Policy-Based Management MIB Steve Waldbusser Jon Saperia Thippanna Hongal.

Slides:



Advertisements
Similar presentations
Richard The Management Model of the Centralized Network Architecture IETF 75th meeting, Stockholm draft-richard-opsawg-cna-mib-00.
Advertisements

Eiffel: Analysis, Design and Programming Bertrand Meyer (Nadia Polikarpova) Chair of Software Engineering.
Control Structures Ranga Rodrigo. Control Structures in Brief C++ or JavaEiffel if-elseif-elseif-else-end caseinspect for, while, do-whilefrom-until-loop-end.
May 12, 2015IEEE Network Management Symposium Page-1 Requirements for Configuration Management of IP-based Networks Luis A. Sanchez Chief Technology Officer,
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
Basic Elements of Programming A VB program is built from statements, statements from expressions, expressions from operators and operands, and operands.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Chapter 4 The Fundamentals of VBA, Macros, and Command Bars.
SwE 313 Introduction to Rational Unified Process (RUP)
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Chapter 6 Overview Simple Network Management Protocol
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
SNMP Management Information
HiVision SNMP Software.
SNMP (Simple Network Management Protocol)
IBM Proof of Technology Discovering the Value of SOA with WebSphere Process Integration © 2005 IBM Corporation SOA on your terms and our expertise WebSphere.
Effective Methods for Software and Systems Integration
Configuration Management With The Internet-Standard Management Framework Jon Saperia Adelaide IETF March 2000.
Chapter 4 SNMPv1: Organization and Information Models Network Management: Principles and Practice © Mani Subramanian Chapter 4.
1 Chapter Eight Exception Handling. 2 Objectives Learn about exceptions and the Exception class How to purposely generate a SystemException Learn about.
MT311 Java Application Development and Programming Languages Li Tak Sing( 李德成 )
1 Goals and objectives (1 slide only) Project(s): MIB Ad hoc, involves EMS-NMS (MEF 7.1) Purpose of the contribution: Provide the rationale behind starting.
JavaScript Lecture 6 Rachel A Ober
SNMP ITL. ITL: © Hans Kruse, Shawn Ostermann, Carl Bruggeman2 Objectives Overview of SNMP SNMP Tools SNMP Monitoring Infrastructure.
Communication and Functional Models
1 Strassner-Policy Theory and Practice – IM2001 Purpose of the PCIM Provide a set of classes and relationships that provide an extensible means for defining.
PhD Topic Template Based Composition PhD Course 5 th March – 9 th March 2012, Kaiserslautern.
Abierman-rmonwg-17mar03 1 RMONMIB WG 56th IETF San Francisco, California March 17, 2003 Discussion: Admin:
CS 453 Computer Networks Lecture 22 Network Management.
PosView Progress Report CS720H May, 3, POSTECH DP&NM Lab. (2)(2)CORBA-based Agent What we do? Development of network management platform: PosView.
Introduction to Computer Programming Using C Session 23 - Review.
429 SNMP. (c) 2001, Hans Kruse and Shawn Ostermann 2 Objectives  Overview of SNMP  SNMP Tools  Direct Access to Cisco Routers.
1 Compiler Construction (CS-636) Muhammad Bilal Bashir UIIT, Rawalpindi.
Internet Standard Management Framework
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
Introduction to SAS Macros Center for Statistical Consulting Short Course April 15, 2004.
Policy-Based Management with SNMP and Comparison with COPS-PR Steve Waldbusser 5/16/01.
CITA 440 Week 6 SNMPv1. Internet SNMP Management Internet Engineering Task Force (IETF) –1990SNMPv1 –1996SNMPv2 –1998SNMPv3 Internet documents: –Request.
 Introduction  Structure of Management Information  Practical Issues  Summary 2.
PSAMP MIB Status Managed Objects for Packet Sampling A Status Report Thomas Dietz Benoit Claise
PSAMP MIB Status Managed Objects for Packet Sampling A Status Report Thomas Dietz Benoit Claise
SSHSM Issues David Harrington IETF64 ISMS WG Vancouver, BC.
IBM Global Services © 2005 IBM Corporation SAP Legacy System Migration Workbench| March-2005 ALE (Application Link Enabling)
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Mastering SNMP Notes 25/12/2010. Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message format for communication.
Policy-Based Management MIB Steve Waldbusser Jon Saperia Thippanna Hongal.
Interpreting the Object Constraint Presented by: Ed Kausmeyer.
Chapter 36 Network Management & SNMP. Network management monitors network related hardware & software; troubleshoot network problems Detects major failures.
Doc.: IEEE /0927r0 Submission July 2005 Tim Olson, Cisco SystemsSlide 1 Client Management Protocol Details Notice: This document has been prepared.
PROGRAMMING USING PYTHON LANGUAGE ASSIGNMENT 1. INSTALLATION OF RASPBERRY NOOB First prepare the SD card provided in the kit by loading an Operating System.
 Problem Analysis  Coding  Debugging  Testing.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITL Getting Information: Packet Sniffing Cisco Router Commands SNMP.
1 Dynamic Classification in a Silicon-Based Forwarding Engine Technology Center, Nortel Networks & The University of Maryland Rob Jaeger
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Network management Communication model
Business rules.
SNMPv1 Network Management: Communication and Functional Models
IETF69 BOF XSD for accessing SMIv2 data models
Operating Wide-Area Ethernet Networks
Distribution and components
System and Network Management
CONCUR EPM Technology’s Express Data Manager™ (EDM) - 1
Lecture 7 Algorithm Design & Implementation. All problems can be solved by employing any one of the following building blocks or their combinations 1.
The Data Element.
Client Management Protocol Details
Simple Network Management Protocol
Lecture 2 - Names & Functions
Presentation transcript:

Policy-Based Management MIB Steve Waldbusser Jon Saperia Thippanna Hongal

Infrastructure SNMP MIBs PolicyFilterPolicyAction ifType == FastEthernet && roleString == trunk fullDuplexMode = ON ifType == Ethernet && roleString == GOLD Set QOS parameters to provide EF PHB Policy Table

Infrastructure SNMP MIBs PolicyFilterPolicyAction ifType == FastEthernet && roleString == trunk fullDuplexMode = ON ifType == Ethernet && roleString == GOLD Set QOS parameters to provide EF PHB Policy Table Role Table Capabilities Table Time Objects

PolicyTable PmPolicyEntry ::= SEQUENCE { pmPolicyIndex Integer32, pmPolicyFilter OCTET STRING, pmPolicyAction OCTET STRING, pmPolicyCalendar RowPointer, pmPolicyDescription SnmpAdminString, pmPolicyMatches Gauge32, pmPolicyStatus RowStatus }

Policy Expression Language u Derivative of C u Subsetted by a BNF Grammar u Used for both Filters and Actions

policyFilter PseudoCode (is an interface AND is an ethernet AND is an access port AND gets gold or silver service)

policyFilter PseudoCode (!strcmp(ifTable, elementName()) && getint(ifType.$1) == ethernet-csmacd && roleMatch("access") && (roleMatch("gold") || roleMatch("silver")))

policyFilter Code (!strncmp(" ", elementName(), 17) && getint(" $1") == 6 && roleMatch("access") && (roleMatch("gold") || roleMatch("silver")))

policyFilter/Action Example u Filter (!strcmp(ifTable, elementName()) && getint(ifType.$1) == ethernet-csmacd && roleMatch("connected")) u Action setint("ifAdminStatus.$1", 2) OR setint(" $1", 2)

Complex Actions u Compound Statements –setint(OID1, 2); setstring(OID2, “String”); setint(OID3, 5) u Conditional Statements –(!strcmp(getstring(sysDescr.0), “ACME”) ? (setint(AcmeQOSKnob1.$1, 17); setint(AcmeQOSKnob2.$1, 2345)) : (setint(diffServMIBKnob1.$1, 34); setint(diffServMIBKnob2.$1, 754)))

Accessor Functions u getint u getstring u exists u elementName u strcmp u lc_strcmp u roleMatch u capMatch u setint u setstring u setoid

PolicyTable

Role Table elementstring ifIndex.1 gold ifIndex.1 access ifIndex.1 headquarters ifIndex.99 trunk status active PmRoleESTable Purpose: u Writable table that allows strings to be downloaded to agent: u Multiple strings can be assigned to any element

Role Table PmRoleESEntry ::= SEQUENCE { pmRoleESElement OBJECT IDENTIFIER, pmRoleESString SnmpAdminString, pmRoleESStatus RowStatus } PmRoleSEEntry ::= SEQUENCE { pmRoleSEString SnmpAdminString, pmRoleSEElement OBJECT IDENTIFIER }

Role Table u Accessor Function: –Need an accessor function for use in policyFilter –Something like roleMatch(“argument”) –Returns true if the element has that role string defined

CapabilitiesTable index typesubType WFQ Pentium RoundRobinQ AcmeWFQ Purpose: u We want policies to be executed only on devices that have certain capabilities u Need those capabilities to be in a MIB so that policy servers can determine which policies to download u Values for type are assigned by the working group u Values for subType are assignable by the implementor

Capabilities Table u Accessor Function: –Need an accessor function for use in policyFilter –Something like capMatch(“argument”) –Returns true if the element has that capability u NOTE: –capabilitiesTable not referenced by element –Only used to determine which filters to download –On the other hand, capMatch has a per-element resolution –It must apply policies to only the proper elements

Time u We want policies to be executed only at certain times u Need time to be in a MIB so that filters can read them u Needs to provide two views of time –Globally consistent (i.e., UTCTime) –Local “Business Time” (i.e., M-F 9-5 local time)

Time Three choices: u policyCalendarPtr - points to rfc2591 u Accessor Function –Like: If (dayOfWeek(“MTWTF”)) then (policyAction) u Three mib objects –timeOfDay –dayofWeek –dayOfMonth –... –if (timeOfDay.0 > 9 && timeOfDay.0 < 17)

Operational Requirements u Policy Creation –Need to allow an engineer to “debug” a policy –policyActions can be debugged in a lab –Debugging of policyFilters consists of ensuring that the filter selects the intended set of elements (not more, not less) –Need to see where a policy would be executed –Table that shows where a policy is executed For debugging, set policyAction to no-op

pmPolicyDebugPETable PEPolicyIndex PEElementPEStatus ifIndex.4 ifIndex.8 ifIndex.9 ON 2ifIndex.4 ON 2ifIndex.8 ON

Operational Requirements u Troubleshooting in Field –Engineers will occasionally find that a device is misconfigured due to policy –Need to find out which policy is causing the misconfiguration –Need to see where policies are bound Table that shows what policies are executed here u Ad-hoc disabling of a policy binding –Granularity: 1 policy on 1 element –Turn status off in pmPolicyDebugEPTable –Need to provide facility so that this is documented in policyServer

pmPolicyDebugEPTable PEPolicyIndex PEElementPEStatus ifIndex.4 ifIndex.8 ON 2 ifIndex.8 ON 1 ifIndex.9 ON

Advantages of the Approach u Built with existing infrastructure and tools u Leverages existing MIBs u Flexibility u Complete Architecture –Includes operational tools

Architectural Drawings created during meeting

Policy Management MIB PM MIB Instance- Independence Services Instance- Independent Instance- Dependent

QOS Policy MIB Mechanism- Independence Services Mechanism- Independent Mechanism- Dependent

Instance Dependent Mechanism Dependent NMS Managed System QOS Policy MIB PM MIB

NMS Managed System QOS Policy MIB PM MIB Instance Independent Mechanism Dependent

NMS Managed System QOS Policy MIB PM MIB Instance Dependent Mechanism Independent

NMS Managed System QOS Policy MIB PM MIB Instance Independent Mechanism Independent