© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture14: DHCP Switched Networks Assistant Professor Pongpisit Wuttidittachotti,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
1 CCNA 4 v3.1 Module 6. 2 CCNA 4 v3.0 Module 6 Introduction to Network Administration.
CCNA 5.0 Planning Guide Chapter 4: Frame Relay.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 2: Connecting to the WAN.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 6: Broadband Solutions.
CCNA 5.0 Planning Guide Chapter 3: Point-to-Point Connections.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 1: Hierarchical Network Design.
CCNA 5.0 Planning Guide Chapter 1: Introduction to Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 5: Network Address Translation for IPv4.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11 Final.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Network Layer Network Fundamentals – Chapter 5.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Course Preview Cisco Packet Tracer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Jaskaran Kalsi Assoc. Technical Manager - Europe & CE April 2009
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing and Switching Essentials.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 10: DHCP Routing & Switching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA v3.1 Student Migration Guidelines February 21, 2008.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 6 Introduction to Network Administration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 6 Introduction to Network Administration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 6 Introduction to Network Administration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 CCNA Discovery v4.1 (Course 2) Student Review Guidelines April 2008.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA v3.1 Student Migration Guidelines December 17, 2007.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Subnetting IP Networks Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Best Practices IT Essentials 5.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Dynamic Host Configuration Protocol v6.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA Security 马刚、李涤非
Instructor Materials Chapter 8 Configuring Cisco Devices
Instructor Materials Chapter 8: Subnetting IP Networks
Instructor Materials Chapter 5: Network Security and Monitoring
Instructor Materials Chapter 13: The IT Professional
Instructor Materials Chapter 4: Access Control Lists
Instructor Materials Chapter 5 Providing Network Services
100% Exam Passing Guarantee & Money Back Assurance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Instructor & Todd Lammle
Chapter 10: Device Discovery, Management, and Maintenance
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CCNA Routing and Switching Routing and Switching Essentials v6.0
CCNA v3.1 Student Migration Guidelines
Chapter 5: Network Security and Monitoring
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
Instructor & Todd Lammle
Chapter 10: Advanced Cisco Adaptive Security Appliance
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Objectives  Explain syslog operation in a small-to-medium-sized business network.  Configure syslog to compile messages on a small-to-medium-sized business network management device.  Explain syslog operation in small-to-medium-sized business network.  Configure SNMP to compile messages on a small-to-medium- sized business network.  Describe NetFlow operation in a small-to-medium-sized business network.  Configure NetFlow data export on a router.  Examine sample NetFlow data to determine traffic patterns.

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Overview  This chapter covers three protocols that a network administrator can use to monitor the network.  Syslog, SNMP, and NetFlow are popular protocols with different strengths and weaknesses. Together, they provide a good toolset for understanding what is happening on a network.  The Network Time Protocol is used to synchronize time across devices, which is especially important when trying to compare log files from different devices.

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Activities What activities are associated with this chapter?  Class Activity – Network Maintenance Development  Activity – Interpreting Syslog Output  Packet Tracer – Configuring Syslog and NTP  Lab – Configuring Syslog and NTP  Activity – Identifying Characteristics of SNMP Versions  Lab – Researching Network Monitoring Software  Lab – Configuring SNMP  Activity – Comparing SNMP and NetFlow  Lab – Collecting and Analyzing NetFlow Data  Class Activity – A Network Monitor’s Toolbox for Monitoring

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Packet Tracer Activity Password The password for all the Packet Tracer activities in this chapter is: PT_ccna5

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Assessment  Students should complete Chapter 8 Exam after completing Chapter 8.  Worksheets, labs and quizzes can be used to informally assess student progress.

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms What terms are introduced in this chapter? Syslog Out-of-band (OOB) Internal Buffer Severity Level Facility Mnemonic Time-stamped Daemon Trap Level Pipe Option Simple Network Management (SNMP) Network Management System (NMS) Traps MIB

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms (cont.) What terms are introduced in this chapter? SNMPv1 SNMPv2Classic SNMPv2c SNMPv Community Strings Object ID Netflow Flexible Netflow Type of Service (TOS) Marking Netflow Collector

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  Prior to teaching Chapter 8, the instructor should complete Chapter 8, “Assessment.”  Emphasize the value in using network monitoring to not only know the “health” of your network, but to prevent future problems.  Inform students that syslog servers are either a free or paid application and that functional level varies among different servers.  Remind students that without timestamps, troubleshooting can be much harder as there is no way to view messages in synchronous time.  When discussing NetFlow, examples help students to understand why it is important. Quality of service (QoS) in an IP Phone and data network, for example. Chapter 8: Best Practices

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Additional Help  For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the CCNA Community at  If you have lesson plans or resources that you would like to share, upload them to the CCNA Community to help other instructors.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Topics Not in ICND  This section lists topics covered by this chapter that are NOT listed in the ICND Blueprint. Those topics are posted at  Instructors could skip these sections; however, they should provide additional information and fundamental concepts to assist the student with the topic.

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Topics Not in ICND What sections of this chapter are NOT in the ICND certification blueprint? 8.0SectionIntroduction 8.1.1TopicSyslog Operation 8.3.1TopicNetFlow Operation 8.3.2TopicConfiguring NetFlow 8.4SectionSummary

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential