introduction to network management - net130.com · network management network management defined...
TRANSCRIPT
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
111© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 1© 2002, Cisco Systems, Inc. All rights reserved.
2© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 2© 2002, Cisco Systems, Inc. All rights reserved.
Introduction toNetwork Management
Session NMS-1001
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
333© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 3© 2002, Cisco Systems, Inc. All rights reserved.
Agenda
Part I• The Need for Network Management
• Network Management Defined
• Protocols and Technologies
• Functional Areas of Network Management
Part II• Preparing a Network for Management
• Real World Applications of Proper Management Practices
4© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 4© 2002, Cisco Systems, Inc. All rights reserved.
Part INetwork Management Defined
Protocols and Technologies
Functional Areas of Network Management
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
555© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 5© 2002, Cisco Systems, Inc. All rights reserved.
The Case for Management
• Typical problemRegional user arrives at work and experiences slow or no response from corporate web server
• Where do you begin?Where is the problem?
What is the problem?
What is the solution?
• Without proper network management, these questions are difficult to answer
Corp Network
Regional Offices
WWW ServersWWW Servers
Remote UserRemote User
666© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 6© 2002, Cisco Systems, Inc. All rights reserved.
Corp Network
Regional Offices
WWW ServersWWW Servers
Remote UserRemote User
The Case for Management
• With proper management tools and procedures in place, you may already have the answer
• Consider some possibilities
1. What configuration changes were made overnight?
2. Have you received a device fault notification indicating the issue?
3. Have you detected a security breach?
4. Has your performance baseline predicted this behavior on an increasingly congested network link?
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
777© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 7© 2002, Cisco Systems, Inc. All rights reserved.
The Case for Management
• An accurate database of your network’s topology, configuration, and performance
• A solid understanding of the protocolsand models used in communication between your management server and the managed devices
• Methods and toolsthat allow you to interpret and act upon gathered information
Response TimesResponse Times High Availability
High Availability
PredictabilityPredictability
SecuritySecurity
Solving a Typical Problem Like This Includes the Following:
888© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 8© 2002, Cisco Systems, Inc. All rights reserved.
ROI ExampleUsing a Management Tool for Daily Tasks
Number of Managed DevicesNumber of Managed Devices 800800
Average Manual Process Time Required (Man-Hours)Average Manual Process Time Required (Man-Hours)
Password ChangePassword Change
0.050.05 (3 Min/Device/Qtr)(3 Min/Device/Qtr)Software UpgradeSoftware Upgrade
0.250.25 (19 Min/Device/Bi-Annual)(19 Min/Device/Bi-Annual)
Gather Inventory InformationGather Inventory Information 0.030.03 (2 Min/Device/Qtr)(2 Min/Device/Qtr)
Documenting ChangesDocumenting Changes 0.080.08 (5 Min/Incident)(5 Min/Incident)
AuditAudit 30.0030.00 (Per Qtr)(Per Qtr)
Manual Configuration Error Rate 2%Manual Configuration Error Rate 2%Cost per Man-Hour Cost per Man-Hour $48.84$48.84
Configuration ManagementConfiguration ManagementProcessProcess
ManualProcedure
ManualProcedure
After Product ImplementationAfter Product
ImplementationTime
SavingsTime
SavingsROIROI
Password ChangePassword Change 435435 4444 391391 $19,106.21$19,106.21
Software UpgradeSoftware Upgrade 544544 0.370.37 544544 $26,551.05$26,551.05
Gather Inventory InformationGather Inventory Information 381381
0.670.67
380380 $18,565.71$18,565.71
Documenting ChangesDocumenting Changes 120120
0.670.67
$5,828.24$5,828.24
Required Man-Hours (per Annum)Required Man-Hours (per Annum)
119119
Total Configuration Management ROI Total Configuration Management ROI $70,051.21$70,051.21
Source: Cost Analysis Using CiscoWorks LAN Management Solution. Esaka, 2002Source: Source: Cost Analysis Using CiscoWorks LAN Management SolutionCost Analysis Using CiscoWorks LAN Management Solution. . EsakaEsaka, 2002, 2002
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
999© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 9© 2002, Cisco Systems, Inc. All rights reserved.
The Network Manager’s Responsibility
• Ensure that the users of a network receive the information technologyservices with the quality of service that they expect
• Strategic and tactical planning of the engineering, operations, and maintenance of a network and network services
• Help network engineers deal with the complexity of a data network and to make sure that data can go across it with maximum efficiency and transparency to the users
101010© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 10© 2002, Cisco Systems, Inc. All rights reserved.
Network ManagementNetwork Management
Network Management Defined
MaintenanceMaintenance
AdministrationAdministration
OperationsOperations
Key Network Management Tasks
Key Network Management Tasks
ProvisioningProvisioning VoIP VPN QoS
EfficiencyEfficiency
ProductivityProductivity
ControlControl
Key Network Management Success Factors
Key Network Management Success Factors
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
111111© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 11© 2002, Cisco Systems, Inc. All rights reserved.
Communicating with the Network
Managed Network Elements Are Waiting
to Provide Us with Useful Information…
Network Management Begins with an Understanding of How to Collect and Interpret
This Information
121212© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 12© 2002, Cisco Systems, Inc. All rights reserved.
Methods of Communication
Console
Telnet
HTTP
SNMP
Example Security Options
SSH
SSL (HTTPS)
SNMPv1, 2c – Access ListsSNMPv3 – Auth/Priv
Device UsernamesTACACS/RADIUS
Terminal Server
Embedded Device Management
ReflectionXSoftware
MRTGMulti Router
Traffic Grapher
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
131313© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 13© 2002, Cisco Systems, Inc. All rights reserved.
Two-Tier Management Communication
Database
} Network Elements
Network Queries
Unsolicited Events
{ Manager
Unmanaged Element
Managed Element
AgentAgent
Managed Element
AgentAgent
Managed Element
AgentAgent
NetworkManagement
System
The Model
141414© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 14© 2002, Cisco Systems, Inc. All rights reserved.
Two-Tier Management Communication
} Network Elements
Network Queries
Unsolicited Events
Router
The Real World CiscoWorksHP-OpenView
} NetworkManagementSystem
Call Manager
Printer RouterSwitch
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
151515© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 15© 2002, Cisco Systems, Inc. All rights reserved.
Unmanaged Element
ProxyAgentProxyAgent
Three-Tier Management Communication
}Network Elements
RMONProbeRMONProbe
The Model
MDB{ Manager
Managed Element
AgentAgent
NMS
161616© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 16© 2002, Cisco Systems, Inc. All rights reserved.
Three-Tier Management Communication
The Real World CiscoWorksConcord eHealth
} NetworkManagementSystem
SwitchProbe
Switch{Managed
Element
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
171717© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 17© 2002, Cisco Systems, Inc. All rights reserved.
SNMP Primer: Understanding the Agent
• Information storehouse
• Information structured as per Structure of Management Information (SMI) standards
• Object definitions provided in many Management Information Bases (MIBs)
NMS
IP Network
SNMPManageable
Device
ManagementEntity
ManagementEntity
SNMPAGENTSNMPAGENT
1000s ofDefined Objects
181818© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 18© 2002, Cisco Systems, Inc. All rights reserved.
SNMP Primer: Understanding the Protocol
• Get requests used to read the value of object
• Set requests used to modify the value of object
• Traps provide asynchronous event notification
NMS
IP Network
SNMPManageable
Device
SNMP v1, SNMP v2c
Trap !Trap !
Get Response
Get Request, Get-Next RequestGet-Bulk Request
Set Request
ManagementEntity
ManagementEntity
SNMPAGENTSNMPAGENT
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
191919© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 19© 2002, Cisco Systems, Inc. All rights reserved.
