autoscale: true build-lists: true slidenumbers: true footer: Managing Networks

Unit 5

Managing Networks


Learning Outcomes

  1. Know about networking management tools and technologies
  2. Understand network management functions
  3. Be able to carry out network management activities

1. Know about networking management tools and technologies.

  1. Network Technologies
  2. Network Management Tools

Network Technologies

  1. Network Operating Systems
  2. Network Protocols
  3. Network Layout
  4. Network Devices

1. Network Operating Systems


2. Network Protocols


3. Network Layout


4. Network Devices


Servers

inline


Workstation

inline


Interconnection Devices

inline inline inline


Network Cards

inline


Management Tools

  1. GUI Tools
  2. Command Line Tools

1. GUI Tools


2. Command Line Tools


fin


1. Know about networking management tools and technologies


2. Understand network management functions


3. Be able to carry out network management activities


Switches

inline


inline


inline


Definition

A network switch is a piece of hardware that allows multiple other devices to communicate with each other quickly and easily.


Types of Switches


Choosing a Network Switch


Advantages

Disadvantages


Purpose of Networking Tool

  1. Fault Management
  2. Performance Management

1. Fault Management


2. Performance Management


Emerging Network Technologies

  1. Server Virtualization
  2. Video on Demand

1. Server Virtualization

  1. OS Level Virtualization
  2. Hardware Level Virtualization

Uses of server virtualization


2. Video on Demand (VOD)


Potential Impacts of emerging network technologies.


Impacts of Server Virtualization


Video on Demand


Functions of network management [P4]

  1. Configuration Management
  2. Fault Management
  3. User Accounts Management
  4. Account Management
  5. Performance Management
  6. Security management

1. Configuration Management


2. Fault Management


3. User Accounts Management

  1. Managing User Accounts
    • The Username
    • Passwords
    • Access Control Information
    • Managing Accounts and Resource Access Day-to-Day
  2. Managing User Resources
    • Who Can Access Shared Data
    • Where Users Access Shared Data
    • What Barriers Are in Place To Prevent Abuse of Resources

4. Account Management


5. Performance Management


6. Security management


Permission Types in Linux

  1. Read (R)
  2. Write (W)
  3. Execute (X)

Goals of Fault Management [M2]

  1. Fault detection The system discovers that service delivery has been interrupted or its performance has degraded.
  2. Fault diagnosis and isolation The source of the fault, such as a component failure or power outage, and its location in the network topology are identified.
  3. Event correlation and aggregation Because a single fault can cause multiple alarms, fault management systems often group related events for administrators and provide a root cause analysis.
  4. Restoration of service The network management system automatically executes any preconfigured scripts or programs to get services up and running as soon as possible.
  5. Problem resolution The source of the fault is corrected, repaired or replaced. Depending on the cause, manual intervention may be required.

P5 Network Interrogation & Finding Network Assets and configuration


Regular Maintenance Activities


Backup & Restore Files

Many backup tools have different features that allow users to


Backup Utilities


User Accounts creation and deletion

Useradd


User Information

  1. Username
  2. Password
  3. User ID (UID) (0-99)
  4. Group ID (GID)
  5. User Info
  6. Home Directory
  7. Shell

Useradd features


#[fit] Add a New User in Linux


#[fit] Setup Password


#[fit] User with Different Home Directory (-d)


#[fit] Create a User with Specific User ID (-u)


#[fit] User with Specific Group ID (-g)


#[fit] Add a User to Multiple Groups (-G)


#[fit] Add a User without Home Directory (-M)


#[fit] Create a User with Account Expiry Date (-e)


#[fit] Create a User with Password Expiry Date (-f)


#[fit] Add a User with Custom Comments


#[fit] Change User Login Shell


Some examples of useradd

  1. create a user name “RAM” with expiry date one year from today with user id 19 group id 500

useradd RAM -u 19 -g 500 -e 2019-06-14

  1. create a user name “SHYAM” with home directory “/users/tests” and user id 15

useradd SHYAM -d /users/tests -u 15

  1. create a user name “JOHN” with expiry date one month from today with comment “one month account”

useradd JOHN -e 2018-07-14 -c “one month account”

  1. Create a user named “DORA” with and put her on adminGang,eagleGang group

useradd DORA -G admingang, eagleGang


Design & Develop login scripts


Scripting basics


Example Scripting Files

echo “Hello world!”

echo “This is a script file that opens up google.com”

open https://www.google.com


/etc/profile.d/


Files with the .sh extension in the “/etc/profile.d” directory get executed in following two cases.

  1. Upon entering a desktop session loaded by DisplayManager
  2. Upon entering a bash login shell via console or ssh (secure-shell)

  1. Upon entering a desktop session loaded by DisplayManager/Desktop Manager

  1. Upon entering a bash login shell via console or ssh (secure-shell)

File Cleanups


Performance / Fault Management Tools


SpiceWorks


HP Openview


HP Openview features


Linux Logging

Types


Default log directory

/var/log/


Common Linux log files and usage


VPN

Virtual Private Network

Virtual Private Network, allows you to create a secure connection to another network over the Internet.


Uses


VPN Service Providers


VPN Service Providers


FIREWALLS


What is a firewall?

A firewall is a network security software or device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.


Why do networks need a firewall?

Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.


Basic Types

  1. Hardware
  2. Software
  3. Both

Advanced Types

  1. Proxy firewall
  2. Stateful inspection firewall
  3. Unified threat management (UTM) firewall
  4. Next-generation firewall (NGFW)
  5. Threat-focused NGFW

Proxy firewall

An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support.


Stateful inspection firewall

Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.


Unified threat management (UTM) firewall

A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.


Next-generation firewall (NGFW)

Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks.


According to Gartner, Inc.’s definition, a next-generation firewall (NGFW) must include:


Threat-focused NGFW

These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation. With a threat-focused NGFW you can:


Access Control List (ACL)


What is ACL?

Access Control List (ACL) are filters that enable you to control which routing updates or packets are permitted or denied in or out of a network.


Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router’s interfaces. Your router examines each packet to determine whether to forward or drop the packet, on the basis of the criteria you specified within the access lists.


Uses

  1. Limits network traffic to increase network performance.
  2. ACLs provides traffic flow control by restricting the delivery of routing updates.
  3. It can be used as additional security.
  4. Controls which type of traffic are forwarded or blocked by the router.
  5. Ability to control areas for client access.

Network Security Policy


What is a Network Security Policy?

A network security policy is a set of rules put in place for how data is accessed. It defines what needs protecting, what processes are critical to the success of the company, and how to ensure the company is able to do business and fulfill its mission. It includes management objectives, rules for computer users and administrators and also specifies consequences for unauthorized usage or behavior.