These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
1 Passwords and Banners Cisco Devices Packet Tracer.
Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Implementing a Highly Available Network
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
Implementing a Secure Console Server The Cyclades Project Co-Op Summer 2003 by Robert Perriero.
COEN 252: Computer Forensics Router Investigation.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
M ONITORING SERVER PERFORMANCE Unit objectives Use Task Manager to monitor server performance and resource usage Use Event Viewer to identify and troubleshoot.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Security monitoring boxes Andrew McNab University of Manchester.
National Chi Nan University Automatic Event-Driven System for Network Management Author: Ya-Ling Wang, Arak Sae Yuan, Quincy Wu Date : 2/21/2012.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
1 Daemons & inetd Refs: Chapter Daemons A daemon is a process that: –runs in the background –not associated with any terminal Unix systems typically.
2010 These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SWATCH Chris Anderson Matt White. Swatch: Its purpose Log file watcher – Originally, Swatch was written to actively monitor messages as they are written.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
Network Management Tutorial Log management. Log management and monitoring ■ What is log management and monitoring ? ■ It's about keeping your logs in.
VMware ESX and ESXi Module 3.
Instructor Materials Chapter 6: Network Layer
Implementing the syslog Protocol on a Radlan router
Working at a Small-to-Medium Business or ISP – Chapter 8
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
Chapter 4: Security Baselines
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Log management AfNOG 2008 Rabat, Morocco.
Chapter 6: Network Layer
Chapter 2: Basic Switching Concepts and Configuration
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
X Windows.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Windows Operating System
Presentation transcript:

These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license ( Log Management Network Management & Monitoring

Log Management and Monitoring What is log management and monitoring? Keeping your logs in a secure place where they can be easily inspected. Watching your log files. They contain important information: –Lots of things happen and someone needs to review them. –It’s not practical to do this manually.

Log Management and Monitoring On your routers and switches S ep 1 04:40: INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp (2167) -> (6662), 1 packet S ep 1 04:42: INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 ( ) % CI-3-TEMP: Overtemperature warning M ar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down S ep 1 04:40: INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp (2167) -> (6662), 1 packet S ep 1 04:42: INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 ( ) % CI-3-TEMP: Overtemperature warning M ar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down A ug 31 17:53:12 ubuntu nagios3: Caught SIGTERM, shutting down... A ug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from port 2039 ssh2 A ug 31 17:53:12 ubuntu nagios3: Caught SIGTERM, shutting down... A ug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from port 2039 ssh2 And, your servers

Centralize and consolidate log files Send all log messages from your routers, switches and servers to a single node – a log server. All network hardware and UNIX/Linux servers can be monitored using some version of syslog. Windows can, also, use syslog with extra tools. Save logs locally, but, also, save them to a central log server. Log Management

router switch Syslog storage syslog server Centralized logging

Cisco hardware –At a minimum: logging ip.of.logging.host Unix and Linux nodes –In /etc/syslog.conf, add: –Restart syslogd Other equipment have similar options –Options to control facility and level Configuring centralized logging

Identify the facility that the equipment is going to use to send its messages. Reconfigure syslogd to listen to the network.  Ubuntu: add ” -r ” to /etc/defaults/syslogd Add an entry to syslodg where messages are going to be written: local7.*/var/log/routers Create the file touch /var/log/routers Restart syslogd /etc/init.d/syslogd restart Receiving syslog messages

Uses UDP protocol, port 514 Syslog message have two attributes (in addition to the message itself): FacilityLevel AuthSecurity|Emergency(0) AuthprivUser|Alert(1) ConsoleSyslog|Critical(2) CronUUCP|Error(3) DaemonMail|Warning(4) FtpNtp|Notice(5) KernNews|Info(6) Lpr|Debug(7) Local0...Local7| Syslog basics

Using facility and level you can group by category in distinct files. With software such as syslog-ng you can group by machine, date, etc. automatically in different directories. You can use grep to review logs. You can use typical UNIX tools to group and eliminate items that you wish to filter: egrep -v '(list 100 denied|logging rate-limited)' mylogfile Is there a way to do this automatically? Grouping logs

Simple Log Watcher –Written in Perl –Monitors logs looking for patterns using regular expressions. –Executes a specific action if a pattern is found. –Can be any pattern and any action. –Defining the patterns is the hard part. SWATCH

ignore /things to ignore/ watchfor /NATIVE_VLAN_MISMATCH/ mail=root,subject=VLAN problem threshold type=limit,count=1,seconds=3600 watchfor /CONFIG_I/ mail=root,subject=Router config threshold type=limit,count=1,seconds=3600 ignore /things to ignore/ watchfor /NATIVE_VLAN_MISMATCH/ mail=root,subject=VLAN problem threshold type=limit,count=1,seconds=3600 watchfor /CONFIG_I/ mail=root,subject=Router config threshold type=limit,count=1,seconds=3600 Sample configuration What are these? What does it mean?

Syslog NG – Windows Event Log a Syslog: – SWATCH log watcher – – skendrick.txt – – _id=25401 References

References cont.

? Questions?