Flow tools APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

ICmyNet.Flow Network Traffic Analysis System If You Want to See Your Net
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
OpenFlow overview Joint Techs Baton Rouge. Classic Ethernet Originally a true broadcast medium Each end-system network interface card (NIC) received every.
Supercomputing Center Measurement and Performance Analysis of Supercomputing Traffic by FlowScan+ 2.0 Supercomputing Center of KISTI Kookhan Kim August.
TCPDUMP Network-Based Intrusion Detection. Description  Packet sniffing is the heart of intrusion detection and of understanding what is actually occurring.
Introduction to Network Analysis and Sniffer Pro
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Practical Networking. Introduction  Interfaces, network connections  Netstat tool  Tcpdump: Popular network debugging tool  Used to intercept and.
Netflow Overview Developed by Cisco Systems in 1996
Simple Comparison By Akhyari Nasir. Intro  Network monitoring and measurement have become more and more important in a modern complicated network. 
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Network Analysis While Preserving Privacy* Karl F. Lutzen Information Security Officer *meaning contents of transmission 1.
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
1 © 2000, Cisco Systems, Inc _05_2000_c3 Netflow Michael Lin.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Flow-tools Tutorial Mark Fullmer Agenda Deployment motivation. Network flows. Cisco / Juniper implementation – NetFlow. Cisco / Juniper Configuration.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
Presentation on Osi & TCP/IP MODEL
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Dividing the Pizza An Advanced Traffic Billing System An Advanced Traffic Billing System Christopher Lawrence Burke The University of Queensland.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Copyright 2007 Michael W. Lucas slide 1 HTGR- Netflow or, how to know what your network really did without going broke Michael W. Lucas
NetFlow and OARnet Mark Fullmer
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Net-flow APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008.
24/10/2015draft-novak-bmwg-ipflow-meth- 03.txt 1 IP Flow Information Accounting and Export Benchmarking Methodology
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
EECB 473 DATA NETWORK ARCHITECTURE AND ELECTRONICS PREPARED BY JEHANA ERMY JAMALUDDIN Basic Packet Processing: Algorithms and Data Structures.
Netflow Collection & Processing David Ripley. 2 Lead Network Security Developer, Advanced Network Management Laboratory Indiana University Network security.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Project Requirements (NetFlow Generator) 정승화 분산 처리 및 네트워크 관리 연구실 포항 공과 대학교
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Sniffer, tcpdump, Ethereal, ntop
Net Flow Network Protocol Presented By : Arslan Qamar.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Flow-tools Tutorial Mark Fullmer
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
POSTECH DP&NM Lab Detailed Design Document NetFlow Generator 정승화 DPNM Lab. in Postech.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
Mark Fullmer Flow-tools Tutorial Mark Fullmer
Solving Real-World Problems with Wireshark
CCNA Routing and Switching Routing and Switching Essentials v6.0
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
The OSI Model and the TCP/IP Protocol Suite
Hubs Hubs are essentially physical-layer repeaters:
Flow tools APRICOT 2008 Network Management Taipei, Taiwan
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Hubs Hubs are essentially physical-layer repeaters:
The OSI Model and the TCP/IP Protocol Suite
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
Programmable Networks
The OSI Model and the TCP/IP Protocol Suite
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Flow tools APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008

Flow-tools Collection of programs to post process Cisco NetFlow compatible flows. Written in C, designed to be fast (scales to large installations). Includes library (ftlib) for custom applications. Installation with configure;make;make install on most platforms (FreeBSD, Linux, Solaris)...

flow-capture Collect NetFlow exports and stores to disk. Built in compression. Manages disk space by expiring older flow files at configurable limits. Detects lost flows by missing sequence numbers and stores with flow metadata.

flow-fanout Replicate NetFlow UDP streams from one source to many destinations. Destination may be a multicast address.

flow-expire Expire (remove) old flow files based on disk usage. Same functionality built in to flow- capture. Used when managing disk space in a distributed environment.

Collector Placement and configuration NetFlow is UDP so the collector should ideally be directly connected to the router to minimize packet loss and IP spoofing risks. No flow control. Undersized collector will drop flows. Monitor netstat –s | grep buf and configure syslog so dropped flows will be logged.

flow-print Formatted output of flow files. eng1:% flow-print < ft-v | head -15 srcIP dstIP prot srcPort dstPort octets packets

flow-cat Concat many flow files or directories of files. eng1:% ls ft-v ft-v ft-v ft-v ft-v ft-v ft-v tmp-v eng1:% flow-cat. | flow-print srcIP dstIP prot srcPort dstPort octets packets

flow-merge Flow-merge is similar to flow-cat except it maintains relative ordering of flows when combining the files. Typically used when combining flows from multiple collectors.

