Traffic Visible VLAN’s are visible Single port makes it easy when using with a laptop or portable application with Wireshark Limitations Groomed data (change timing, add delay) Extract bad frames as well as ignore all Layer 1 &2 information Dropped frames: Monitoring device is missing packets due to port over-subscription Full Duplex monitoring is not supported Not secure and transporting monitored traffic through the production network may not acceptable Not Priority Degraded network switch performance when monitoring a busy segment Contention for SPAN Ports Engineers, Security, VoIP, etc I have no SPAN Ports Available Requires re-configuration of the network switch Authorization Problems Switch Configuration Errors can cause major Network Problems

SPAN/Mirrored Switch Port Data Monitoring Access: SPAN Port or Passive TAP? What’s on your Network? Part 1 Is SPAN port a viable data access technology for today’s business critical networks especially with today’s access needs for Data Security Compliance and Lawful Intercept requirements? Not really, see why ! by Tim O’Neill from BT Solutions From Cisco’ on SPAN port usability –From Cisco’s White Paper – Using the Cisco Span port for SAN analysis “Cisco warns that the switch treats SPAN data with a lower priority than regular port-to-port data. In other words, if any resource under load must choose between passing normal traffic and SPAN data, the SPAN loses and the mirrored frames are arbitrarily discarded. This rule applies to preserving network traffic in any situation. For instance, when transporting remote SPAN traffic through an Inter Switch Link (ISL) which shares the ISL bandwidth with regular network traffic, the network traffic takes priority. If there is not enough capacity for the remote SPAN traffic, the switch drops it. Knowing that the SPAN port arbitrarily drops traffic under specific load conditions, what strategy should users adopt so as not to miss frames? According to Cisco, the best strategy is to make decisions based on the traffic levels of the configuration and when in doubt to use the SPAN port only for relatively low-throughput situations. “ Read the entire article by accessing

How do I connect to Wireshark to the Network? Traffic Access Port (TAP) Provides a copy of the traffic flowing between two (2) Network Devices Fail Safe Technology - 100% Network Availability even in an event of power loss 100 % Visibility of the Full Duplex Network Traffic including Layer 1 & Layer 2 Errors Sensor are 100% Isolated & Secure TAPs are a layer 1 device – Easy to install & Manage Creates a Permanent Access Point for Network Tools TAP

TAP Benefits Provide Easy Network Access (hardware only solution) Eliminates the need for SPAN / Mirrored Ports Permanent 24/7/365 Access 10/100/1000 Copper, Fiber 100Base-FX, OC3 – OC192, Gigabit, 10 Gigabit, Fiber to Copper Gigabit TAPs

TAP Benefits Simple Layer 1 Passive Hardware Device Easy to Install Provides Permanent Access 100% Network Availability No Single Point of Failure 100% Visibility to Network Traffic Eliminate the need for a SPAN Port Cost effective Save $$$$, No Network Downtime Make your life easier when deploying & managing Wireshark

Tapping Technology Aggregating TAP Many-to-One or One-to-Many TAPs Aggregation or Regeneration V-Line (Virtually In-Line) By-pass TAPs

CRITICALCONNEX™ MANY TO ONE 10/100 meg network connections 1000 meg monitoring device Aggregation / Many-to-One / One-to-Many

RouterSwitch Network Link Traffic with heartbeat Fail-over path V-Line (Virtually In-Line) By-Pass TAP

TAP Your Network for Wireshark Easily connect your Wireshark Analyzer 10/100/1000 Copper Multi-mode Gigabit Fiber Single Mode Gigabit Fiber Provide a single copper monitoring port for laptops & single port mobile devices Install & Monitor

TAP Your Network for Wireshark

Access Technology Solutions Building a Proper Infrastructure Access Solution Building a foundation to support the Monitoring Applications for enterprise customers Complex, High Availability, Multi-locations Zero Failure Point created by Access Equipment 100% Visibility to Network Traffic No Data Loss Data is not groomed, changed or effected No Network Latency created by Access Points Invisible, non-intrusive access to the network Secure Access Points Flexible Access Points support multiple Capture & Analysis Tools

Access Technology Solutions Building a Proper Infrastructure Access Solution Bandwidth on networks is not unlimited Allow Core Switches, Distribution Switches, Access Switches, and Router to be designed for Live Network Traffic Only Do not design a Access Point requiring re-transmission over the Live Network Build your infrastructure with Access Points from day one

CriticalConneX™ Modular Chassis CC1000: CriticalConneX 1U Modular Chassis, Four (4) Hot Swappable Slots, Dual AC Power Supplies CC1010: CriticalConneX 1U Modular Chassis, Four (4) Hot Swappable Slots, Single AC Power Supply CC1020: CriticalConneX 1U Modular Chassis, Four (4) Hot Swappable Slots, Dual AC Power Supplies, Aggregating Backplane Add –DC to the part number for -48vdc power supplies

CriticalConneX™ Modular Chassis

Access Technology Solutions Next Generation TAP Smart Network Access Technology

ACCESS CAPTURE ANALYZE Any Questions?