Copyright © sFlow.org. 2004 All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Alle Rechte vorbehalten © 2005, Alcatel sFlow solutions as a differentiator for Alcatel.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Guide to Network Defense and Countermeasures Second Edition
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
VoIP: Full Lifecycle Management Russell M. Elsner APM Technology Director OPNET Technologies, Inc.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Traffic Engineering With Traditional IP Routing Protocols
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
TUNDRA The Ultimate Netflow Data Realtime Analysis Jeffrey Papen Yahoo! Inc.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
Coarse-Grained Traffic Analysis in ISP Networks A Router-Based Approach Christian Martin Verizon.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Web Application Firewall (WAF) RSA ® Conference 2013.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Module 10: How Middleboxes Impact Performance
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security fundamentals Topic 10 Securing the network perimeter.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Network Processing Systems Design
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security fundamentals
Lab A: Planning an Installation
Security Methods and Practice CET4884
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Introduction to Networking
Introduction to Networking
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
The Stanford Clean Slate Program
Firewalls Purpose of a Firewall Characteristic of a firewall
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Intrusion Detection system
DHCP: Dynamic Host Configuration Protocol
Protection Mechanisms in Security Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see

Copyright © sFlow.org 2004 All Rights Reserved Today’s Hard Network Management Questions Who is using the network? –What are they using it for? Are my security policies effective? –How do I detect threats that have evaded the firewall? Why is my application or server slow? –Is it the network? How many servers do I need? –Where do I place them? –Can a single server be used for several applications? What impact will new applications have on the network? –Is it possible to run VoIP? Basic questions cannot be answered without network visibility

Copyright © sFlow.org 2004 All Rights Reserved How Do You Achieve Complete Network Visibility? Monitor every server and client? –Scalability –Complexity of heterogeneous systems Monitor network traffic? –Effective - all network system interaction is seen on the network –But how do you monitor thousands of ports with speeds up to 10Gig?

Copyright © sFlow.org 2004 All Rights Reserved Traditional Solution for Network Monitoring …Partial Network Visibility Probes, embedded counters: –Deployed at perimeter or key locations –Deployed on demand, in response to problems –Local measurements, no end-end flow data –Delayed, aggregated counts –Poor scalability to gigabit speeds –IP only –Insufficient detail of network traffic Cost, scalability, and network impact of traditional network traffic monitoring technology force compromises Partial visibility = control decisions based on guesswork guess experiment

Copyright © sFlow.org 2004 All Rights Reserved sFlow: The Industry Standard for Monitoring High-speed, Multi-layer Switched Networks Cost effective: Embedded in every port Scalable: Monitors traffic flow for all network ports Effective at gigabit speeds Does not impact network performance Always-on: Continuous monitoring Robust under all network conditions Complete visibility: All devices = L2 – L7 flows end-end Real-time and historical, detailed data

Copyright © sFlow.org 2004 All Rights Reserved Measurements from every port Real-time, central collection = data driven control from your chair sFlow Collector/Analyzer sFlow Complete Network Visibility Fundamentally Changes Network Management

Copyright © sFlow.org 2004 All Rights Reserved Switching ASIC 1 in N sampling sFlow in Operation packet headersrc/dst i/fsampling parmsforwardinguser IDURLi/f counters sFlow agent forwarding tables interface counters sFlow Datagram eg 128Brate pool src 802.1p/Q dst 802.1p/Q next hop src/dst mask AS path communities localPref src/dst Radius TACACS sFlow Collector & Analyzer Switch/Router

Copyright © sFlow.org 2004 All Rights Reserved Statistical Model for Packet Sampling Total number of frames = N Total number of samples = n Number of samples in class = c Number of frames in the class estimated by: Estimating Traffic per Protocol

Copyright © sFlow.org 2004 All Rights Reserved sFlow – Summary sFlow agent Switch/Router HW Packet Sampling ASIC Traffic sFlow Datagram Packet header (eg MAC,IPv4,IPv6,IPX,AppleTalk,TCP,UDP, ICMP) Sample process parameters (rate, pool etc.) Input/output ports Priority (802.1p and TOS) VLAN (802.1Q) Source/destination prefix Next hop address Source AS, Source Peer AS Destination AS Path Communities, local preference User IDs (TACACS/RADIUS) for source/destination URL associated with source/destination Interface statistics (RFC 1573, RFC 2233, and RFC 2358) Low cost No impact to performance Minimal network impact Scalable Quantitative measurements

Copyright © sFlow.org 2004 All Rights Reserved sFlow Benefits Reduce Costs Control network service costs –Internet access Ensure internet traffic remains within SLA guidelines and CIR –Allocate costs to departments Detailed usage information for individual users, applications, and organizational entities Each department can assess their usage and control costs. –Optimize peering relationships Identify the ISPs that carry the most transit traffic and are therefore the optimal peers Plan for cost effective upgrades –Accurately forecast resource requirements by identifying the bottlenecks –Apply traffic shaping and rate control to maintain network performance

Copyright © sFlow.org 2004 All Rights Reserved sFlow Benefits Minimize Network Downtime Rapidly pin-point congestion problems –Why is the network slow? Troubleshoot network problems quickly –System and network problems often first manifest themselves in abnormal traffic patterns You can’t fix what you can’t see –Detailed data enables rapid problem resolution, minimizing costly network downtime

Copyright © sFlow.org 2004 All Rights Reserved sFlow Benefits Protect your Assets with Security and Surveillance Design and implement targeted security policies –Determine traffic compartmentalization strategies –Define firewall configuration –Audit results Identify access policy violations and intrusions –Establish a baseline for normal network activity –Raise alerts to deviations from the baseline –Identify source and target of the intrusion Distributed Denial of Service Detection and diagnosis –Robust traffic profiling to highlight attacks (eg traffic targeted at a single host, port scanning etc.) Identify worm-infected hosts and the spread of infections –Infected hosts identified by signature recognition –Identify significant changes in fan-out from every host

Copyright © sFlow.org 2004 All Rights Reserved sFlow Benefits Fund Upgrades or Increase Revenue Account and bill for network usage –Detailed data on network usage User Groups of users Application Source/destination of traffic –Different tariffs for internal vs. external traffic, etc. Charge for value added services –VoIP Develop new service revenue streams –Understand customer service usage