Copyright 2007 Michael W. Lucas slide 1 HTGR- Netflow or, how to know what your network really did without going broke Michael W. Lucas

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Delivery and Forwarding of
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Supercomputing Center Measurement and Performance Analysis of Supercomputing Traffic by FlowScan+ 2.0 Supercomputing Center of KISTI Kookhan Kim August.
Csc333 Data communication & Networking Credit: 2.
CCNA 1 v3.1 Module 11 Review.
Embracing the chaos mark lorenc
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Access Lists Lists of conditions that control access.
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
Simple Comparison By Akhyari Nasir. Intro  Network monitoring and measurement have become more and more important in a modern complicated network. 
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
Web server and web browser It’s a take and give policy in between client and server through HTTP(Hyper Text Transport Protocol) Server takes a request.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
Flow tools APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
Step-by-Step Intrusion Detection using TCPdump SHADOW.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Network Monitoring Chapter 20.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
The Internet The History and Future of the Internet.
Open-Eye Georgios Androulidakis National Technical University of Athens.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Interpreting Network Traffic Flows Bill Jensen, Paul Nazario and Perry Brunelli.
Sniffer, tcpdump, Ethereal, ntop
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Net Flow Network Protocol Presented By : Arslan Qamar.
Protocol Layering Chapter 11.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Network Devices and Firewalls Lesson 14. It applies to our class…
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Solving Real-World Problems with Wireshark
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Flow tools APRICOT 2008 Network Management Taipei, Taiwan
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Packet Sniffing.
Topic 5: Communication and the Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 8: Monitoring the Network
Traffic Analysis– Traffic Forensic Example
Protocol Application TCP/IP Layer Model
Example 9 (Continued) 1. The first mask (/26) is applied to the destination address. The result is , which does not match the corresponding network.
Presentation transcript:

Copyright 2007 Michael W. Lucas slide 1 HTGR- Netflow or, how to know what your network really did without going broke Michael W. Lucas GKN Driveline North America, Inc.

Copyright 2007 Michael W. Lucas slide 2 What is the Problem? The network is more and more important The network is invisible It's easy to blame the network Ignorance of TCP/IP is rampant “The T1 is full? Full of what?” “What broke?” “Absence of evidence” != “evidence of absence”

Copyright 2007 Michael W. Lucas slide 3 What is the Solution? Know what happened on the network! Netflow is summary of historical network traffic. Tcpdump of all your switches might be better, but badly searchable and takes a lot of storage.

Copyright 2007 Michael W. Lucas slide 4 What Is a Flow? “A unidirectional sequence of packets all sharing the same source and destination IP address, source and destination port, and IP protocol.” Each TCP connection is two or more flows, at least one in each direction. Also known as “session-level data.”

Copyright 2007 Michael W. Lucas slide 5 What is Netflow? Netflow is a suite of tools and protocols for collecting, managing, and reporting on flow records. Netflow components can be mixed-and- matched as desired

Copyright 2007 Michael W. Lucas slide 6 What Netflow Gives You Who talked to who? How much was said? What port did they talk on? What protocol did they use? What TCP/IP flags did they use? All the history you have disk for

Copyright 2007 Michael W. Lucas slide 7 What Netflow Doesn't Give You The contents of the conversation You can see that you transferred 10kB out via HTTP, but not the contents of that data Alarms (at least, not directly)‏ Decent Mailing List Archives

Copyright 2007 Michael W. Lucas slide 8 Netflow record versions Netflow comes in many different versions: v5:today's lowest common denominator v7:switching information v9:sings, dances, does the dishes, IPv6 You don't care which one you have, so long as you have it.

Copyright 2007 Michael W. Lucas slide 9 Netflow Architecture Sensor(s)‏ Collector(s)‏ Analysis System(s)‏ These can be on the same system, or all on different systems, depending on available hardware and network architecture.

Copyright 2007 Michael W. Lucas slide 10 the sensor A program or device that sniffs the network Aggregates and condenses tcpdump-style information into flow records security-sensitive device very few system resources required flow records are flung across the network sensitive to network loss

Copyright 2007 Michael W. Lucas slide 11 the collector The software that catches records flung by the collector Stores the flows in files on disk Managing those flow files is your problem, not the collector software's. 5Mb/s uses 2GB disk/month

Copyright 2007 Michael W. Lucas slide 12 the reporting system Data files are nice, but you need to get information out of them. Choice of graphical or text reports Must have flexibility to transform and aggregate data in any way you desire.

Copyright 2007 Michael W. Lucas slide 13 Where to place each component? Sensor in a place you want to collect data from Collector in a secure environment Reporter only needs read access to collector files

Copyright 2007 Michael W. Lucas slide 14 Simple Network Two sensible collector points: inside & outside

Copyright 2007 Michael W. Lucas slide 15 Implementing the Sensor Choose your platform first, based on what you have Some Cisco switches, most routers speak Netflow natively Juniper speaks cflowd, aka Netflow v5 Implement on UNIX via softflowd (

Copyright 2007 Michael W. Lucas slide 16 implementing the collector The sensor throws stuff at the net, the collector catches it and stores it to disk Collector and reporting system are linked Need a secure system! Many flow collectors available:  flowd (developed by softflowd developer)‏  cflowd (obsolete)‏  flow-capture (part of flow-tools)‏

Copyright 2007 Michael W. Lucas slide 17 flow-tools history For many years, the standard toolkit Was neglected, has recently risen from the dead Original version is not 64-bit clean, new version is Not all tools interoperate well with new version yet

Copyright 2007 Michael W. Lucas slide 18 Which version? Old version: New version: tools/ When you need flowscan or Cflow.pm, use old version on i386 until new version has fixed Cflow.pm. Otherwise, use new version

Copyright 2007 Michael W. Lucas slide 19 Implementing Reporting Lots available, but most extensive by far is based on flow-tools Cflow.pm is older, but lots of tools built around it integrated with flow-capture

Copyright 2007 Michael W. Lucas slide 20 Cflowd Warning Cflowd is the primary predecessor of flow- capture. It is obsolete, deprecated, and referred to in many online documents. Cflowd does not build easily on amd64 (requires gcc 2.9)‏ You do not need Cflowd. You do need Cflow.pm, a different tool! May have to hack package management or build system

Copyright 2007 Michael W. Lucas slide 21 testing with flowdumper Cflow.pm includes flowdumper(1), a simple flow file query tool. If flowdumper works, you have successfully installed Cflow.pm and may continue # flowdumper -s ft-your-flow-file-here 2005/04/28 19:14: > (SYN|ACK) /04/28 19:14: > (SYN)

Copyright 2007 Michael W. Lucas slide 22 Report Systems Flowscan: Web-based CGI: Flowtracker – Web based, ad-hoc reporting: Flow-print, flow-stat, flow-nfilter: flow-tools, text- based Flowdumper: Cflow.pm command line, uses Perl on command line

Copyright 2007 Michael W. Lucas slide 23 CUFlow: FlowScan Module It's the quickest route to pretty pictures.

Copyright 2007 Michael W. Lucas slide 24 Flow-Tools Use flow-cat to open raw (binary) flow files flow-print will print them out much like flowdumper(1). flow-cat ft-*| flow-print Default format much like flowdumper -s, but calls bytes “octets”.

Copyright 2007 Michael W. Lucas slide 25 flow-print output Default Format: srcIP dstIP prot srcPort dstPort octets packets f 1 Format: Sif SrcIPaddress DIf DstIPaddress Pr SrcP DstP Pkts Octets StartTime EndTime Active B/Pk Ts Fl e63f :09: :09: b e63f :09: :09: b...

Copyright 2007 Michael W. Lucas slide 26 flow-nfilter “What is the most heavily used port on this server?” “Who is connecting from this foreign network?” “What sort of traffic are we seeing from this application?” Filtering can answer all of these easily.

Copyright 2007 Michael W. Lucas slide 27 using filters Specify the filter definition with -F filtername flow-cat ft-* | flow-nfilter -F allmail | flow-print Concatenate filters to make more complex queries on the fly flow-cat ft-* | flow-nfilter -F allmail | flow-nfilter -F washdc-office | flow-print

Copyright 2007 Michael W. Lucas slide 28 FlowGrapher Results

Copyright 2007 Michael W. Lucas slide 29 How Not To Go BOFH You have evidence, you can afford to be generous “Here is the evidence that shows that the network is working. I am, however, happy to help you diagnose and troubleshoot the problem you are having with your application.”