SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 8: Monitoring
the Network
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8
8.0 Introduction
8.1 Syslog
8.2 SNMP
8.3 NetFlow
8.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Objectives
 Explain syslog operation in a small-to-medium-sized business
network.
 Configure syslog to compile messages on a small-to-medium-sized
business network management device.
 Explain syslog operation in small-to-medium-sized business
network.
 Configure SNMP to compile messages on a small-to-medium-sized
business network.
 Describe NetFlow operation in a small-to-medium-sized business
network.
 Configure NetFlow data export on a router.
 Examine sample NetFlow data to determine traffic patterns.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
8.1 Syslog
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Syslog Operation
Introduction to Syslog
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Syslog Operation
Syslog Operation
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Syslog Operation
Syslog Message Format
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Syslog Operation
Service Timestamp
 Log messages can be time-stamped and the source address of
syslog messages can be set. This enhances real-time debugging
and management.
 The service timestamps log datetime command entered
in global configuration mode should be entered on the device.
 In this chapter, it is assumed that the clock has been set and the
service timestamps log datetime command has been
configured on all devices.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Syslog
Syslog Server
 The syslog server provides a relatively user-friendly interface for
viewing syslog output.
 The server parses the output and places the messages into pre-
defined columns for easy interpretation. If timestamps are
configured on the networking device sourcing the syslog
messages, then the date and time of each message displays in the
syslog server output.
 Network administrators can easily navigate the large amount of
data compiled on a syslog server.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Syslog
Default Logging
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Syslog
Router and Switch Commands for Syslog Clients
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring Syslog
Verifying Syslog
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
8.2 SNMP
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
Introduction to SNMP
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
SNMP Operation
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
SNMP Agent Traps
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
SNMP Versions
There are several versions of SNMP, including:
 SNMPv1 - The Simple Network Management Protocol, a Full
Internet Standard, defined in RFC 1157.
 SNMPv2c - Defined in RFCs 1901 to 1908; utilizes community-
string-based Administrative Framework.
 SNMPv3 - Interoperable standards-based protocol originally
defined in RFCs 2273 to 2275; provides secure access to devices
by authenticating and encrypting packets over the network. It
includes these security features: message integrity to ensure that a
packet was not tampered with in transit; authentication to
determine that the message is from a valid source, and encryption
to prevent the contents of a message from being read by an
unauthorized source.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
Community Strings
There are two types of community strings:
 Read-only (ro) – Provides access to the MIB variables, but does
not allow these variables to be changed, only read. Because
security is so weak in version 2c, many organizations use
SNMPv2c in read-only mode.
 Read-write (rw) – Provides read and write access to all objects in
the MIB.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
SNMP Operation
Management Information Base Object ID
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring SNMP
Steps for Configuring SNMP
Step 1. (Required) Configure the community string and access level
(read-only or read-write) with the snmp-server
community string ro | rw command.
Step 2. (Optional) Document the location of the device using the
snmp-server location text command.
Step 3. (Optional) Document the system contact using the snmp-
server contact text command.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring SNMP
Steps for Configuring SNMP (cont.)
Step 4. (Optional) Restrict SNMP access to NMS hosts (SNMP
managers) that are permitted by an ACL. Define the ACL
and then reference the ACL with the snmp-server
community string access-list-number-or-name
command.
Step 5. (Optional) Specify the recipient of the SNMP trap operations
with the snmp-server host host-id [version {1 |
2c | 3 [auth | noauth | priv]}] community-
string command. By default, no trap manager is defined.
Step 6. (Optional) Enable traps on an SNMP agent with the snmp-
server enable traps notification-types
command.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring SNMP
Verifying SNMP Configuration
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring SNMP
Security Best Practices
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24
8.3 NetFlow
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NetFlow Operation
Introduction to NetFlow
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NetFlow Operation
Purpose of NetFlow
Most organizations use NetFlow for some or all of the following key
data collection purposes:
 Efficiently measuring who is using what network resources for what
purpose.
 Accounting and charging back according to the resource utilization
level.
 Using the measured information to do more effective network
planning so that resource allocation and deployment is well-
aligned with customer requirements.
 Using the information to better structure and customize the set of
available applications and services to meet user needs and
customer service requirements.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
NetFlow Operation
Network Flows
NetFlow technology has seen several generations that provide more
sophistication in defining traffic flows, but “original NetFlow”
distinguished flows using a combination of seven key fields.
 Source and destination IP address
 Source and destination port number
 Layer 3 protocol type
 Type of service (ToS) marking
 Input logical interface
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring NetFlow
NetFlow Configuration Tasks
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Examining Traffic Patterns
Verifying NetFlow
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Examining Traffic Patterns
NetFlow Collector Functions
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Examining Traffic Patterns
NetFlow Analysis with a NetFlow
Collector
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary
 Syslog, SNMP, and NetFlow are the tools a network administrator
uses in a modern network to manage the collection, display, and
analysis of events associated with the networking devices.
 Syslog provides a rudimentary tool for collecting and displaying
messages as they appear on a Cisco device console display.
 SNMP has a very rich set of data records and data trees to both set
and get information from networking devices.
 NetFlow and its most recent iteration, Flexible NetFlow, provides a
means of collecting IP operational data from IP networks.
 NetFlow provides data to enable network and security monitoring,
network planning, traffic analysis, and IP accounting.
 NetFlow collectors provide sophisticated analysis options for
NetFlow data.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
F5 LTM TROUBLESHOOTING Guide latest.pptx
PPT
Organization and team structures
PPT
Law of contract
PPTX
Network address translation
PPT
Chapter 7 Presentation
PPTX
Tcp IP Model
PDF
CCNA - Routing & Switching Commands
PPT
Introduction to Contract Law
F5 LTM TROUBLESHOOTING Guide latest.pptx
Organization and team structures
Law of contract
Network address translation
Chapter 7 Presentation
Tcp IP Model
CCNA - Routing & Switching Commands
Introduction to Contract Law

