introduction to network management - net130.com · network management network management defined...

46
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. 8230_06_2003_X2.scr 1 1 © 2003, Cisco Systems, Inc. All rights reserved. NMS-1001 8230_06_2003_X2 1 © 2002, Cisco Systems, Inc. All rights reserved. 2 © 2003, Cisco Systems, Inc. All rights reserved. NMS-1001 8230_06_2003_X2 2 © 2002, Cisco Systems, Inc. All rights reserved. Introduction to Network Management Session NMS-1001

Upload: lylien

Post on 30-Apr-2018

253 views

Category:

Documents


1 download

TRANSCRIPT

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

111© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 1© 2002, Cisco Systems, Inc. All rights reserved.

2© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 2© 2002, Cisco Systems, Inc. All rights reserved.

Introduction toNetwork Management

Session NMS-1001

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

333© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 3© 2002, Cisco Systems, Inc. All rights reserved.

Agenda

Part I• The Need for Network Management

• Network Management Defined

• Protocols and Technologies

• Functional Areas of Network Management

Part II• Preparing a Network for Management

• Real World Applications of Proper Management Practices

4© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 4© 2002, Cisco Systems, Inc. All rights reserved.

Part INetwork Management Defined

Protocols and Technologies

Functional Areas of Network Management

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

555© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 5© 2002, Cisco Systems, Inc. All rights reserved.

The Case for Management

• Typical problemRegional user arrives at work and experiences slow or no response from corporate web server

• Where do you begin?Where is the problem?

What is the problem?

What is the solution?

• Without proper network management, these questions are difficult to answer

Corp Network

Regional Offices

WWW ServersWWW Servers

Remote UserRemote User

666© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 6© 2002, Cisco Systems, Inc. All rights reserved.

Corp Network

Regional Offices

WWW ServersWWW Servers

Remote UserRemote User

The Case for Management

• With proper management tools and procedures in place, you may already have the answer

• Consider some possibilities

1. What configuration changes were made overnight?

2. Have you received a device fault notification indicating the issue?

3. Have you detected a security breach?

4. Has your performance baseline predicted this behavior on an increasingly congested network link?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

777© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 7© 2002, Cisco Systems, Inc. All rights reserved.

The Case for Management

• An accurate database of your network’s topology, configuration, and performance

• A solid understanding of the protocolsand models used in communication between your management server and the managed devices

• Methods and toolsthat allow you to interpret and act upon gathered information

Response TimesResponse Times High Availability

High Availability

PredictabilityPredictability

SecuritySecurity

Solving a Typical Problem Like This Includes the Following:

888© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 8© 2002, Cisco Systems, Inc. All rights reserved.

ROI ExampleUsing a Management Tool for Daily Tasks

Number of Managed DevicesNumber of Managed Devices 800800

Average Manual Process Time Required (Man-Hours)Average Manual Process Time Required (Man-Hours)

Password ChangePassword Change

0.050.05 (3 Min/Device/Qtr)(3 Min/Device/Qtr)Software UpgradeSoftware Upgrade

0.250.25 (19 Min/Device/Bi-Annual)(19 Min/Device/Bi-Annual)

Gather Inventory InformationGather Inventory Information 0.030.03 (2 Min/Device/Qtr)(2 Min/Device/Qtr)

Documenting ChangesDocumenting Changes 0.080.08 (5 Min/Incident)(5 Min/Incident)

AuditAudit 30.0030.00 (Per Qtr)(Per Qtr)

Manual Configuration Error Rate 2%Manual Configuration Error Rate 2%Cost per Man-Hour Cost per Man-Hour $48.84$48.84

Configuration ManagementConfiguration ManagementProcessProcess

ManualProcedure

ManualProcedure

After Product ImplementationAfter Product

ImplementationTime

SavingsTime

SavingsROIROI

Password ChangePassword Change 435435 4444 391391 $19,106.21$19,106.21

Software UpgradeSoftware Upgrade 544544 0.370.37 544544 $26,551.05$26,551.05

Gather Inventory InformationGather Inventory Information 381381

0.670.67

380380 $18,565.71$18,565.71

Documenting ChangesDocumenting Changes 120120

0.670.67

$5,828.24$5,828.24

Required Man-Hours (per Annum)Required Man-Hours (per Annum)

119119

Total Configuration Management ROI Total Configuration Management ROI $70,051.21$70,051.21

Source: Cost Analysis Using CiscoWorks LAN Management Solution. Esaka, 2002Source: Source: Cost Analysis Using CiscoWorks LAN Management SolutionCost Analysis Using CiscoWorks LAN Management Solution. . EsakaEsaka, 2002, 2002

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

999© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 9© 2002, Cisco Systems, Inc. All rights reserved.

