Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Ensuring Network Security Planning Physical Security Data Security –Passwords –Auditing –Encryption Sniffing Firewalls Viruses.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Network Management: SNMP
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
SNMP ( Simple Network Management Protocol ) based Network Management.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Forensic and Investigative Accounting
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Chapter 7: Using Windows Servers to Share Information.
Module 4: Add Client Computers and Devices to the Network.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Module 7: Fundamentals of Administering Windows Server 2008.
CS 453 Computer Networks Lecture 22 Network Management.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Standards for Network Administration Week-5. Standards for Network Administration 1. Management Information Base A structured database about a network.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Overview Managing a DHCP Database Monitoring DHCP
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Network Management Security
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
IT:Network:Apps.  Need to keep track of many things ◦ Traffic (packets) ◦ Network load ◦ Server load ◦ Disk space ◦ Log files ◦ Availability of Servers/Services.
Ch 9. Network Management Myungchul Kim
Install, configure and test ICT Networks
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Week #12 CIS 173 OBJECTIVES Chapter #10 Network Administration.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Network System Security - Task 2. Russell Johnston.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Chapter 7: Using Windows Servers
Windows 2008 Overview Lecture 1.
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Working at a Small-to-Medium Business or ISP – Chapter 8
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Data Networking Fundamentals
An Introduction to Computer Networking
Network+ Guide to Networks, Fourth Edition
SNMP (Simple Network Management Protocol) based Network Management
Presentation transcript:

Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security

Procedures Failure detection –Network card locally or at the switch/router –Host monitoring –Traffic monitoring –Route flapping –Intrusion

Management Levels Performance management –Utilization and throughput Fault Management –What is broken Configuration management –Track connections Accounting management –Logging resource use Security management

Infrastructure Managing entity –Human, network manager at the NOC Managed device –Switch, router, interface Management Information Base –Network management agent –Network management protocol (SNMP)

Monitoring Protocol Network Management Objects –MIB object Data Definition language –Structure of Management Information (SMI) Protocol (SNMP) Security and Administration capabilities –Remote control

SMI constructs Data types –INTEGER-2 31 to –Integer to –Unsigned32unsigned version of above –OCTET String16 bit binary or text data –OBJECT IDENTIFIERMIB information –IPaddress32 bit internet address –Counter3232 bit counter, wrap around –Counter6464 bit counter, wrap around –Gauge32non wrapping counter –TimeTicks1/100ths of a second since an event –Opaquestring

MIB Information Object Identifier tree

MIB information Organizes protocol information (RFC 2578,2579,2580) –Sorta like the dewey decimal system for network monitoring. –Identification strings: sysDescr sysObjectID sysUpTime sysContact sysName sysLocation sysServices

Protocol Data Unit (PDU) Data string for SNMP information

SNMP Security Read Community –Read data information from the remote system Write Community –Write data to the remote system Trap Community –Receive alarm information from the remote system.

SNMP Security Encryption –SNMP transfers may be encrypted Authentication –Hashed function secret keys Playback protection –A hacker can’t hijack the PDU strings Access Control –Remote host can limit SNMP access to certain objects

Tools at USU Interpreting the data

Windows Administration User Accounts Group Accounts UPS Fault Tolerance Backups

System Administration Users –Files, Rights, Groups System –Security –Virus Protection –UPS –Fault Tolerance

System Admin Virus Protection –Scans incoming data for viruses –Scans the disk for trojans or backdoors –Must be updated regularly, all versions do this automatically if set up. –Beware of back door access to the server –Viruses may not slow down the server –Viruses may propagate via users address books

UPS Handles short duration power failures Can alert the operator of power failure Decide how long the UPS needs to power the system Does the server display need to be on? How much power does the server need? Does the UPS have an RS232 control port? Life of the UPS battery(ies)

Server Admin Fault Tolerance –Multiple power supplies –Multiple CPU’s –Fault Tolerant Disk systems RAID 0 (disk striping) RAID 1 (disk mirroring) RAID 5 (disk striping with parity) –BACKUP

Server Fault Tolerance Dual Power supplies –Power supplies always fail first! –If one supply fails the other can take over Dual CPU’s –Speed performance –The system can operate with only 1 CPU operating

RAID! RAID 0 –Disk Striping –No fault tolerance RAID 1 –Disk Mirroring –High Disk Overhead (2-2GB disks=2GB) –High Write overhead (write to both disks)

MORE RAID! RAID 5 –disk striping –parity blocks –Requires at least 3 disk drives –Can improve disk performance –lose and replace 1 disk drive and no data is lost –overhead is 1/N n=number of disks, 5 10GB disks = 40 GB storage

Again Backups? Even a fault tolerant disk system can fail Always back up Always have several copies of backups in case one is unreadable Check the backups to see if they are readable Store the tapes or removable media in a safe place

Server Admin Watch Event Logs for errors –Log files grow rapidly, delete old logs Audit Disk usage and resources Decide when an upgrade is needed

Server Admin Monitoring (Task Manager) Resources: –Processor –Memory –Disk –Network Baseline –To determine what is different week to week

Server Administration Network –File Sharing –Printing –Mail

File Sharing Howto –Set up networking, allow sharing –Who will access the files? –Do they need write access? –Is it secure? Beware of instant messaging

Printing Local or remote Shared from PC or networked printer What about security? Gotchas

Mail Exchange (Microsoft) –POP Mail (Post Office Protocol) Downloads messages to the client –IMAP Mail (Internet Message Access Protocol) Downloads headers (subject) to the client Better Security –SMTP (Simple Mail Transfer Protocol) Sends messages from the client to the Internet –Calendaring (collaboration)

Mail Disk space SPAMMING Relaying

Network Administration