What's hot (20)

PDF
CCMAv5 - S4: Chapter 6: Broadband Solutions
PDF
CCNAv5 - S4: Chapter 9 troubleshooting the network
PDF
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
PDF
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
PDF
CCNAv5 - S4: Chapter2 Connecting To The Wan
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
PDF
CCNAv5 - S4: Chapter 4 Frame Relay
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 8
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 5
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 4
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 10
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 1
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 4 Frame Relay
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Ad

Similar to CCNAv5 - S4: Chapter8 monitoring the network (20)

PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
PDF
CCNAv5 - S1: Chapter 7 - Transport Layer
PDF
محمد مشاري
PPTX
Chapter 7 : Transport layer
PPTX
CCNA4 Verson6 Chapter5
PPTX
Ccna v5-S1-Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PPTX
CCNA RS_NB - Chapter 5
PPTX
Chapter 19 : single-area ospf
PDF
CCNAv5 - S2: Chapter 8 single area ospf
PDF
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
PPTX
Sca n instructorppt_chapter1_final
PDF
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
PPTX
CCNA RS_ITN - Chapter 7
PPTX
3. Troubleshooting the NetworkNetwork.pptx
PPTX
3. Troubleshooting the NetworkNetwork.pptx
PPTX
CCNA_RSE_Chp10-01 for Networking Engineer.pptx
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
PPTX
CCNA_RSE_Chp10.pptx
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNAv5 - S1: Chapter 7 - Transport Layer
محمد مشاري
Chapter 7 : Transport layer
CCNA4 Verson6 Chapter5
Ccna v5-S1-Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA RS_NB - Chapter 5
Chapter 19 : single-area ospf
CCNAv5 - S2: Chapter 8 single area ospf
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Sca n instructorppt_chapter1_final
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNA RS_ITN - Chapter 7
3. Troubleshooting the NetworkNetwork.pptx
3. Troubleshooting the NetworkNetwork.pptx
CCNA_RSE_Chp10-01 for Networking Engineer.pptx
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA_RSE_Chp10.pptx
Ad

More from Vuz Dở Hơi (20)

PDF
Ceh v8 Labs - Module18: Buffer Overflow.
PDF
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
PDF
Cehv8 Labs - Module15: Hacking Wireless Networks.
PDF
Cehv8 Labs - Module14: SQL Injection
PDF
Cehv8 Labs - Module13: Hacking Web Applications.
PDF
Cehv8 Labs - Module12: Hacking Webservers.
PDF
Ceh v8 Labs - Module11: Session Hijacking.
PDF
Cehv8 Labs - Module10: Denial of Service.
PDF
Cehv8 Labs - Module09: Social Engineering.
PDF
Cehv8 Labs - Module08: Sniffers.
PDF
Cehv8 Labs - Module07: Viruses and Worms.
PDF
Cehv8 Labs - Module06: Trojans and Backdoors.
PDF
Cehv8 Labs - Module 05: System Hacking.
PDF
Cehv8 Labs - Module04: Enumeration
PDF
Cehv8 Labs - Module03: Scanning Networks.
PDF
Cehv8 Labs - Module02: Footprinting and Reconnaissance
PDF
Cehv8 - Labs Module 00
PDF
Cehv8 - Module18: Buffer overflow.
PDF
Cehv8 - references
PDF
Cehv8 - Module 20: penetration testing
Ceh v8 Labs - Module18: Buffer Overflow.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module12: Hacking Webservers.
Ceh v8 Labs - Module11: Session Hijacking.
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 - Labs Module 00
Cehv8 - Module18: Buffer overflow.
Cehv8 - references
Cehv8 - Module 20: penetration testing

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Pharma ospi slides which help in ospi learning
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Cell Structure & Organelles in detailed.
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharma ospi slides which help in ospi learning
human mycosis Human fungal infections are called human mycosis..pptx
Pre independence Education in Inndia.pdf
GDM (1) (1).pptx small presentation for students
Cell Structure & Organelles in detailed.
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Classroom Observation Tools for Teachers
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
TR - Agricultural Crops Production NC III.pdf
master seminar digital applications in india