The Network Manager’s Responsibility

• Ensure that the users of a network receive the information technologyservices with the quality of service that they expect

• Strategic and tactical planning of the engineering, operations, and maintenance of a network and network services

• Help network engineers deal with the complexity of a data network and to make sure that data can go across it with maximum efficiency and transparency to the users

101010© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 10© 2002, Cisco Systems, Inc. All rights reserved.

Network ManagementNetwork Management

Network Management Defined

MaintenanceMaintenance

AdministrationAdministration

OperationsOperations

Key Network Management Tasks

Key Network Management Tasks

ProvisioningProvisioning VoIP VPN QoS

EfficiencyEfficiency

ProductivityProductivity

ControlControl

Key Network Management Success Factors

Key Network Management Success Factors

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

111111© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 11© 2002, Cisco Systems, Inc. All rights reserved.

Communicating with the Network

Managed Network Elements Are Waiting

to Provide Us with Useful Information…

Network Management Begins with an Understanding of How to Collect and Interpret

This Information

121212© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 12© 2002, Cisco Systems, Inc. All rights reserved.

Methods of Communication

Console

Telnet

HTTP

SNMP

Example Security Options

SSH

SSL (HTTPS)

SNMPv1, 2c – Access ListsSNMPv3 – Auth/Priv

Device UsernamesTACACS/RADIUS

Terminal Server

Embedded Device Management

ReflectionXSoftware

MRTGMulti Router

Traffic Grapher

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

131313© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 13© 2002, Cisco Systems, Inc. All rights reserved.

Two-Tier Management Communication

Database

} Network Elements

Network Queries

Unsolicited Events

{ Manager

Unmanaged Element

Managed Element

AgentAgent

Managed Element

AgentAgent

Managed Element

AgentAgent

NetworkManagement

System

The Model

141414© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 14© 2002, Cisco Systems, Inc. All rights reserved.

Two-Tier Management Communication

} Network Elements

Network Queries

Unsolicited Events

Router

The Real World CiscoWorksHP-OpenView

} NetworkManagementSystem

Call Manager

Printer RouterSwitch

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

151515© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 15© 2002, Cisco Systems, Inc. All rights reserved.

Unmanaged Element

ProxyAgentProxyAgent

Three-Tier Management Communication

}Network Elements

RMONProbeRMONProbe

The Model

MDB{ Manager

Managed Element

AgentAgent

NMS

161616© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 16© 2002, Cisco Systems, Inc. All rights reserved.

Three-Tier Management Communication

The Real World CiscoWorksConcord eHealth

} NetworkManagementSystem

SwitchProbe

Switch{Managed

Element

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

171717© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 17© 2002, Cisco Systems, Inc. All rights reserved.

SNMP Primer: Understanding the Agent

• Information storehouse

• Information structured as per Structure of Management Information (SMI) standards

• Object definitions provided in many Management Information Bases (MIBs)

NMS

IP Network

SNMPManageable

Device

ManagementEntity

ManagementEntity

SNMPAGENTSNMPAGENT

1000s ofDefined Objects

181818© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 18© 2002, Cisco Systems, Inc. All rights reserved.

SNMP Primer: Understanding the Protocol

• Get requests used to read the value of object

• Set requests used to modify the value of object

• Traps provide asynchronous event notification

NMS

IP Network

SNMPManageable

Device

SNMP v1, SNMP v2c

Trap !Trap !

Get Response

Get Request, Get-Next RequestGet-Bulk Request

Set Request

ManagementEntity

ManagementEntity

SNMPAGENTSNMPAGENT

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

191919© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 19© 2002, Cisco Systems, Inc. All rights reserved.

LevelLevel AuthAuth EncryptionEncryption What Happens

What Happens

SNMPv1SNMPv1 noAuthNoPrivnoAuthNoPrivUses a community stringmatch for authenticationUses a community stringmatch for authentication

CommunityString

CommunityString

SNMPv2cSNMPv2c noAuthNoPrivnoAuthNoPriv Uses a community stringmatch for authenticationUses a community stringmatch for authentication

CommunityString

CommunityString

SNMPv3SNMPv3 noAuthNoPrivnoAuthNoPriv Uses a usernamematch for authentication

Uses a usernamematch for authenticationUsernameUsername

SNMPv3SNMPv3 authNoPrivauthNoPrivProvides authenticationbased on HMAC -MD5 orHMAC -SHA algorithms

Provides authenticationbased on HMAC -MD5 orHMAC -SHA algorithms

MD5 or SHAMD5 or SHA

SNMPv3SNMPv3 authPrivauthPrivAdds DES 56-bit encryptionin addition to authentication

based on DES-56

Adds DES 56-bit encryptionin addition to authentication

based on DES-56MD5 or SHAMD5 or SHA DESDES

Configuring NM Protocols

SNMP

202020© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 20© 2002, Cisco Systems, Inc. All rights reserved.

Measurement TechnologySNMP Protocol - Background

• Simple Network Management Protocol• IOS versions

10.3 -> SNMPv1 + v2

11.0, 11.1, 11.2 -> SNMPv1 + v2

11.3 -> SNMPv1 + v2c

12.0 -> SNMPv1 + v2c

12.0(3)T -> SNMPv1 + v2c + v3

12.0(6)S -> SNMPv1 + v2c + v3

12.1 -> SNMPv1 + v2c + v3

12.2 -> SNMPv1 + v2c + v3

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

212121© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 21© 2002, Cisco Systems, Inc. All rights reserved.

• Hierarchically structured

• Each object uniquely identified

MIBsObject Identifiers

OID for System1.3.6.1.2.1.1

OID for System1.3.6.1.2.1.1

SNMPAGENTSNMPAGENT

Internet Engineering Task Force (IETF)

SNMP (11)SNMP (11)

Transmission (10)Transmission (10)

CMOT (9)CMOT (9)IP (4)IP (4)

Address Translation (3)Address Translation (3)

Interfaces (2)Interfaces (2)

System (1)System (1)

MIB-2 (1)MIB-2 (1)

EGP (8)EGP (8)

UDP (7)UDP (7)

TCP (6)TCP (6)

ICMP (5)ICMP (5)

Experimental (3)Directory (1) Management (2) Private (4)

Internet (1)

DOD (6)

Organization (3)

ISO (1)

...Unassigned (9118)Unassigned (9118)

Microsoft (311)Microsoft (311)

Enterprise (1)

Sun (42)Sun (42)

Apple (63)Apple (63)Cisco (9)Cisco (9)

HP (11)HP (11)

IBM (2)IBM (2)

Vendor AdministeredAdministered by

222222© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 22© 2002, Cisco Systems, Inc. All rights reserved.

SNMP Object Identification

• Need a scheme that allows two vendors or products within a vendor to compare like items

Object Identifiers (OID) were chosen as the identification scheme

An OID is an ordered sequence of non-negative integers written left to right, containing at least two elements (0.0)

Bound to simple names in MIB Modules:

“ifDescr” is 1.3.6.1.2.1.2.2.1.2

“ifInOctets” is 1.3.6.1.2.1.2.2.1.10

enterprises

1

cisco

9

ciscoMgmt

9

Private

4

iso

org dod

internet

mgmt

Mib-2

1

3

6

1

2

1

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

232323© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 23© 2002, Cisco Systems, Inc. All rights reserved.

enterprises

1

cisco

9

ciscoMgmt

9

Private

4

SNMP Object Identifiers

11

12

13

14

151617

alMatrix

18useHistory

19probeConfig

AddressMap

ProtocolDir

nlHost

ProtocolDist

nlMatrix

alHost

Token Ring

Events

Packet Capture

Filters

Traffic Matrix

Host TopNAlarmsHistory

Statistics

1

23

9

10

5

6

7

Hosts

4

8

RMON

TR RMON

RMON2

RMON

iso

org dod

internet

mgmt

Mib-2

1

3

6

1

2

1

242424© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 24© 2002, Cisco Systems, Inc. All rights reserved.

Applying a Management Model

Now That You Have Gathered Network Information, What

Should You Do with It?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

252525© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 25© 2002, Cisco Systems, Inc. All rights reserved.

The Five Facets of Proper Network Management

• Addresses the network management applicationsthat reside upon the NMS

• OSI model categorizes five areas of function (sometimes referred to as the FCAPS model):

Fault

Configuration

Accounting

PerformanceSecurity

262626© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 26© 2002, Cisco Systems, Inc. All rights reserved.

Fault Management

• “The process of locating, diagnosing, and correcting network problems”

• Increases network reliability and effectiveness

• More than just “firefighting”

• Increases the productivity of network users

Device Down?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

272727© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 27© 2002, Cisco Systems, Inc. All rights reserved.

Fault Management

• Steps for successful fault management:Identify the problem by gathering information about the state of the network (polling and trap generation)

Restore any services that have been lost

Isolate the cause and decide if the fault should be managed

Correct the fault if possible

282828© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 28© 2002, Cisco Systems, Inc. All rights reserved.

Configuration Management

• “The process of obtaining data from the network and using that data to manage the setup of all network devices”

• Allows rapid access to configuration information

• Facilitates remote configuration and provisioning

• Provides an up-to-date inventory of network components

Speed?

Duplex?

Trunking?

VLANs Allowed?

STP State?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

292929© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 29© 2002, Cisco Systems, Inc. All rights reserved.

Configuration Management

• Steps for successful configuration management:

Gather current network configuration (either manually or automatically)

Use that data to modify network device configuration in order to provision the network

Store the configuration data and maintain an up-to-date inventory of all network components

Produce various inventory reports

303030© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 30© 2002, Cisco Systems, Inc. All rights reserved.

