autoscale: true build-lists: true slidenumbers: true footer: Managing Networks
Unit 5
Managing Networks
- Keshav Dulal
Learning Outcomes
- Know about networking management tools and technologies
- Understand network management functions
- Be able to carry out network management activities
1. Know about networking management tools and technologies.
- Network Technologies
- Network Management Tools
Network Technologies
- Network Operating Systems
- Network Protocols
- Network Layout
- Network Devices
1. Network Operating Systems
- Windows
- Linux
- MAC OS
2. Network Protocols
- Application Layer Protocols
- SNMPv3
- Simple Network Message Protocol
- ICMP -Internet Control Message Protocol
3. Network Layout
- Cabling
- Topologies
- Wireless Networks
4. Network Devices
- Servers
- Workstations
- Interconnection devices
- Network cards
- Vendor specific hardware
Servers
Workstation
Interconnection Devices
Network Cards
Management Tools
- GUI Tools
- Command Line Tools
1. GUI Tools
- Angry IP Scanner
- WireShark
2. Command Line Tools
- ping
- traceroute / tracert
- tcpdump
- nmap
- ssh
fin
1. Know about networking management tools and technologies
- Network technologies
- Network Operating Systems
- Windows
- Linux
- Network Protocols
- SNMPv3
- ICMP
- Network Layout
- Cabling
- Topologies
- Wireless
- Network Devices
- Servers
- Workstations
- Interconnection devices
- Network cards
- Vendor specific hardware
- Network Operating Systems
- Networking tools & purpose
- Tools
- HP Openview
- Cisco Works
- Wireshark
- Angry IP
- Using system software eg to find network assets
- Purpose
- Fault management
- Performance management
- Tools
- Emerging technologies
- Server virtualization
- Video on demand
- Impact of emerging technologies
- Enhanced capabilities
- Faster
- Greater storage capacity
- Improved control
- New work methods
- Mobile working
- Home working
- Web centric applications
- Ease of use
2. Understand network management functions
- Network management functions:
“Network configuration is the process of maintaining and organizing the information of the network components. If the network needs repairing, any modifications, expansions or upgrades the network manager can refer to the NCM database and to decide what the best course of action is. The database contains the locations and network addresses of all hardware devices; it also contains information about the programs, versions and updates installed in network computers.
Network configuration is a major aspect of setting a network up, the network will be regularly tweaked to improve performance and solve any issues that arise.”
- Configuration management
- Configuration management is taken to include issues such as change control, hardware inventory mapping, software inventories and customization of systems.
- Fault management
- Fault management includes events, alarms, problem identification, troubleshooting, diagnosis and fault logging.
- Performance management
- Performance covers capacity planning, availability, response times, accuracy and throughput.
- Security management
- Security discusses policy, authorization, exceptions, logging etc.
- Accounting management
- Finally, accounting includes asset management, cost controls and payment for services.
- Configuration management
- Performance Variables
- Network throughput
- User Response Time
- Line Utilization
- Other activities eg
- Planning
- Designing
- Installing
- Network Operations
- Security
- Data Logging
- Checking Performance
- Traffic
- Reporting
3. Be able to carry out network management activities
- Regular maintenance activities
- Backup and Restore files
- User account creation and deletion
- Design and develop login scripts
- Virus scans
- File cleanup
- Tools
- To manage performance or fault find
- SNMP / HP Openview
- To manage performance or fault find
- Documentation
- Work logs
- Log resources used
- System testing
- Configuration options
- User accounts location eg choosing server and setting rights
- Drive mappings
- Other eg virus scanning options
- Security features:
- VPN access
- Firewall management
- Access control lists
-
Device hardening “In computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.
Hardening is the process to eliminate a means of attack by patching vulnerabilities, turning off non-essential services and configuring system with security controls such as password management, file permissions and disabling unused network ports.
The hardening activities for key management systems involve several steps to form layers of protection.”
- Remove all non-essential services and programs
- Every program is a potential entry point for a hacker. Cleaning out unnecessary programs and utilities from the computer can reduce the attack surface area. Programs such as FTP, telnet, and Rlogin should not be used. If the program is classified as non-essential for the company, it shouldn’t be allowed because hackers might take advantage by backdoors and security holes. This also involves disabling network ports and services that are no longer required for the operation of the system. Disabling removable media, or disabling automatic run features on removable media and enabling automatic malware checks upon media introduction can also help in reducing the attack surface area of the system.
- Upgrade and implement latest security patches
- In the digital age, it is important to realize that there is no perfect security. Vulnerabilities are often discovered in systems and appropriate security patches are released to fix the issue. Patch management is essential for maintaining and improving key management systems security posture. The security policy and standards for the organization should specify the process for obtaining, testing and deploying patches. Testing must be carried out on a confined system before deployment to ensure no functional problems are introduced by the patch
- Implement Least Privilege on user accounts and file systems
- Using the principle of least privilege to control access to sensitive system features, application, files and data. This also includes limiting user accounts to those needed for legitimate operations and disabling or removing accounts that are no longer required. The concept of least privilege is an important factor in designing a hardening checklist for servers.
- Password Management
- In a hardening checklist, password management includes the use of complex password, password expiry, password re-use period, password maximum days, password minimum length, and password change period. One should note that the hardening checklist should comply with the password policy of the organization. Replacing all default passwords and keys with strong passwords and randomly generated keys (or implement strong authentication, such as smart cards) should be part of the hardening checklist for key management system.
- Logging and auditing
- System, application and security logs should be enabled in the server. For example, in a linux server, by default syslog stores data in /var/log/ directory. It is useful to analyze unauthorized access or hacking attempts. Tamper-evident logs are recommended for proof of compliance to internal and/or external requirements.
- Enabling additional security features and configuration option
- Additional security features such as Mandatory Access Control (MAC) provided by SELinux can help in enforcing limitation on network and other programs. The hardening checklist for key management system should specify how these features can be enabled and the configuration settings for the process. It is also mandatory to configure and harden services such as SSH or RDP. The SSH hardening should detail how the SSH settings should be configured. The NIST publication on ‘A framework for Designing Cryptographic Key Management System’ recommends enabling optional security features as appropriate and selecting other configuration options that are secure.
- Remove all non-essential services and programs
- Continuous policy review
- Forensic analysis
- User rights
- Security policies and procedures
- Periodically review user access and rights
- Penetration testing
- Security
- Audits
- Review firewall
- Access control list policies
- Configuration Management
Switches
Definition
A network switch is a piece of hardware that allows multiple other devices to communicate with each other quickly and easily.
Types of Switches
- UnManaged / Automatic Switches
- Managed / Non-Automatic Switches
Choosing a Network Switch
- Number of Ports / Scalability
- Speed of Switch
- Cost
Advantages
- Reliability
- Ports
Disadvantages
- Single Point of failure
- Cost
Purpose of Networking Tool
- Fault Management
- Performance Management
1. Fault Management
2. Performance Management
Emerging Network Technologies
- Server Virtualization
- Video on Demand
1. Server Virtualization
- OS Level Virtualization
- Hardware Level Virtualization
Uses of server virtualization
- Isolate applications
- Extend the life of older applications
- Help move things to the cloud
- Improve disaster recovery
- Increase uptime
- Reduce hardware vendor lock-in
- Faster server provisioning
- Reduce datacenter costs by reducing your physical infrastructure
- improving your server to admin ratio.
- Save cost / energy
2. Video on Demand (VOD)
Potential Impacts of emerging network technologies.