LevelLevel AuthAuth EncryptionEncryption What Happens
What Happens
SNMPv1SNMPv1 noAuthNoPrivnoAuthNoPrivUses a community stringmatch for authenticationUses a community stringmatch for authentication
CommunityString
CommunityString
SNMPv2cSNMPv2c noAuthNoPrivnoAuthNoPriv Uses a community stringmatch for authenticationUses a community stringmatch for authentication
CommunityString
CommunityString
SNMPv3SNMPv3 noAuthNoPrivnoAuthNoPriv Uses a usernamematch for authentication
Uses a usernamematch for authenticationUsernameUsername
SNMPv3SNMPv3 authNoPrivauthNoPrivProvides authenticationbased on HMAC -MD5 orHMAC -SHA algorithms
Provides authenticationbased on HMAC -MD5 orHMAC -SHA algorithms
MD5 or SHAMD5 or SHA
SNMPv3SNMPv3 authPrivauthPrivAdds DES 56-bit encryptionin addition to authentication
based on DES-56
Adds DES 56-bit encryptionin addition to authentication
based on DES-56MD5 or SHAMD5 or SHA DESDES
Configuring NM Protocols
SNMP
202020© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 20© 2002, Cisco Systems, Inc. All rights reserved.
Measurement TechnologySNMP Protocol - Background
• Simple Network Management Protocol• IOS versions
10.3 -> SNMPv1 + v2
11.0, 11.1, 11.2 -> SNMPv1 + v2
11.3 -> SNMPv1 + v2c
12.0 -> SNMPv1 + v2c
12.0(3)T -> SNMPv1 + v2c + v3
12.0(6)S -> SNMPv1 + v2c + v3
12.1 -> SNMPv1 + v2c + v3
12.2 -> SNMPv1 + v2c + v3
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
212121© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 21© 2002, Cisco Systems, Inc. All rights reserved.
• Hierarchically structured
• Each object uniquely identified
MIBsObject Identifiers
OID for System1.3.6.1.2.1.1
OID for System1.3.6.1.2.1.1
SNMPAGENTSNMPAGENT
Internet Engineering Task Force (IETF)
SNMP (11)SNMP (11)
Transmission (10)Transmission (10)
CMOT (9)CMOT (9)IP (4)IP (4)
Address Translation (3)Address Translation (3)
Interfaces (2)Interfaces (2)
System (1)System (1)
MIB-2 (1)MIB-2 (1)
EGP (8)EGP (8)
UDP (7)UDP (7)
TCP (6)TCP (6)
ICMP (5)ICMP (5)
Experimental (3)Directory (1) Management (2) Private (4)
Internet (1)
DOD (6)
Organization (3)
ISO (1)
...Unassigned (9118)Unassigned (9118)
Microsoft (311)Microsoft (311)
Enterprise (1)
Sun (42)Sun (42)
Apple (63)Apple (63)Cisco (9)Cisco (9)
HP (11)HP (11)
IBM (2)IBM (2)
Vendor AdministeredAdministered by
222222© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 22© 2002, Cisco Systems, Inc. All rights reserved.
SNMP Object Identification
• Need a scheme that allows two vendors or products within a vendor to compare like items
Object Identifiers (OID) were chosen as the identification scheme
An OID is an ordered sequence of non-negative integers written left to right, containing at least two elements (0.0)
Bound to simple names in MIB Modules:
“ifDescr” is 1.3.6.1.2.1.2.2.1.2
“ifInOctets” is 1.3.6.1.2.1.2.2.1.10
enterprises
1
cisco
9
ciscoMgmt
9
Private
4
iso
org dod
internet
mgmt
Mib-2
1
3
6
1
2
1
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
232323© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 23© 2002, Cisco Systems, Inc. All rights reserved.
enterprises
1
cisco
9
ciscoMgmt
9
Private
4
SNMP Object Identifiers
11
12
13
14
151617
alMatrix
18useHistory
19probeConfig
AddressMap
ProtocolDir
nlHost
ProtocolDist
nlMatrix
alHost
Token Ring
Events
Packet Capture
Filters
Traffic Matrix
Host TopNAlarmsHistory
Statistics
1
23
9
10
5
6
7
Hosts
4
8
RMON
TR RMON
RMON2
RMON
iso
org dod
internet
mgmt
Mib-2
1
3
6
1
2
1
242424© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 24© 2002, Cisco Systems, Inc. All rights reserved.