Accounting Management

• “Measuring the usage of network resources by users in order to establish the metrics, check quotas, determine costs, and bill users”

• Measures and reports accounting information based on individual groups and users

• Administers the cost of the network

• Internal verification of third-party billing for usage

Input Octets?

Output Octets?

Total Broadcasts?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

313131© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 31© 2002, Cisco Systems, Inc. All rights reserved.

• Address the different steps involved for accounting management:

Gather network resource utilization information

Use metrics to set usage quotas

Billing users for their network use

Consider the cost of accounting

Accounting Management

323232© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 32© 2002, Cisco Systems, Inc. All rights reserved.

Performance Management

• “Ensuring that the data network remains accessible and as uncongested as possible”

• Reduces network overcrowding and inaccessibility

• Provides a consistent level of service to the network user

• Determine utilization trends to proactively isolate and solve performance problems

Utilization?

Peak/min/max?

Error Rates

Unicast Rates?

Broadcast Rates?

CPU Utilization?

Free Memory?

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

333333© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 33© 2002, Cisco Systems, Inc. All rights reserved.

Performance Management

• Steps for successful performance management

Collect data on current network link and device utilization

Baseline the utilization metrics and isolate any existing performance problems

Set utilization thresholds based on the baseline

Analyze the historical data for recognizing trends

Resource planning and tuning

Remember – Measuring performance impacts performance

343434© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 34© 2002, Cisco Systems, Inc. All rights reserved.

Security Management

• “Protecting sensitive information on devices attached to a data network by controlling access points to that information”

• Builds network user confidence

• Secures sensitive information from both internal and external sources

• Protects the network functionality from malicious attacks

MAC AddressLocked to Port

Access ListBlocks Connections

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

353535© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 35© 2002, Cisco Systems, Inc. All rights reserved.

Security Management

• Steps for successful security management:

Identify sensitive information or devices

Find the access points

Secure the access points

Protect the sensitive information by configuring encryption policies

Implement a network intrusion detection scheme to enhance perimeter security

36© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 36© 2002, Cisco Systems, Inc. All rights reserved.

Part IIPreparing the Network for Management

Real World Applications of Proper Management Practices

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

373737© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 37© 2002, Cisco Systems, Inc. All rights reserved.

Preparing Devices for Management

SNMP

MIBsSecurity

Performance

Accounting

Configuration

FaultLAN

QoS

VoIP

SLA

WANHigh Availability

383838© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 38© 2002, Cisco Systems, Inc. All rights reserved.

Configuring SNMP

• Configuration syntax operating system (OS) dependant

• CatOS’ agent has two write access policiesRead-write—partial configuration access

Read-write-all—full configuration access

• CatOS’s agent has defaults—Change them!

R/O = public • R/W = private • R/W/A = secret

CatOS Cat-IOS IOS

snmp-server community <text> ROsnmp-server community <text> RWsnmp-server enable trapssnmp-server host <IP_Addr> traps <comm_string>snmp-server trap-source loopback0

set snmp community read-only <text>set snmp community read-write <text>set snmp community read-write-all <text>set snmp trap <IP_Addr> <comm_string>set snmp trap enable allset snmp rmon enable

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

393939© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 39© 2002, Cisco Systems, Inc. All rights reserved.

Configuring Syslog

• Syntax differs between IOS and catalyst OS devices

• Message textual format differs between IOS and catalyst OS devices

• Resource manager essentials requirementLogging level informational (6)

logging onlogging <hostname | IP_Addr>logging facility local7logging trap informationallogging source-interface loopback0service timestamps log datetime

set logging server <IP_Addr>set logging server level 6set logging server facility local7set logging level sys 6 defaultset logging timestampset logging enable

CatOS Cat-IOS IOS

404040© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 40© 2002, Cisco Systems, Inc. All rights reserved.

Configuring Telnet

• Syntax differs between IOS and catalyst OS devices

• Catalyst switches have telnet enabled but no console/telnet or enable passwords by default—add them

• IOS devices do not have telnet enabledEnable for management support

Secure with TACAS+

enable password <passwd>

line tty 0 4

password <passwd>

login [local/tacas]

set password <passwd>set enablepass <passwd>

CatOS Cat-IOS IOS

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

414141© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 41© 2002, Cisco Systems, Inc. All rights reserved.

Configuring CDP and ILMI

• Syntax differs between IOS and catalyst OS devices

• CDP enabled by default on most interfaces

cdp run

set cdp [enable/disable] <mod/port>

atm pvc 2 0 16 ilmiILMI Setup for ATM InterfaceILMI Setup for ATM Interface

GlobalGlobalset cdp [enable/disable]

Per PortPer Port

GlobalGlobal

cdp enablePer InterfacePer Interface

CatOS Cat-IOS IOS

424242© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 42© 2002, Cisco Systems, Inc. All rights reserved.

Configuring NTP

• Syntax differs between IOS and catalyst OS devices

• Configure NTP on management server

• Time synchronization important for proper syslog, traps, and monitoring correlation

ntp server <IP_Addr>

ntp source Loopback0

ntp update-calendar

clock timezone PST –8

clock summer-time PDT recurring

set ntp client enableset ntp server <IP_Addr>set ntp timezone PST –8set summertime enable PST

CatOS Cat-IOS IOS

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

434343© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 43© 2002, Cisco Systems, Inc. All rights reserved.

Additional Configuration

• Cisco IOS device

Hostname and SNMP contact, location, chassis-id

User login authorization local or TACACS+

SNMP access lists

RMON alarms and events (statistics and history if available)

• Catalyst switch

System name, contact, location

User login authorization local or TACACS

Mini-RMON statistics, history, alarms, and events

VTP domain name

CatOSCat-IOS IOS

444444© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 44© 2002, Cisco Systems, Inc. All rights reserved.

Designing for Management Preferred Management Interfaces

• Management systems communicate via IP with managed devices • The IP address should be chosen carefully to provide the highest

availability• It is a best practice to use a very stable physical address or a

configured Loopback address

Virtual Interfaces—Only exist in the device configuration

• LoopBack0• VLAN interfaces

Physical Interfaces—Actual ports on router chassis

• Ethernet0/0• Serial 0/1

interface Loopback0ip address 192.168.79.130 255.255.255.255

interface Vlan60

ip address 192.168.79.62 255.255.255.252

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

454545© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 45© 2002, Cisco Systems, Inc. All rights reserved.

Designing for Management Redundant Infrastructure

• High availability management

• Completely separates management from user data

• Management link is in separate subnet, VLAN, and switch

• Higher assurance for management data delivery during congestion or convergence

SNMP Manager

10.1.100.12 10.1.100.13 10.1.100.14

10.1.100.10 10.1.100.11

10.1.100.15

464646© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 46© 2002, Cisco Systems, Inc. All rights reserved.

Designing for Management Terminal Servers

• Out of band

• Failsafe access

• Console connection only, no SNMP

• Connect to redundant infrastructure

• Secure AUX ports when using modem

Serial Cable

Regional Offices

TerminalServer

Corp Network

Telnet

Modem

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

474747© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 47© 2002, Cisco Systems, Inc. All rights reserved.

Incorporating FCAPS into the Network

Fault

Configuration

Accounting

Performance

Security

484848© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 48© 2002, Cisco Systems, Inc. All rights reserved.

Fault ManagementReal World Example

• Network administrator was receiving fault notifications of a recurring problem; each evening between 8:00 and 8:30 connectivity is lost to a branch office; connectivity is restored at approximately 9:00pm

8:30pm

The ProblemThe Problem

7:50pm 9:00pm

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

494949© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 49© 2002, Cisco Systems, Inc. All rights reserved.

Fault ManagementReal World Example

Considerations• Is an entire device failing? If so, what device?

• Is a link failing? If so, which link?

• How can this be prevented in the future?

Management Processes in Place• Actively polling critical devices for availability

• Notification tool to alert administrator

The SolutionThe Solution

505050© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 50© 2002, Cisco Systems, Inc. All rights reserved.

Fault ManagementReal World Example

The Loss of Connectivity Was Linked to the Late Night Janitor Unplugging the WAN Router to Plug in His Radio

The Solution Was to Provide the Late Night Janitor with an Extension Cord

The SolutionThe Solution

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

515151© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 51© 2002, Cisco Systems, Inc. All rights reserved.

Fault Management Device Fault Manager

• Administrator was notified of failure via a notification tool

• Device level fault analysis for Cisco products

• Identify POSSIBLE problems

• Determines root cause of exceptions

• Monitor for high availability

• Pager/e-mail/trap forwarding

• MIBs, polling intervals and thresholds set—OUT OF THE BOX

• NO RULES TO WRITE

525252© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 52© 2002, Cisco Systems, Inc. All rights reserved.

Fault Management ToolsHP and Tivoli

• Correlate and manage events and SNMP traps

• Perform fault isolation and root cause analysis

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

535353© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 53© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementReal World Example

• Network administrator notices night time configuration changes in the production networkfollowed by immediate configuration rollbacks to disguise any tampering

logging 192.168.76.228logging 192.168.76.229!

snmp-server community public ROsnmp-server community forks RWsnmp-server system-shutdown

logging 192.168.76.228logging 192.168.76.229

logging 192.168.76.4!snmp-server community public RO

snmp-server community spoons RWsnmp-server system-shutdown

logging 192.168.76.228logging 192.168.76.229!

snmp-server community public ROsnmp-server community forks RWsnmp-server system-shutdown

10:55pm 11:05pm 11:23pm

The ProblemThe Problem

545454© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 54© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementReal World Example

The solutionThe solution

•What changes were made?

•When were the changes made?

•Who made them?

•How can this be prevented in the future?

•Devices configured to send config change syslog messages to NMS

•User authentication tool

•Configuration archiving

Considerations

Management Processes in Place

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

555555© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 55© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementReal World Example

= $$The Network Configuration Changes Were Being Made by a Colleague Studying for His CCIE Exam after Hours Using the Production Network

The Solution Was to Provide the Culprit with an Unused 2600 Router to Be Used in His Home

The SolutionThe Solution

565656© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 56© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementResource Manager Essentials Change Audit Service

All Syslog Events

All Syslog Events

Syslog AnalyzerSyslog

AnalyzerManagedSyslogEvents

ManagedSyslogEvents

Change AuditReports

AAA

SyslogDatabase

Change AuditDatabase

InventoryDatabase

56

Changes to CLIChanges to CLI11

ConfigurationManager

ConfigurationManager

InventoryManager

InventoryManager

SoftwareManagerSoftwareManager

Changes from CiscoWorksPeriodic Scans or Scheduled Jobs22

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

575757© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 57© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementRME Change Audit Setup

Change Audit relies on syslog messages to operate• Point syslogs from all managed devices (except Pix firewalls) to

the RME server

Collection of usernames occurs in 3 ways:

1. Using usernames on devices themselves

2. Using a RADIUS or TACACS server

3. Using a configurations change tool in RME (NetConfig, Config Editor)

That User Name Field Is

Important to Most Customers

That User Name Field Is

Important to Most Customers

585858© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 58© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementResource Manager Essentials

• Inventory ManagerComplete Cisco asset management

Support for IGX, BPX and MGX

• Software Image ManagerSoftware lifecycle management for routers and Catalyst switches

Improved browse bug by device

• Configuration ManagerVersion control, archival, editing and reporting

Network-wide config changes

• Change Audit ServicesSingle interface for all hardware, software, and configuration changes

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

595959© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 59© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementRME Inventory Manager

• Hardware and software summary information

Chassis type

Memory

Flash

Modules

• Support for all Cisco devices in the network including Call Manager, VPN 3000, IGX, BPX, MGX

• Multiservice port reporting

606060© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 60© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementIOS and CatOS Upgrades

• Use a dedicated TFTP server to store and distribute software images

core-6506-msfc#copy tftp flash

Address or name of remote host []? 19.16.76.175 Source filename []? 12.1.8a

Destination filename []? 12.1.8a

• Resource Manager Essentials includes Software Image Manager to automate the upgrade process

or

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

616161© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 61© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementRME Configuration Manager

• NetConfigWizard-based template for global configuration changesChanges can be performed against multiple devices in the networkAdhoc can be used for any CLIs

• Config EditorOpens config from selected device in “notepad” like window

Edit functions (cut, paste)Changes a single device at a time

626262© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 62© 2002, Cisco Systems, Inc. All rights reserved.

Configuration ManagementAccess Control List Manager

• Integrated with CiscoWorks Resource Manager Essentials

Leverages functions from Inventory, Configuration Archive, Transport, Change Audit, Schedule, etc.

• Structured approach to managing ACL policies

Reduces time to deploy multiple changes

Reduces errors in ACL definition

Reduces time and improved accuracy for add, moves and changes for users and servers

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

636363© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 63© 2002, Cisco Systems, Inc. All rights reserved.

Accounting Management NetFlow

Flow Profiling

Accounting/Billing

Network Planning

Network Monitoring

Flow Collectors

Flow Collectors

End-User AppsEnd-User AppsNetFlow/Data Export

NetFlow/Data Export

*NAM

RMON Probe*RMON Probe*

646464© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 64© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementReal World Example

• A university network administrator observes dramatic increase in outgoing WAN traffic resulting in increased costs and decreased response times

Solid Green Represents Incoming Traffic

Blue Line Represents Outgoing Traffic

The ProblemThe Problem

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

656565© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 65© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementReal World Example

Considerations

• What traffic type is leaving the university?

• Why is the traffic being generated?

• Who is generating the traffic?

• How can this be prevented in the future?

The SolutionThe Solution

Management Processes in Place

• Link usage trending software

• Traffic capture and analysis capability

• Scalable QoS policy deployment software

666666© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 66© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementReal World Example

The Network Congestion Was Being Caused by File Sharing Applications

The Solution Was to Deploy Quality of Service Policies to Edge Devices

Pre-Policy Traffic Post-Policy Traffic

The SolutionThe Solution

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

676767© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 67© 2002, Cisco Systems, Inc. All rights reserved.

Performance Management Link Usage Trending

• University was logging incoming and outgoing usage over time with MRTG

• Monitors traffic load on network links based on SNMP statistics

• Generates real-time HTML traffic reports

• Can be used to monitor any SNMP variable you choose

• It’s FREE! www.mrtg.org

686868© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 68© 2002, Cisco Systems, Inc. All rights reserved.

Performance Management Traffic Analysis

• Packet Capture and Decode

• Three-tier organization model example

• Collects RMON data from intermediate devices

• Tool analyzes data for performance metrics

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

696969© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 69© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementTraffic Analysis• Network Analysis Module

Integrated Traffic Monitoring solution for Catalyst 6000 Family

• Enables full Traffic MonitoringReal time traffic analysis

Performance monitoring

Troubleshooting

• Web based embedded Traffic Analyzer

VoIP, QoS(DSMON), ART, VLAN(SMON), RMON 1&2 monitoring

Data Capture and Decode, Alarms

• Supported by other applicationsnGenius Real-Time Monitor, CiscoView, Concord eHealth

707070© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 70© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementManaging QoS

• Application discovery• Classification into

service classes• Service class provisioning

and enforcement

CampusBackbone

VODServers

Order Entry, Finance,

Manufacturing

Order Entry, Finance,

Manufacturing

FinanceManager

RemoteCampus

Catalyst Switch

Cisco Router

CiscoRouter

DataToS

ColoringColoring

ClassificationClassification

EnforcementEnforcement

Monitor Traffic Monitor Traffic by Applicationby Application

Monitor Traffic Monitor Traffic by Service/Appby Service/App

Gold Silver Bronze

VoIP SAP E-Mail

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

717171© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 71© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementInternetwork Performance Monitor

• WAN troubleshootingMeasures hop-by-hop response time, availability, jitter, and drops

Provides real-time and historical reports

• Utilizes Service Assurance Agent embedded in Cisco IOS

Validates and measures TCP, UDP, HTTP, VoIP, DNS, ICMP with QoS awareness

727272© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 72© 2002, Cisco Systems, Inc. All rights reserved.

Security ManagementReal World Example

• Network administrator was concerned that should the device SNMP community strings get into the wrong hands sensitive information could be extracted and unauthorized changes made

Simple Network Management ProtocolVersion: 1Community: publicPDU type: RESPONSERequest Id: 0xd1786f78Error Status: NO ERRORError Index: 0Object identifier 1: 1.3.6.1.2.1.2.2.1.8.8Value: INTEGER: 1 (0x1)

------------------------------------------------------------------------------------------------0000 00 50 04 6f d7 40 00 d0 d3 9d 73 d0 08 00 45 00 [email protected]. 0010 00 4a 59 83 00 00 ff 11 47 d9 c0 a8 4c 01 c0 a8 .JY.....G...L... 0020 4c f4 00 a1 13 11 00 36 fd 93 30 2c 02 01 00 04 L......6..0,.... 0030 06 70 75 62 6c 69 63 a2 1f 02 04 d1 78 6f 78 02 .public.....xox. 0040 01 00 02 01 00 30 11 30 0f 06 0a 2b 06 01 02 01 .....0.0...+.... 0050 02 02 01 08 08 02 01 01 c3 6f 2e 6b .........o.k ------------------------------------------------------------------------

The ProblemThe Problem

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

737373© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 73© 2002, Cisco Systems, Inc. All rights reserved.

Security ManagementReal World Example

• Administrator must make choose from the following:

Make frequent and time consuming changes of the community strings on all devices

Lock down SNMP access to the managed devices

The SolutionThe Solution

The ProcessThe Process

747474© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 74© 2002, Cisco Systems, Inc. All rights reserved.

Security ManagementReal World Example

• The network administer deployed access lists to the vulnerable devices to restrict SNMP from all hosts except those in a known secure subnet

CatOS Cat-IOS IOS

snmp-server community <MyString> ro 100

snmp-server community <MyString> rw 100

access-list 100 permit 19.16.76.192 0.0.0.63

set ip permit enable snmp

Set ip permit 19.16.76.192 255.255.255.192 snmp

The SolutionThe Solution

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

757575© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 75© 2002, Cisco Systems, Inc. All rights reserved.

Security ManagementRestricting Network Access

• User access to network servicesVPN access becoming more and more common

Common vulnerabilities are shared resources (i.e. computer labs)

• Administrator access to network devicesThird party authentication software

Usernames on network devices

Access control lists

Telnet, Console, and SNMP Access must be secure

767676© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 76© 2002, Cisco Systems, Inc. All rights reserved.

Security Management

• Controls network access by configuring access points

• Protects the flow of sensitive information by provisioning IPSecVPNs to encrypt the data

• Protects from malicious network attacks using intrusion detection sensors

VPN

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

777777© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 77© 2002, Cisco Systems, Inc. All rights reserved.

Voice ManagementPulling It All Together

• Branch office user complains of inability to make a VoIP telephony call to corporate headquarters

Corporate HeadquartersRegional Office

The ProblemThe Problem

787878© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 78© 2002, Cisco Systems, Inc. All rights reserved.

Fault Management

• Do you have a fault detection and notification tool in place in the network? If so, you may already have the answer

Corporate HeadquartersRegional Office

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

797979© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 79© 2002, Cisco Systems, Inc. All rights reserved.

Corporate HeadquartersRegional Office

Configuration Management

• Verify device configurations have not been changed to adversely affect VoIP

Yesterday Today

808080© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 80© 2002, Cisco Systems, Inc. All rights reserved.

Corporate HeadquartersRegional Office

Performance Management

• Compare current network performance against established baseline

VoIP Jitter Test between Offices

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

818181© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 81© 2002, Cisco Systems, Inc. All rights reserved.

Performance ManagementA Note on IPM Jitter Reports

If You Want These…

You Have To Do This…

core-6506-msfc(config)#rtr responder

• Your “source” and “target” must be an SA Agent capable router

• You must issue the global configuration to turn on the RTR (Response Time Reporter ) responder on the target

828282© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 82© 2002, Cisco Systems, Inc. All rights reserved.

Corporate HeadquartersRegional Office

Voice ManagementPulling It All Together

• When faced with a network problem regarding downtime or significant degradation, many different components of proper management must be in place to simplify the troubleshooting process

The SolutionThe Solution

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

838383© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 83© 2002, Cisco Systems, Inc. All rights reserved.

Review of Agenda and Main Points

• The Need for Management

What Have We Learned Today?

• Network Management Defined

• Protocols and Technologies

• Functional Areas of Network Management

• Real World Applications of Proper Management

• Preparing a Network for Management

Contribution to Bottom Line through High Availability

Understanding and Controlling Network Information and Services

Communication Models, MIBs, SNMP gets, SNMP Sets, SNMP Traps

Fault, Configuration, Accounting, Performance, Security

Configuring SNMP, Syslog, Telnet, CDP, ILMI, NTP, LoopBack

Real World Examples

848484© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 84© 2002, Cisco Systems, Inc. All rights reserved.

Conclusions

• Network management can best be defined in terms of the goals—Providing network users services with the quality and transparency they expect

• The network management model: Incorporation of all FCAPS components

• Network management tools to address each functional area

• Network management helps the bottom line—Efficiency and productivity

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

858585© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 85© 2002, Cisco Systems, Inc. All rights reserved.

• What: Cisco network management product web surveys

• How: E-mail sent to product user list with URL link to a survey

• Who: Primary users of a Cisco network management product

• When: Surveys sent via e-mail after a product has shipped for 6 months. Typically we do two surveys on a specific product per month

Cisco Network Management Surveys – Continuous Improvement

868686© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 86© 2002, Cisco Systems, Inc. All rights reserved.

• Send an e-mail to Greg Ryan at Cisco: [email protected] if you wish to be on the survey list. He will ask you what Cisco network management products you have and which versions you are using.

• There is no obligation and you can opt not to take the surveys. A gift is mailed to all survey takers.

Cisco Network Management Surveys – Getting Involved

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

878787© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 87© 2002, Cisco Systems, Inc. All rights reserved.

Further Study and References

• Network Management: A Practical Perspective—Leinwand and Fang Conroy ISBN# 0201609991

• Network Management: Principles and Practice—Subramanian ISBN# 0201357429

• How to Manage Your Network Using SNMP: The Networking Management Practicum—Rose and McCloghrie ISBN# 0131415174

• Performance and Fault Management—Della Maggiora, Elliott, Pavone, Phelps, and Thompson ISBN# 1578701805

• Cisco Enterprise Management Solutions—Wynston ISBN# 1587050064

888888© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 88© 2002, Cisco Systems, Inc. All rights reserved.

Other Network Management Sessions

• NMS-2021: Configuration of Large Scale Networks with CiscoWorks

• NMS-1031: Introduction to Collecting Traffic Accounting Information

• NMS-1011: Principles of Fault Management

• NMS-1051: Securely Managing your Network

• NMS-2001: Network Troubleshooting Tools and Techniques

• SEC-1000: Introduction to Network Security

• SEC-2006: Managing Security Technologies

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

898989© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 89© 2002, Cisco Systems, Inc. All rights reserved.

Recommended Reading

Performance and Fault Management ISBN: 1578701805

Available on-site at the Cisco Company Store

909090© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 90© 2002, Cisco Systems, Inc. All rights reserved.

Please Complete Your Evaluation Form

Session NMS-1001

Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr

91© 2002, Cisco Systems, Inc. All rights reserved.NSC-1105117_04_2002_c1