CCNAv5 - S4: Chapter8 monitoring the network

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8 8.0 Introduction 8.1 Syslog 8.2 SNMP 8.3 NetFlow 8.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Objectives  Explain syslog operation in a small-to-medium-sized business network.  Configure syslog to compile messages on a small-to-medium-sized business network management device.  Explain syslog operation in small-to-medium-sized business network.  Configure SNMP to compile messages on a small-to-medium-sized business network.  Describe NetFlow operation in a small-to-medium-sized business network.  Configure NetFlow data export on a router.  Examine sample NetFlow data to determine traffic patterns.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 8.1 Syslog
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Syslog Operation Introduction to Syslog
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Syslog Operation Syslog Operation
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Syslog Operation Syslog Message Format
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Syslog Operation Service Timestamp  Log messages can be time-stamped and the source address of syslog messages can be set. This enhances real-time debugging and management.  The service timestamps log datetime command entered in global configuration mode should be entered on the device.  In this chapter, it is assumed that the clock has been set and the service timestamps log datetime command has been configured on all devices.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Syslog Syslog Server  The syslog server provides a relatively user-friendly interface for viewing syslog output.  The server parses the output and places the messages into pre- defined columns for easy interpretation. If timestamps are configured on the networking device sourcing the syslog messages, then the date and time of each message displays in the syslog server output.  Network administrators can easily navigate the large amount of data compiled on a syslog server.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Syslog Default Logging
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Syslog Router and Switch Commands for Syslog Clients
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring Syslog Verifying Syslog
  • 13. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13 8.2 SNMP
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation Introduction to SNMP
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation SNMP Operation
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation SNMP Agent Traps
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation SNMP Versions There are several versions of SNMP, including:  SNMPv1 - The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157.  SNMPv2c - Defined in RFCs 1901 to 1908; utilizes community- string-based Administrative Framework.  SNMPv3 - Interoperable standards-based protocol originally defined in RFCs 2273 to 2275; provides secure access to devices by authenticating and encrypting packets over the network. It includes these security features: message integrity to ensure that a packet was not tampered with in transit; authentication to determine that the message is from a valid source, and encryption to prevent the contents of a message from being read by an unauthorized source.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation Community Strings There are two types of community strings:  Read-only (ro) – Provides access to the MIB variables, but does not allow these variables to be changed, only read. Because security is so weak in version 2c, many organizations use SNMPv2c in read-only mode.  Read-write (rw) – Provides read and write access to all objects in the MIB.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Operation Management Information Base Object ID
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring SNMP Steps for Configuring SNMP Step 1. (Required) Configure the community string and access level (read-only or read-write) with the snmp-server community string ro | rw command. Step 2. (Optional) Document the location of the device using the snmp-server location text command. Step 3. (Optional) Document the system contact using the snmp- server contact text command.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring SNMP Steps for Configuring SNMP (cont.) Step 4. (Optional) Restrict SNMP access to NMS hosts (SNMP managers) that are permitted by an ACL. Define the ACL and then reference the ACL with the snmp-server community string access-list-number-or-name command. Step 5. (Optional) Specify the recipient of the SNMP trap operations with the snmp-server host host-id [version {1 | 2c | 3 [auth | noauth | priv]}] community- string command. By default, no trap manager is defined. Step 6. (Optional) Enable traps on an SNMP agent with the snmp- server enable traps notification-types command.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring SNMP Verifying SNMP Configuration
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring SNMP Security Best Practices
  • 24. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24 8.3 NetFlow
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NetFlow Operation Introduction to NetFlow
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NetFlow Operation Purpose of NetFlow Most organizations use NetFlow for some or all of the following key data collection purposes:  Efficiently measuring who is using what network resources for what purpose.  Accounting and charging back according to the resource utilization level.  Using the measured information to do more effective network planning so that resource allocation and deployment is well- aligned with customer requirements.  Using the information to better structure and customize the set of available applications and services to meet user needs and customer service requirements.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential NetFlow Operation Network Flows NetFlow technology has seen several generations that provide more sophistication in defining traffic flows, but “original NetFlow” distinguished flows using a combination of seven key fields.  Source and destination IP address  Source and destination port number  Layer 3 protocol type  Type of service (ToS) marking  Input logical interface
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring NetFlow NetFlow Configuration Tasks
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Examining Traffic Patterns Verifying NetFlow
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Examining Traffic Patterns NetFlow Collector Functions
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Examining Traffic Patterns NetFlow Analysis with a NetFlow Collector
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary  Syslog, SNMP, and NetFlow are the tools a network administrator uses in a modern network to manage the collection, display, and analysis of events associated with the networking devices.  Syslog provides a rudimentary tool for collecting and displaying messages as they appear on a Cisco device console display.  SNMP has a very rich set of data records and data trees to both set and get information from networking devices.  NetFlow and its most recent iteration, Flexible NetFlow, provides a means of collecting IP operational data from IP networks.  NetFlow provides data to enable network and security monitoring, network planning, traffic analysis, and IP accounting.  NetFlow collectors provide sophisticated analysis options for NetFlow data.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential