Agilent Technologies Copyright 1999 H7211A+221 v3.0 5-1 Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.

Slides:



Advertisements
Similar presentations
Access Control List (ACL)
Advertisements

Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
Chapter 9: Access Control Lists
Filtering and Security By Mohammad Shanehsaz June 2004.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Troubleshooting a “Broken LAN” Telecommunications and Networking.
Chapter 11 Configuring Dynamic Host Configuration Protocol
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Planning, Configuring, And Troubleshooting DHCP.
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
Lesson 19: Configuring Windows Firewall
DVG-N5402SP.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Year 2 - Chapter 6/Cisco 3 - Module 6 ACLs. Objectives  Define and describe the purpose and operation of ACLs  Explain the processes involved in testing.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.

Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Ch 8-3 Working with domains and Active Directory.
Ch 11 Managing System Reliability and Availability 1.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
Packet Tracer: Novice Session
Packet Tracer 4.1: Novice Session
Thrive Installation.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
Sniffer University 4-1 Analyzing Network Issues. Sniffer University 4-2 Troubleshooting Flowchart Monitor Apps Dashboard Host Table Matrix ART History.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Module 5: Creating IPv4 Address Spaces. Overview of IP Communication Subnetting Overview Subnetting for Complex Networks.
ACCESS CONTROL LIST.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Anritsu Automation Platform (AAP) AAP PC Connects to the system via IP connection (system switch) AAP was developed to add features that were requested.
© Agilent Technologies Copyright 2000 H7211A+212, Rev. 2.0 Introduction to the Agilent Technologies Internet Advisor.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
SQL Database Management
Instructor Materials Chapter 7: Access Control Lists
Instructor Materials Chapter 4: Access Control Lists
Basic router configuration
Troubleshooting a “Broken LAN”
Introduction to Opnet Mobile Networks Introduction to Opnet
Chapter 4: Access Control Lists (ACLs)
Chapter 4: Access Control Lists
Chapter 2: Static Routing
Network Analyzer :- Introduction to Wireshark
Configuration Of A Pull Network.
Gigabit Advisor: Module Objectives
Ethernet Analysis Using the HP Internet Advisor
Active Tests and Traffic Simulation: Module Objectives
Active Tests and Traffic Simulation: Module Objectives
Presentation transcript:

Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether frames are stored in the Advisor capture buffer or not. Set up to log data for baselining and benchmarking. Implement user defined subnet entries to tell the Advisor how to group addresses on your network.

Agilent Technologies Copyright 1999 H7211A+221 v Advisor Block Diagram RISC CPU MAIN CPU C O U N T E R S Network Interface Capture Buffer SYSTEM RAM Windows 98 GUI Specialized Hardware Line Vital Statistics PC Display Filters Max of 26 MB Capture Filters

Agilent Technologies Copyright 1999 H7211A+221 v Configuration (F10)

Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters TCP port 80 Server Address Bad FCS DNS queries RISC CPU MAIN CPU F I L T E R S C O U N T E R S Network Interface Capture Buffer SYSTEM RAM I/O SUBSYSTEM Specialized Hardware Example Filters: Addresses Filter criteria must be matched for frames to enter the capture buffer.

Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters Tab Go to the Capture Filters tab to define hardware filters

Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters: Add Use Capture Filters to control the information going into the Advisor. Description: Capture only frames to or from me Filter is enabled Uses 2 of 16 resources Use Add to create a new filter Graphical display of filter usage

Agilent Technologies Copyright 1999 H7211A+221 v LAN Filters Give your filter a name Optional description Choose whether to include or exclude frames from the buffer. You can also start, center or halt capture when the frame is matched Use LAN Filters tab to define filter

Agilent Technologies Copyright 1999 H7211A+221 v LAN Filters: Creating a Station Filter Advanced Options: Can specify encapsulation, Time to Live value, Next protocol code. Expand Station Filters, Expand Addressing, Enter Addresses, Select boxes to enable. If desired, use Advanced.

Agilent Technologies Copyright 1999 H7211A+221 v Protocol Filters This filter stores IP and Sun and DECnet frames. The “+” indicates more ports and protocols are available. Expand Protocol Filters, Check protocols to include in the filter.

Agilent Technologies Copyright 1999 H7211A+221 v Frame Attributes Frame Attributes Tab: Specify frame errors and values for hex bytes. Or enter text and hex bytes are entered automatically.

Agilent Technologies Copyright 1999 H7211A+221 v Quick Capture Filters Copy from Decodes Summary line and Paste into Capture Filters Copy Paste Capture Filters

Agilent Technologies Copyright 1999 H7211A+221 v Data Logging Go to the Log Tab to set up data logging.

Agilent Technologies Copyright 1999 H7211A+221 v Logging Parameters Connection Statistics and Expert Analyzer log data for each event. The other measurements log data at the specified interval. Select measurements to log to file.

Agilent Technologies Copyright 1999 H7211A+221 v More on Log Files When you log Expert, you are also logging Commentator, Connection Stats, and Protocol Vital Stats. Commentator Connection Stats Protocol Vitals

Agilent Technologies Copyright 1999 H7211A+221 v Workspace Options The last settings of Workspace Options are preserved on exit, and are not changed by merging a new configuration file.

Agilent Technologies Copyright 1999 H7211A+221 v LAN Addresses LAN Address Display options do not apply to Decodes. Use the Display Options available in Decodes right mouse click. Custom subnet definitions LAN Addresses Default subnet definitions Advisor IP address for Active Tests

Agilent Technologies Copyright 1999 H7211A+221 v Subnet Mask Info is an IP address, and is a subnet mask. IP uses numbers (addresses) to identify networks and to identify individual components of networks called hosts (e.g., a workstation or a router) Network Host: Host: Host: These addresses are divided into 4 octets giving a total of 32 bits to work with. The 1’s in a subnet mask mark the network ID and the 0’s mark the hosts = = Given an IP address and a subnet mask, the network number and host number can be determined. This network ID is 10.6, this particular host is

Agilent Technologies Copyright 1999 H7211A+221 v Troubleshooting Using Subnets If no User Defined Subnets were entered, this address would be (Class A) and you would not see that and were separate subnets. These nodes are connected to the subnet ,890 frames: to ,044 frames: to

Agilent Technologies Copyright 1999 H7211A+221 v Install Application

Agilent Technologies Copyright 1999 H7211A+221 v Measurements Settings Measurements

Agilent Technologies Copyright 1999 H7211A+221 v MAC Node Stats: 50 records of 10-second intervals Commentator / Connections Stats: 100 connections and events Decodes: number of frames in capture buffer Protocol Stats Line Vital Stats 200 records of measurement intervals Protocol Vital Stats Windows of Information Note: when examining a log file, all logged records for all logged measurements are available.

Agilent Technologies Copyright 1999 H7211A+221 v LAB 5.1

Agilent Technologies Copyright 1999 H7211A+221 v Module 5: Review You can create capture filters that control whether frames are stored in the Advisor capture buffer or not. You can log data for baselining and benchmarking. User defined subnet entries tell the Advisor how to group addresses on your network.