Top-Down Network Design Chapter Twelve Testing Your Network Design Oppenheimer.

Slides:



Advertisements
Similar presentations
Cultural Heritage in REGional NETworks REGNET Project Meeting Content Group
Advertisements

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 10 Performance Tuning.
P ART 4 T ESTING, O PTIMIZING AND D OCUMENTING Y OUR N ETWORK D ESIGN 1.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Chapter 19: Network Management Business Data Communications, 4e.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Hands-On Microsoft Windows Server 2008 Chapter 11 Server and Network Monitoring.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
CIS460 – NETWORK ANALYSIS AND DESIGN
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
MCTS Guide to Microsoft Windows 7
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 11 Robert D’Andrea 2015.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
VLAN Trunking Protocol (VTP)
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Access Control List (ACL)
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Access Control Lists Accessing the WAN – Chapter 5.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Integrating and Troubleshooting Citrix Access Gateway.
Module 7: Advanced Application and Web Filtering.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 11 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.
Network design Topic 6 Testing and documentation.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Prototyping the Campus Network Designing and Supporting Computer Networks.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Role Of Network IDS in Network Perimeter Defense.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
1 Presented by: Val Pennell, Test Tool Manager Date: March 9, 2004 Software Testing Tools – Load Testing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Configuring Network Devices
ITEC 275 Computer Networks – Switching, Routing, and WANs
Accessing the WAN – Chapter 5
ITEC 275 Computer Networks – Switching, Routing, and WANs
CITA 352 Chapter 5 Port Scanning.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Prepared By : Pina Chhatrala
ITEC 275 Computer Networks – Switching, Routing, and WANs
Securing the Network Perimeter with ISA 2004
Top-Down Network Design Chapter Twelve Testing Your Network Design
Introduction to Networking
Accessing the WAN – Chapter 5
Accessing the WAN – Chapter 5
Chapter 4: Access Control Lists (ACLs)
Requirements Definition
Presentation transcript:

Top-Down Network Design Chapter Twelve Testing Your Network Design Oppenheimer

Reasons to Test Verify that the design meets key business and technical goals Validate LAN and WAN technology and device selections Verify that a service provider provides the agreed- up service Identify bottlenecks or connectivity problems Determine optimization techniques that will be necessary

Testing Your Network Design Use industry testing services Build and test a prototype system Use third-party and Cisco tools

Industry Testing Services The Interoperability Lab at the University of New Hampshire (IOL) The Interoperability Lab at the University of New Hampshire (IOL) ICSA Labs Miercom Labs KeyLabs The Tolly Group

Scope of a Prototype System It’s not generally practical to implement a full- scale system A prototype should verify important capabilities and functions that might not perform adequately Risky functions include complex, intricate functions and functions that were influenced by the need to make tradeoffs

Components of a Test Plan Test objectives and acceptance criteria The types of tests that will be run Network equipment and other resources required Testing scripts The timeline and milestones for the testing project

Test Objectives and Acceptance Criteria Specific and concrete Based on business and technical goals Clear criteria for declaring that a test passed or failed Avoid biases and preconceived notions about outcomes If appropriate, reference a baseline

Types of Tests Application response-time tests Throughput tests Availability tests Regression tests

Resources Needed for Testing Scheduled time in a lab either at your site or the customer’s site Power, air conditioning, rack space, and other physical resources Help from coworkers or customer staff Help from users to test applications Network addresses and names

Example Test Script Network ANetwork B Server 1 Firewall Protocol Analyzer Workstations Protocol Analyzer

Example Test Script (continued) Test objective. Assess the firewall’s capability to block Application ABC traffic, during both light and moderately heavy load conditions. Acceptance criterion. The firewall should block the TCP SYN request from every workstation on Network A that attempts to set up an Application ABC session with Server 1 on Network B. The firewall should send each workstation a TCP RST (reset) packet.

Example Test Script (continued) 1. Start capturing network traffic on the protocol analyzer on Network A. 2. Start capturing network traffic on the protocol analyzer on Network B. 3. Run Application ABC on a workstation located on Network A and access Server 1 on Network B. 4. Stop capturing network traffic on the protocol analyzers. 5. Display data on Network A’s protocol analyzer and verify that the analyzer captured a TCP SYN packet from the workstation. Verify that the network layer destination address is Server 1 on Network B, and the destination port is port 1234 (the port number for Application ABC). Verify that the firewall responded to the workstation with a TCP RST packet.

Example Test Script (continued) 6. Display data on Network B’s protocol analyzer and verify that the analyzer did not capture any Application-ABC traffic from the workstation. 7. Log the results of the test in the project log file. 8. Save the protocol-analyzer trace files to the project trace- file directory. 9. Gradually increase the workload on the firewall, by increasing the number of workstations on Network A one at a time, until 50 workstations are running Application ABC and attempting to reach Server 1. Repeat steps 1 through 8 after each workstation is added to the test.

Tools for Testing a Network Design Network-management and monitoring tools Traffic generation tools Modeling and simulation tools QoS and service-level management tools

Summary An untested network design probably won’t work It’s often not practical to test the entire design However, by using industry testing services and tools, as well as your own testing scripts, you can (and should) test the complex, risky, and key components of a network design

Review Questions Why is it important to test your network design? Why is regression testing important? What are some characteristics of well-written acceptance criteria? What are some characteristics of a good network simulation tool?