Applying a Management Model
Now That You Have Gathered Network Information, What
Should You Do with It?
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
252525© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 25© 2002, Cisco Systems, Inc. All rights reserved.
The Five Facets of Proper Network Management
• Addresses the network management applicationsthat reside upon the NMS
• OSI model categorizes five areas of function (sometimes referred to as the FCAPS model):
Fault
Configuration
Accounting
PerformanceSecurity
262626© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 26© 2002, Cisco Systems, Inc. All rights reserved.
Fault Management
• “The process of locating, diagnosing, and correcting network problems”
• Increases network reliability and effectiveness
• More than just “firefighting”
• Increases the productivity of network users
Device Down?
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
272727© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 27© 2002, Cisco Systems, Inc. All rights reserved.
Fault Management
• Steps for successful fault management:Identify the problem by gathering information about the state of the network (polling and trap generation)
Restore any services that have been lost
Isolate the cause and decide if the fault should be managed
Correct the fault if possible
282828© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 28© 2002, Cisco Systems, Inc. All rights reserved.
Configuration Management
• “The process of obtaining data from the network and using that data to manage the setup of all network devices”
• Allows rapid access to configuration information
• Facilitates remote configuration and provisioning
• Provides an up-to-date inventory of network components
Speed?
Duplex?
Trunking?
VLANs Allowed?
STP State?
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
292929© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 29© 2002, Cisco Systems, Inc. All rights reserved.
Configuration Management
• Steps for successful configuration management:
Gather current network configuration (either manually or automatically)
Use that data to modify network device configuration in order to provision the network
Store the configuration data and maintain an up-to-date inventory of all network components
Produce various inventory reports
303030© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 30© 2002, Cisco Systems, Inc. All rights reserved.
Accounting Management
• “Measuring the usage of network resources by users in order to establish the metrics, check quotas, determine costs, and bill users”
• Measures and reports accounting information based on individual groups and users
• Administers the cost of the network
• Internal verification of third-party billing for usage
Input Octets?
Output Octets?
Total Broadcasts?
…
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
313131© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 31© 2002, Cisco Systems, Inc. All rights reserved.
• Address the different steps involved for accounting management:
Gather network resource utilization information
Use metrics to set usage quotas
Billing users for their network use
Consider the cost of accounting
Accounting Management
323232© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 32© 2002, Cisco Systems, Inc. All rights reserved.
Performance Management
• “Ensuring that the data network remains accessible and as uncongested as possible”
• Reduces network overcrowding and inaccessibility
• Provides a consistent level of service to the network user
• Determine utilization trends to proactively isolate and solve performance problems
Utilization?
Peak/min/max?
Error Rates
Unicast Rates?
Broadcast Rates?
CPU Utilization?
Free Memory?
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
333333© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 33© 2002, Cisco Systems, Inc. All rights reserved.
Performance Management
• Steps for successful performance management
Collect data on current network link and device utilization
Baseline the utilization metrics and isolate any existing performance problems
Set utilization thresholds based on the baseline
Analyze the historical data for recognizing trends
Resource planning and tuning
Remember – Measuring performance impacts performance
343434© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 34© 2002, Cisco Systems, Inc. All rights reserved.
Security Management
• “Protecting sensitive information on devices attached to a data network by controlling access points to that information”
• Builds network user confidence
• Secures sensitive information from both internal and external sources
• Protects the network functionality from malicious attacks
MAC AddressLocked to Port
Access ListBlocks Connections
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
353535© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 35© 2002, Cisco Systems, Inc. All rights reserved.
Security Management
• Steps for successful security management:
Identify sensitive information or devices
Find the access points
Secure the access points
Protect the sensitive information by configuring encryption policies
Implement a network intrusion detection scheme to enhance perimeter security
36© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 36© 2002, Cisco Systems, Inc. All rights reserved.
Part IIPreparing the Network for Management
Real World Applications of Proper Management Practices
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
373737© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 37© 2002, Cisco Systems, Inc. All rights reserved.