flow-filter Filter flows based on port, protocol, ASN, IP address, ToS bits, TCP bits, and tags. eng1% flow-cat. | flow-filter -P119 | flow-print | head -10 srcIP dstIP prot srcPort dstPort octets packets

flow-split Split flow files into smaller files. Typically used with flow-stat and graphing. For example if flow files are 1 hour and want 5 minute data points in graph, flow-split can take the 1 hour flow files and generate 5 minute files.

flow-tag Adds a tag field to flows based on IP exporter, IP prefix, Autonomous System, or next hop. Like flow-filter used with other tools. Used to manage groups of prefixes or ASN’s.

flow-header Display meta information in flow file. eng1:% flow-header < ft-v # # mode: normal # capture hostname: eng1.oar.net # exporter IP address: # capture start: Mon Jan 21 09:33: # capture end: Mon Jan 21 09:45: # capture period: 676 seconds # compress: on # byte order: little # stream version: 3 # export version: 5 # lost flows: 0 # corrupt packets: 0 # sequencer resets: 0 # capture flows: #

flow-stat Generates reports from flow files. Output is readable and easily imported into graphing programs (gnuplot, etc). IP Address, IP address pairs, ports, packets, bytes, interfaces, next hop, Autonomous System, ToS bits, exporter, and tags.

flow-stat - summary Total Flows : Total Octets : Total Packets : Total Time (1/1000 secs) (flows): Duration of data (realtime) : Duration of data (1/1000 secs) : Average flow time (1/1000 secs) : Average packet size (octets) : Average flow size (octets) : Average packets per flow : Average flows / second (flow) : Average flows / second (real) : Average Kbits / second (flow) : Average Kbits / second (real) :

flow-stat – Source AS % Total # # src AS flows octets packets duration # NSFNETTEST14-AS ONENET-AS UONET UPITT-AS CONCERT OHIOU CMU-ROUTER BOSTONU-AS PURDUE STANFORD UR UMN-AGS-NET-AS RISQ-AS PENN-STATE RIT-ASN

flow-stat – Dest AS % Total # # dst AS flows octets packets duration # NSFNETTEST14-AS PENN-STATE CONCERT ONENET-AS STANFORD JANET DFN-WIN-AS CMU-ROUTER UONET PURDUE UMN-AGS-NET-AS UPITT-AS MIT-GATEWAYS RIT-ASN INDIANA-AS

flow-stat – Src/Dest AS % Total # # src AS dst AS flows octets packets duration # GEORGIA-TECH PENN-STATE NWU-AS UONET CONCERT UCLA NSFNETTEST14-AS CONCERT UONET BCNET-AS MIT-GATEWAYS UONET MIT-GATEWAYS STANFORD ONENET-AS-1 NSFNETTEST14-AS UONET PENN-STATE NOAA-AS NOAA-FSL DENET UONET NSFNETTEST14-AS UC-DOM ITALY-AS UONET NSFNETTEST14-AS CONCERT UONET ITALY-AS

flow-dscan DoS detection / network scanning tool. Flag hosts which have flows to many other hosts. Flag hosts which are using a large number of TCP/UDP ports. Works better on smaller networks or with flow-filter to limit traffic. For example filter TCP port 25 to detect hosts infected with e- mail worm.

flow-gen Debugging tool to generate flows. eng1:% flow-gen -V8.1 | flow-print | head -10 srcAS dstAS in out flows octets packets duration

flow-send Transmit flow files with NetFlow protocol to another collector. Can be used to take flow-tools files and send them to other NetFlow compatible collector.

flow-receive Like flow-capture but does not manage disk space. Output is to standard out and can be used directly with other flow-tools programs. Typically used for debugging. eng1:% flow-receive 0/0/5555 | flow-print flow-receive: New exporter: time= src_ip= dst_ip= d_version=8 srcPrefix srcAS dstPrefix dstAS input output flows / / / / / / / / / / / /

flow-import Import flows from other formats into flow-tools. Currently supports ASCII and cflowd formats.

flow-export Export flows from flow-tools files to other formats. Currently supports ASCII and cflowd formats. ASCII output can be used with perl or other scripting languages (with a performance penalty).

flow-xlate Translate flows among NetFlow versions. Originally intended for use with Catalyst switches since they export some flows in version 7 and others in version 5 format.

Front End applications Flow-tools is good at collecting raw flows You may need additional tools to generate customized reports Perl applications are very popular. –flowscan.pm –Cflow.pm –CuGrapher.pl Integration with RRDTool, MRTG etc. makes it more useful

References flow-tools: tools NetFlow Applications Netflow HOW-TO IETF standards effort:

References Abilene NetFlow page Flow-tools mailing list: flow- Cisco Centric Open Source Community