- Enhanced capabilities
- Faster greater storage capacity
- Improved controls
- New Work methods
- Home/remote working
- Mobile Working (ssh)
- Web Centric Applications
- Google Docs/Slides
- Ease of use
Impacts of Server Virtualization
- Reduce the no of physical servers
- Reduce the admin to server ratio
- Less physical servers means less power consumption
- Decrease data-center setup cost
- Contradict one server one application rule
Video on Demand
- Ease of USE
- MOOCs (Massive Online Occuring Courses)
- Different business prospect
- Increase in network bandwidth
- Increase in server redundancy/counts/mirrors
Functions of network management [P4]
- Configuration Management
- Fault Management
- User Accounts Management
- Account Management
- Performance Management
- Security management
1. Configuration Management
- managing the equipment in the network
- tracking the equipment in the network
- managing the addition/removal of equipment
- rerouting of traffic
- management of software versions on the equipment
- setting up, taking down, and keeping track of connections (Connection Management)
2. Fault Management
- Fault Detection
- detecting failures when they happen
- Fault Diagnosis & Isolation
- isolating the failed component
- Restoration
- restore traffic that may be disrupted due to the failure (if possible)
3. User Accounts Management
- Managing User Accounts
- The Username
- Passwords
- Access Control Information
- Managing Accounts and Resource Access Day-to-Day
- Managing User Resources
- Who Can Access Shared Data
- Where Users Access Shared Data
- What Barriers Are in Place To Prevent Abuse of Resources
4. Account Management
- billing
- tracking records of network components
5. Performance Management
- monitoring and managing the various parameters that measure the performance of the network
- provide quality-of-service
- FUP (fair usage policy)
6. Security management
- authenticating users
- setting permissions (RWX) on a per-user basis
Permission Types in Linux
- Read (R)
- Write (W)
- Execute (X)
Goals of Fault Management [M2]
- Fault detection The system discovers that service delivery has been interrupted or its performance has degraded.
- Fault diagnosis and isolation The source of the fault, such as a component failure or power outage, and its location in the network topology are identified.
- Event correlation and aggregation Because a single fault can cause multiple alarms, fault management systems often group related events for administrators and provide a root cause analysis.
- Restoration of service The network management system automatically executes any preconfigured scripts or programs to get services up and running as soon as possible.
- Problem resolution The source of the fault is corrected, repaired or replaced. Depending on the cause, manual intervention may be required.
P5 Network Interrogation & Finding Network Assets and configuration
- PING
- TRACEROUTE
- NMAP
Regular Maintenance Activities
- Backup & Restore Files
- User Accounts creation and deltetion
- Design & Develop login scripts
- Virus Scans
- File Cleanups
Backup & Restore Files
Many backup tools have different features that allow users to
- configure the the type of backup
- time of backup
- what to backup
- logging backup activities
Backup Utilities
- Rsync / Grsync
- Fwbackups
- Bacula
- Backupninja
- Simple backup Suite (sbackup)
- Kbackup
User Accounts creation and deletion
Useradd
- Linux command line tool
- Creates and populate a home directory for the new user.
- Sets permissions and ownerships to home directory.
User Information
- Username
- Password
- User ID (UID) (0-99)
- Group ID (GID)
- User Info
- Home Directory
- Shell
Useradd features
#[fit] Add a New User in Linux
- useradd john
#[fit] Setup Password
- passwd john
#[fit] User with Different Home Directory (-d)
- useradd -d /students/btec john
#[fit] Create a User with Specific User ID (-u)
- useradd -u 10 john
#[fit] User with Specific Group ID (-g)
- useradd -g 101 john
#[fit] Add a User to Multiple Groups (-G)
- useradd -G webadmin,developer john
#[fit] Add a User without Home Directory (-M)
- useradd -M john
#[fit] Create a User with Account Expiry Date (-e)
- useradd -e 2018-06-30 john
#[fit] Create a User with Password Expiry Date (-f)
- useradd -f 30 john
#[fit] Add a User with Custom Comments
- useradd -c “John Hill” john
#[fit] Change User Login Shell
- useradd -s /path/to/shell john
Some examples of useradd
- create a user name “RAM” with expiry date one year from today with user id 19 group id 500
useradd RAM -u 19 -g 500 -e 2019-06-14
- create a user name “SHYAM” with home directory “/users/tests” and user id 15
useradd SHYAM -d /users/tests -u 15
- create a user name “JOHN” with expiry date one month from today with comment “one month account”
useradd JOHN -e 2018-07-14 -c “one month account”
- Create a user named “DORA” with and put her on adminGang,eagleGang group
useradd DORA -G admingang, eagleGang
Design & Develop login scripts
Scripting basics
- Scripts are files containing command-line syntax
- Script files have extension .sh
Example Scripting Files
echo “Hello world!”
echo “This is a script file that opens up google.com”
open https://www.google.com
/etc/profile.d/
Files with the .sh extension in the “/etc/profile.d” directory get executed in following two cases.
