© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network
Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Objectives Explain syslog operation in a small-to-medium-sized business network. Configure syslog to compile messages on a small-to-medium-sized business network management device. Explain syslog operation in small-to-medium-sized business network. Configure SNMP to compile messages on a small-to-medium- sized business network. Describe NetFlow operation in a small-to-medium-sized business network. Configure NetFlow data export on a router. Examine sample NetFlow data to determine traffic patterns.
Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Overview This chapter covers three protocols that a network administrator can use to monitor the network. Syslog, SNMP, and NetFlow are popular protocols with different strengths and weaknesses. Together, they provide a good toolset for understanding what is happening on a network. The Network Time Protocol is used to synchronize time across devices, which is especially important when trying to compare log files from different devices.
Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Activities What activities are associated with this chapter? Class Activity – Network Maintenance Development Activity – Interpreting Syslog Output Packet Tracer – Configuring Syslog and NTP Lab – Configuring Syslog and NTP Activity – Identifying Characteristics of SNMP Versions Lab – Researching Network Monitoring Software Lab – Configuring SNMP Activity – Comparing SNMP and NetFlow Lab – Collecting and Analyzing NetFlow Data Class Activity – A Network Monitor’s Toolbox for Monitoring
Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Packet Tracer Activity Password The password for all the Packet Tracer activities in this chapter is: PT_ccna5
Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Assessment Students should complete Chapter 8 Exam after completing Chapter 8. Worksheets, labs and quizzes can be used to informally assess student progress.
Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms What terms are introduced in this chapter? Syslog Out-of-band (OOB) Internal Buffer Severity Level Facility Mnemonic Time-stamped Daemon Trap Level Pipe Option Simple Network Management (SNMP) Network Management System (NMS) Traps MIB
Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms (cont.) What terms are introduced in this chapter? SNMPv1 SNMPv2Classic SNMPv2c SNMPv Community Strings Object ID Netflow Flexible Netflow Type of Service (TOS) Marking Netflow Collector
Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Prior to teaching Chapter 8, the instructor should complete Chapter 8, “Assessment.” Emphasize the value in using network monitoring to not only know the “health” of your network, but to prevent future problems. Inform students that syslog servers are either a free or paid application and that functional level varies among different servers. Remind students that without timestamps, troubleshooting can be much harder as there is no way to view messages in synchronous time. When discussing NetFlow, examples help students to understand why it is important. Quality of service (QoS) in an IP Phone and data network, for example. Chapter 8: Best Practices
Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Additional Help For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the CCNA Community at If you have lesson plans or resources that you would like to share, upload them to the CCNA Community to help other instructors.
Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Topics Not in ICND This section lists topics covered by this chapter that are NOT listed in the ICND Blueprint. Those topics are posted at Instructors could skip these sections; however, they should provide additional information and fundamental concepts to assist the student with the topic.
Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Topics Not in ICND What sections of this chapter are NOT in the ICND certification blueprint? 8.0SectionIntroduction 8.1.1TopicSyslog Operation 8.3.1TopicNetFlow Operation 8.3.2TopicConfiguring NetFlow 8.4SectionSummary
Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential
Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential