Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network.

Similar presentations


Presentation on theme: "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network."— Presentation transcript:

1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network

2 Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Objectives  Explain syslog operation in a small-to-medium-sized business network.  Configure syslog to compile messages on a small-to-medium-sized business network management device.  Explain syslog operation in small-to-medium-sized business network.  Configure SNMP to compile messages on a small-to-medium- sized business network.  Describe NetFlow operation in a small-to-medium-sized business network.  Configure NetFlow data export on a router.  Examine sample NetFlow data to determine traffic patterns.

3 Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Overview  This chapter covers three protocols that a network administrator can use to monitor the network.  Syslog, SNMP, and NetFlow are popular protocols with different strengths and weaknesses. Together, they provide a good toolset for understanding what is happening on a network.  The Network Time Protocol is used to synchronize time across devices, which is especially important when trying to compare log files from different devices.

4 Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Activities What activities are associated with this chapter?  8.0.1.2 Class Activity – Network Maintenance Development  8.1.1.5 Activity – Interpreting Syslog Output  8.1.2.5 Packet Tracer – Configuring Syslog and NTP  8.1.2.6 Lab – Configuring Syslog and NTP  8.2.1.7 Activity – Identifying Characteristics of SNMP Versions  8.2.1.8 Lab – Researching Network Monitoring Software  8.2.2.4 Lab – Configuring SNMP  8.3.1.4 Activity – Comparing SNMP and NetFlow  8.3.3.3 Lab – Collecting and Analyzing NetFlow Data  8.4.1.1 Class Activity – A Network Monitor’s Toolbox for Monitoring

5 Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 1: Packet Tracer Activity Password The password for all the Packet Tracer activities in this chapter is: PT_ccna5

6 Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Assessment  Students should complete Chapter 8 Exam after completing Chapter 8.  Worksheets, labs and quizzes can be used to informally assess student progress.

7 Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms What terms are introduced in this chapter? 8.1.1.1 Syslog Out-of-band (OOB) 8.1.1.2Internal Buffer 8.1.1.3 Severity Level Facility Mnemonic 8.1.1.4Time-stamped 8.1.2.1Daemon 8.1.2.3Trap Level 8.1.2.4Pipe Option 8.2.1.1 Simple Network Management (SNMP) Network Management System (NMS) Traps 8.2.1.1MIB

8 Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: New Terms (cont.) What terms are introduced in this chapter? 8.2.1.4SNMPv1 SNMPv2Classic SNMPv2c SNMPv3 8.2.1.5Community Strings 8.2.1.6Object ID 8.3.1.1Netflow Flexible Netflow 8.3.1.3 Type of Service (TOS) Marking 8.3.2.2 Netflow Collector

9 Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential  Prior to teaching Chapter 8, the instructor should complete Chapter 8, “Assessment.”  Emphasize the value in using network monitoring to not only know the “health” of your network, but to prevent future problems.  Inform students that syslog servers are either a free or paid application and that functional level varies among different servers.  Remind students that without timestamps, troubleshooting can be much harder as there is no way to view messages in synchronous time.  When discussing NetFlow, examples help students to understand why it is important. Quality of service (QoS) in an IP Phone and data network, for example. Chapter 8: Best Practices

10 Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Additional Help  For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the CCNA Community at http://community.netacad.net/web/ccna/files.http://community.netacad.net/web/ccna/files  If you have lesson plans or resources that you would like to share, upload them to the CCNA Community to help other instructors.

11 Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 8: Topics Not in ICND2 200-101  This section lists topics covered by this chapter that are NOT listed in the ICND2 200-101 Blueprint. Those topics are posted at http://www.cisco.com/web/learning/exams/list/icnd2b.html. http://www.cisco.com/web/learning/exams/list/icnd2b.html  Instructors could skip these sections; however, they should provide additional information and fundamental concepts to assist the student with the topic.

12 Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Topics Not in ICND2 200-101 What sections of this chapter are NOT in the ICND2 200-101 certification blueprint? 8.0SectionIntroduction 8.1.1TopicSyslog Operation 8.3.1TopicNetFlow Operation 8.3.2TopicConfiguring NetFlow 8.4SectionSummary

13 Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential

14 Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential


Download ppt "© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network."

Similar presentations


Ads by Google