- Upon entering a desktop session loaded by DisplayManager
- Upon entering a bash login shell via console or ssh (secure-shell)
- Upon entering a desktop session loaded by DisplayManager/Desktop Manager
- Upon entering a bash login shell via console or ssh (secure-shell)
File Cleanups
- Disk Space Analyzers
- Disk Inventory X
- Baobab
Performance / Fault Management Tools
- SpiceWorks
- HP Openview
SpiceWorks
- SNMP Monitoring Tool
- Real Time Monitoring
- Alert Mechanism
- Performance Dashboard
- Quick, Simple & Configurable
HP Openview
- a suite of business computer management programs from Hewlett-Packard (HP)
- Made particularly for HP 9000 and e3000 business server customers
HP Openview features
- manage applications
- device availability
- network conditions and status
- system performance
- service and program maintenance
- storage resources
Linux Logging
Types
- Application Logs
- Event Logs
- Service Logs
- System Logs
Default log directory
/var/log/
Common Linux log files and usage
- /var/log/messages : General message and system related stuff
- /var/log/auth.log : Authentication logs
- /var/log/kern.log : Kernel logs
- /var/log/maillog : Mail server logs
- /var/log/httpd/ : Apache access and error logs directory
- /var/log/boot.log : System boot log
- /var/log/mysqld.log : MySQL database server log files
- /var/log/utmp OR /var/log/wtmp : Login records
VPN
Virtual Private Network
Virtual Private Network, allows you to create a secure connection to another network over the Internet.
Uses
- Access a Business Network remotely
- Access Your Home Network remotely
- Hide Your Browsing Activity From Your Local Network and ISP
- Get rid of cookies based tracking
- Get rid of servers logging your IP
- Access Geo-Blocked Websites
- Use of spotify in Nepal
- Bypass Internet Censorship
- Use of vpn to access Gsuite (Google Docs, sheets etc) in China
VPN Service Providers
VPN Service Providers
- Open VPN
- Hola VPN (free)
- Express VPN
- Tunnel Bear VPN
- Strong VPN
- Nord VPN
FIREWALLS
What is a firewall?
A firewall is a network security software or device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Why do networks need a firewall?
Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.
Basic Types
- Hardware
- Software
- Both
Advanced Types
- Proxy firewall
- Stateful inspection firewall
- Unified threat management (UTM) firewall
- Next-generation firewall (NGFW)
- Threat-focused NGFW
Proxy firewall
An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support.
Stateful inspection firewall
Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.
Unified threat management (UTM) firewall
A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.
Next-generation firewall (NGFW)
Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks.
According to Gartner, Inc.’s definition, a next-generation firewall (NGFW) must include:
- Standard firewall capabilities like stateful inspection
- Integrated intrusion prevention
- Application awareness and control to see and block risky apps
- Upgrade paths to include future information feeds
- Techniques to address evolving security threats
- While these capabilities are increasingly becoming the standard for most companies, NGFWs can do more.
Threat-focused NGFW
These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation. With a threat-focused NGFW you can:
- Know which assets are most at risk with complete context awareness
- Quickly react to attacks with intelligent security automation that sets policies and hardens your defenses dynamically
- Better detect evasive or suspicious activity with network and endpoint event correlation
- Greatly decrease the time from detection to cleanup with retrospective security that continuously monitors for suspicious activity and behavior even after initial inspection
- Ease administration and reduce complexity with unified policies that protect across the entire attack continuum
Access Control List (ACL)
What is ACL?
Access Control List (ACL) are filters that enable you to control which routing updates or packets are permitted or denied in or out of a network.
Access lists filter network traffic by controlling whether routed packets are forwarded or blocked at the router’s interfaces. Your router examines each packet to determine whether to forward or drop the packet, on the basis of the criteria you specified within the access lists.
Uses
- Limits network traffic to increase network performance.
- ACLs provides traffic flow control by restricting the delivery of routing updates.
- It can be used as additional security.
- Controls which type of traffic are forwarded or blocked by the router.
- Ability to control areas for client access.
Network Security Policy
What is a Network Security Policy?
A network security policy is a set of rules put in place for how data is accessed. It defines what needs protecting, what processes are critical to the success of the company, and how to ensure the company is able to do business and fulfill its mission. It includes management objectives, rules for computer users and administrators and also specifies consequences for unauthorized usage or behavior.