Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.

Slides:



Advertisements
Similar presentations
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Installation & management of SUSE.
Advertisements

Overview of network monitoring development at AMRES Slavko Gajin.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
NETS Training Troubleshooting Scot Colburn and David Mitchell 5/1/07.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Ch. 9 – Basic Router Troubleshooting CCNA 2 version 3.0.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Network Analyzer Example
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Module 1: Reviewing the Suite of TCP/IP Protocols.
Workshop 1: Introduction to TCP/IP
Hands-on Networking Fundamentals
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Chabot College ELEC Ports (Layer 4).
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
CIS 450 – Network Security Chapter 3 – Information Gathering.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
Networking Colin Alworth May 26, Quick Review IP address: four octets Broadcast addresses –IP addresses use all 1’s for the host bits, and whatever.
MIS Week 4 Site:
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
IP Telephone Lab 1 Connectivity Test IP Telephone Lab 2 Outline Ping & ICMP Fast Ping (fping) & AutoStatus One-Way Ping.
Sniffer, tcpdump, Ethereal, ntop
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Retina Network Security Scanner
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Network Layer: Address Mapping, Error Reporting, and Multicasting
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the network IPv4 CCNA Exploration Semester 1 – Chapter 6.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Network Monitoring Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
© 2003, Cisco Systems, Inc. All rights reserved.
Enumeration The First Step.
IDS Intrusion Detection Systems
Network Layer, and Logical Addresses
CITA 352 Chapter 5 Port Scanning.
Network Commands 2 Linux Ubuntu A.S.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
OSI Reference Model Kashif Ishaq.
Exercise 10 Toking Ring MTU=4464 Ethernet MTU=1500 FDDI MTU=4352 H1 H2
Presentation transcript:

Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski

Why Linux? 60% of web hosting is Linux based Linux is Open Source As effective as paid solutions Free to change for your needs – scalable Widely supported

Nagios Network Monitor Easy integration into existing networks GUI can immediately alert you to network errors Supports server, client, printer, and service monitor Can use environment sensors as well

Cacti Network statistics tool Uses Round Robin Archives MySQL & PHP Based – Customizable Robust and precise graphs Highly configurable Great network management tool

Nmap/Zenmap Network security auditing tool Find live hosts, report on any services that are running, detect the OS of the scanned system, and report on the version of the OS and services detected Strong port scanner Highly configurable Helps to harden your network from attacks

Iptraf Reports network traffic Supports a wide range of traffic including: IP, TCP, UDP, ICMP, IGMP, IGP, IGRP, OSPF, ARP, and RARP Interfaces supported: loopback, ethernet, FDDI, SLIP, Async PPP, Sync PPP over ISDN, ISDN IP encapsulation, ISDN Cisco HDLC encapsulation, and Parallel line IP Useful tool for determining what traffic is traveling on the network and where it is going

Mtr Combination of ping and traceroute Mtr reports: current, last, best, and worse latency, loss percentage, and sent packets to each hop that is taken to the destination Allows troubleshooting of any links that are down or might be running slow

Sources Linux Distros Nagioshttp:// Cactihttp:// nmap Iptrafhttp://iptraf.seul.org/ mtr