IPv6 Network Assessor 111 © 2005 Cisco Systems, Inc. All rights reserved. Susan Shareshian Solutions Manager, Cisco Systems, Inc.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved..
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Planning Server Deployments
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Voice Issues.
Implementing a Highly Available Network
System Security Scanning and Discovery Chapter 14.
Chapter 19: Network Management Business Data Communications, 4e.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Presentation Using the Cisco Technical Support.
MICROSOFT ASSESSMENT AND PLANNING (MAP) TOOLKIT LAB Dev Chaudhari zevenseas India.
VMware vCenter Server Module 4.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for LAN Issues.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Module 10 Configuring and Managing Storage Technologies.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.

Module 4: Add Client Computers and Devices to the Network.
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for IP Routing Issues Cisco TAC Web Seminar.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
An Introduction to IBM Systems Director
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
SCSC 311 Information Systems: hardware and software.
Learningcomputer.com SQL Server 2008 Configuration Manager.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Computer Emergency Notification System (CENS)
WINDOWS XP PROFESSIONAL AUTOMATING THE WINDOWS XP INSTALLATION Bilal Munir Mughal Chapter-2 1.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Paul Butterworth Management Technology Architect
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Web Site for LAN Switching Issues Cisco TAC Web Seminar.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
Microsoft Management Seminar Series SMS 2003 Change Management.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for IP Routing.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Early vs. Cautious IPv6 deployment Issues and trade-offs Tony Hain Cisco.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Web Site for Network Security and Virtual Private.
© 2002, Cisco Systems, Inc. All rights reserved..
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Troubleshooting Workflow 8 Raymond Cruz, Software Support Engineer.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
IBM Tivoli Provisioning Manager IPv6 Enablement
Instructor Materials Chapter 5: Network Security and Monitoring
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 5: Network Security and Monitoring
Migration Strategies – Business Desktop Deployment (BDD) Overview
Routing and Switching Essentials v6.0
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

IPv6 Network Assessor 111 © 2005 Cisco Systems, Inc. All rights reserved. Susan Shareshian Solutions Manager, Cisco Systems, Inc.

2 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Session Agenda Impetus Behind the Development Efforts Overview of the Network Assessor Tool Plans for the Future

3 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Why are we moving to IPv6? 333 © 2005 Cisco Systems, Inc. All rights reserved. RST _04_2005_c2

4 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. The Office of Management and Budget (OMB) is requiring all Federal agencies to transition their network backbones to IPv6 by June 2008 IPv6 Enables New Services and Applications Many other countries are already well on their way to implementing IPv6 Business and Technical Reasons

5 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. How Do We Get There from Here? IT Departments must include IPv6 as a core element of their IT strategy Applications must become IP version agnostic Education and careful planning are crucial Baseline and test any anticipated changes/installations IPv4 & IPv6 will coexist for the foreseeable future No D-Day / Flag Day Approximately 1/3 of the deployed desktop systems are ‘IPv6 capable’ Service providers are deploying IPv6 now!

6 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. What’s the cost? Hardware Costs Short Term, replace devices that don’t understand IPv6 or perhaps just a software upgrade Long Term, normal lifecycle replacement as IPv6 becomes prevalent *Offering Dual-Stack uses more memory and processing power Software Costs Most “modern” hardware, routers, servers, clients, can be upgraded to support IPv6 COTS applications are moving that way now Custom applications that make socket calls need to be made protocol agnostic Human Capital Costs associated with Training Cost to train an organization’s personnel to install, operate, maintain, and service IPv6 hardware and software Operational Costs of multiple IP environments

7 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. IPv6 Network Assessor 777 © 2005 Cisco Systems, Inc. All rights reserved. RST _04_2005_c2

8 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco IPv6 Network Assessor Description Identifies and polls selected devices and collects appropriate data which then indicates the capability to support IPv6 Provides observations and recommendations that may be used by the customer as guidelines for future design issues Assessment examines Cisco IOS® based routers and Catalyst® Operating System (CatOS) and IOS® based switches, and provides for a general overview of the devices If more in-depth device evaluation is required, additional audits that provide device specific information such as the GSR audit, as well as audits that provide a baseline over time, are available as part of Cisco® Advanced Services IPv6 Network Assessor is a stand alone portable tool that can inventory classified and nonclassified networks

9 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco IPv6 Network Assessor Capability Reports Results may be organized as follows: The device is currently capable of supporting IPv6 features; hardware and software upgrades are not required The device needs: IOS upgrade Flash memory upgrade Processor memory upgrade Both flash and processor memory upgrades Memory and IOS upgrades The device is not capable of supporting IPv6 services The analysis was unable to determine the device’s capability to support IPv6; further analysis is required Cisco IPv6 capability assessments are designed to build a meaningful report on the network device capability to support IPv6

10 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Components Native Windows Application Runs under: Windows XP Professional Windows 2000 Server Windows Server 2003 Microsoft SQL Server Data Repository MSDE or SQL Server 2000 SP3a Local or Remote Installation Key Features Discovery SNMP or Fingerprint Credentialed Inventory Telnet/SSH Exception Tracking and Reporting Extensive Operator Controllable Multi-Threading for Concurrent Processing IPv6 Capability Reports Query and Data Export Facility Cisco IPv6 Network Assessor

11 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Discovery SNMP Discovery Discovery One or more IP address ranges specified by the operator Inventory snmpget retrieves MIB-I data Security Requirements Read-only (public) SNMP community string. Notes Devices will respond if and only if (IFF): Device exists SNMP Agent running Valid read-only community string Not IP address restricted Device will not respond Unless ALL conditions above are satisfied Fingerprinting Discovery One or more IP address ranges specified by the operator. Icmp echo to determine if device exists Inventory IP port scans (a.k.a. port probes) Library of known device responses One or more “guesses” Reverse DNS lookup Security Requirements None. Notes Will be detected and isolated by any customer intrusion detection software.

12 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Credentialed Inventory Configure Settings Seed File Requirements Host List, Username & Password, Group Names…. Importing Seed File into Settings with Import Wizard Building the Database Running multiple scans to collect every available target Using Exception Reporting to keep track of multiple scans Exporting Scan Status Reports How many scans are required to build a database Inventory Queries each Switch and/or Router by invoking a series of “show” commands Communication with target hosts via Telnet or SSH Security Requirements Username and Password with sufficient privileges to execute the “show” commands on the target

13 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Plans for the Future 13 © 2005 Cisco Systems, Inc. All rights reserved. RST _04_2005_c2

14 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. IPv6 Audit Local Audit capabilities – Multi Vendor –5 day or 7 day –Trending, utilization, capacity –IPv6 capability and recommendations Capture and Report IPv6 Capability of every device on the network –Servers –IP Phones –Applications

15 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. IPv6 Services Practice IPv6 Migration and Assessment Services –Certified Engineers –Best Practices –Tools –Secure Facilities –Documentation Repository –Dedicated Engineering and Testing Facilities Next Phase of tool……. –Security Assessments

16 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved.