Traffic Analysis and Device Management Based on Netflow Data in MREN Best Practice Document

Traffic Analysis and Device Management Based on Netflow Data in MREN Best Practice Document

Traffic Analysis and Device Management based on NetFlow data in MREN Best Practice Document Produced by the MREN-led working group on campus networking Authors: M. Čabak (MREN), V. Gazivoda (MREN), B. Krstajić (MREN) April 2015 © GÉANT Association, 2015. All rights reserved. Document No: Version/ date: April 2015 Source language: Montenegrin Original title: “Analiza saobraćaja i upravljanje uređajima na osnovu netflow podataka u AMUCG” Original version/ date: Version 1 / 28 April 2014 Contact: Milan Čabak, [email protected]; Vladimir Gazivoda, [email protected]; Božo Krstajić, [email protected] MREN/Centar Informacionog Sistema is responsible for the contents of this document. The document was developed by the MREN- led working group on campus networking with the purpose of implementing joint activities on the development and dissemination of documents encompassing technical guidelines and recommendations for network services in higher education and research institutions in Montenegro. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 605243, relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3plus)'. Best Practice Document: Traffic Analysis and Device ii Management based on NetFlow data in MREN Table of Contents Executive Summary 1 1 Introduction 1 2 Network Traffic Analysis 2 2.1 Flow technologies 2 2.2 NetFlow Network Analysis 2 3 FNF Exporter Configuration 4 3.1 FNF Records Configuration 4 3.2 Defining the FNF Exporter 5 3.3 Creating the flow monitor 5 3.4 Flow monitor activation and deactivation 6 3.5 Displaying and removing the FNF record from the exporter 6 4 FNF collector installation and configuration 8 5 Example of Network Device Management in MREN 15 5.1 Management process 15 5.1.1 Flow collector 16 5.1.2 NMS/Trap collector 18 5.1.3 Management mechanisms 20 5.1.4 Exporter 22 6 Application of proposed solution for management in MREN 23 7 Conclusion 25 References 27 Glossary 29 Best Practice Document: Traffic Analysis and Device iii Management based on NetFlow data in MREN Table of Figures Figure 4.1: Reviewing network traffic 9 Figure 4.2: Reviewing established connections for the selected host 9 Figure 4.3: Created IP Groups 10 Figure 4.4: Interfaces on devices performing data export 11 Figure 4.5: Most frequently used protocols 11 Figure 4.6: Most frequently used applications 12 Figure 4.7: Top network host conversations 12 Figure 4.8: Creating profiles for data display 13 Figure 4.9: Data display using filters 13 Figure 5.1: Schematic overview of the Network Device Management process 15 Figure 5.2: Information flow display for the selected IP Group 16 Figure 5.3: Creating the warning action for exceeding the threshold value 17 Figure 5.4: Alert for exceeding the threshold value 17 Figure 5.5: Trap collector interface with received trap messages 18 Figure 5.6: Received trap message 19 Figure 5.7: Trap message with OID values 19 Figure 5.8: Alert definition for the received trap message 20 Figure 5.9: Exporter (router) ACL list 22 Best Practice Document: Traffic Analysis and Device iv Management based on NetFlow data in MREN Executive Summary This document describes the monitoring and management methods for computer networks. The quality and availability of computer network services depends on the performance of the monitoring system, as well as the control system. This document presents the flow collector for assembling and analysing data on generated network traffic data obtained from network device exporters. A solution for network traffic analysis will be presented and used for implementing a network devices management system based on the qualitative analysis of network traffic. Some of the basic techniques for computer network management will also be analysed. The proposed solution sends warnings and automatic actions for changing the configuration of network devices, based on data obtained from qualitative network traffic analysis. Best Practice Document: Traffic Analysis and Device 1 Management based on NetFlow data in MREN 1 Introduction The complexity of today's computer networks is reflected in the variety of network types, media, technologies, services, and a large number of users. Network administrators require automated tools that will collect information about network elements and successfully manage this complex system. The need for tools which perform qualitative analysis of network traffic is becoming more prominent in order to have a better insight into the traffic passing through network links. In today's networks we cannot rely only on the information about the quantity of traffic, i.e. availability of links. Information about who or what uses the network resources, and when and how the resources are used, is also necessary. Network monitoring is a complex and challenging task of great importance for network administrators. Monitoring represents collection and analysis of data about network traffic. Specific mechanisms, which will manage network devices and the system in general, can be activated based on the collected data. Best Practice Document: Traffic Analysis and Device 1 Management based on NetFlow data in MREN 2 Network Traffic Analysis In modern computer networks, it is of great importance to possess the tools for network traffic analysis. A qualitative analysis of network traffic can be obtained from collection of data contained in flow exporters, as well as answers to questions about who or what, when and how uses the network resources. This knowledge is important for network administrators in terms of making the right decisions that can contribute to the whole organisation. There are different methods, and this document will provide a description of a flow-oriented software solution that uses distributed techniques for data collection. Unlike hardware monitoring devices, flow-oriented software techniques have advantages in terms of lower investment, easier installation and achieving results in a short period of time. 2.1 Flow technologies When selecting technologies, one should take into account which versions of flow technologies are supported by the network devices in a computer network. Implementation of flow-oriented technology requires devices which support flow technology in their specifications. Various manufacturers are developing different versions of flow technologies that are mainly variations of the same technology. Therefore, our NetFlow technology is supported mostly by Cisco devices [1], sFlow by Allied Telesis, and others such as JFlow by Juniper, Netstream by Huawei and IPFIX by Nortel network devices. Selection of the flow technology depends on the types of devices in the network and technologies. These technologies are quite different, but one should take these small differences into account because different software used for collection of this kind of data support one or more different flow technologies. Flow technologies from different manufacturers are not compatible with each other, although efforts are being made to standardise them. 2.2 NetFlow Network Analysis Each IP packet forwarded by a network device (i.e. an exporter), is examined in order to find the set of IP data. These data are IP packet identifiers and determine whether a packet is unique or part of a set of packets transmitted over a network. The IP packet header consists of a set of 5-7 attributes. IP address Best Practice Document: Traffic Analysis and Device 2 Management based on NetFlow data in MREN attributes used in NetFlow technology are: source IP address, destination IP address, source port, destination port, type of service (ToS field), and network device interface. Flow information is very useful in understanding the network behaviour. The source address enables an understanding of who creates traffic; the destination address provides information to whom the traffic is intended; the port indicates which application performs the communication; the type of service determines the priority of the traffic, while grouped packets and data show the amount of generated traffic. The flow also includes the following additional information: the time used for understanding communication duration and packet computing, next hop and the subnet mask of source and destination IP addresses prefix calculations. Best Practice Document: Traffic Analysis and Device 3 Management based on NetFlow data in MREN 3 FNF Exporter Configuration An ‘exporter’ is a network device with active NetFlow service. An exporter monitors packets passing through a device (i.e interfaces which are monitored) and creates a flow of these packages. Collected information is exported to the NetFlow collector in the form of flow records. Flexible NetFlow (FNF), unlike Traditional NetFlow (TNF), has several additional fields, which allows the organisation to oversee more specific information, so that the total amount of information that is exported is reduced, enabling improved scalability and aggregation. 3.1 FNF Records Configuration Flexible NetFlow (FNF) requires explicit configuration of flow records with all necessary and optional fields. The following configuration examples refer to the Cisco ASR 1002 network devices [2]. Basic and additional FNF fields on a network device are defined as follows: flow record [record name] description [record description]

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    36 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us