Preparing Devices for Management
SNMP
MIBsSecurity
Performance
Accounting
Configuration
FaultLAN
QoS
VoIP
SLA
WANHigh Availability
383838© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 38© 2002, Cisco Systems, Inc. All rights reserved.
Configuring SNMP
• Configuration syntax operating system (OS) dependant
• CatOS’ agent has two write access policiesRead-write—partial configuration access
Read-write-all—full configuration access
• CatOS’s agent has defaults—Change them!
R/O = public • R/W = private • R/W/A = secret
CatOS Cat-IOS IOS
snmp-server community <text> ROsnmp-server community <text> RWsnmp-server enable trapssnmp-server host <IP_Addr> traps <comm_string>snmp-server trap-source loopback0
set snmp community read-only <text>set snmp community read-write <text>set snmp community read-write-all <text>set snmp trap <IP_Addr> <comm_string>set snmp trap enable allset snmp rmon enable
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
393939© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 39© 2002, Cisco Systems, Inc. All rights reserved.
Configuring Syslog
• Syntax differs between IOS and catalyst OS devices
• Message textual format differs between IOS and catalyst OS devices
• Resource manager essentials requirementLogging level informational (6)
logging onlogging <hostname | IP_Addr>logging facility local7logging trap informationallogging source-interface loopback0service timestamps log datetime
set logging server <IP_Addr>set logging server level 6set logging server facility local7set logging level sys 6 defaultset logging timestampset logging enable
CatOS Cat-IOS IOS
404040© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 40© 2002, Cisco Systems, Inc. All rights reserved.
Configuring Telnet
• Syntax differs between IOS and catalyst OS devices
• Catalyst switches have telnet enabled but no console/telnet or enable passwords by default—add them
• IOS devices do not have telnet enabledEnable for management support
Secure with TACAS+
enable password <passwd>
line tty 0 4
password <passwd>
login [local/tacas]
set password <passwd>set enablepass <passwd>
CatOS Cat-IOS IOS
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
414141© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 41© 2002, Cisco Systems, Inc. All rights reserved.
Configuring CDP and ILMI
• Syntax differs between IOS and catalyst OS devices
• CDP enabled by default on most interfaces
cdp run
set cdp [enable/disable] <mod/port>
atm pvc 2 0 16 ilmiILMI Setup for ATM InterfaceILMI Setup for ATM Interface
GlobalGlobalset cdp [enable/disable]
Per PortPer Port
GlobalGlobal
cdp enablePer InterfacePer Interface
CatOS Cat-IOS IOS
424242© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 42© 2002, Cisco Systems, Inc. All rights reserved.
Configuring NTP
• Syntax differs between IOS and catalyst OS devices
• Configure NTP on management server
• Time synchronization important for proper syslog, traps, and monitoring correlation
ntp server <IP_Addr>
ntp source Loopback0
ntp update-calendar
clock timezone PST –8
clock summer-time PDT recurring
set ntp client enableset ntp server <IP_Addr>set ntp timezone PST –8set summertime enable PST
CatOS Cat-IOS IOS
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
434343© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 43© 2002, Cisco Systems, Inc. All rights reserved.
Additional Configuration
• Cisco IOS device
Hostname and SNMP contact, location, chassis-id
User login authorization local or TACACS+
SNMP access lists
RMON alarms and events (statistics and history if available)
• Catalyst switch
System name, contact, location
User login authorization local or TACACS
Mini-RMON statistics, history, alarms, and events
VTP domain name
CatOSCat-IOS IOS
444444© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 44© 2002, Cisco Systems, Inc. All rights reserved.
Designing for Management Preferred Management Interfaces
• Management systems communicate via IP with managed devices • The IP address should be chosen carefully to provide the highest
availability• It is a best practice to use a very stable physical address or a
configured Loopback address
Virtual Interfaces—Only exist in the device configuration
• LoopBack0• VLAN interfaces
Physical Interfaces—Actual ports on router chassis
• Ethernet0/0• Serial 0/1
interface Loopback0ip address 192.168.79.130 255.255.255.255
interface Vlan60
ip address 192.168.79.62 255.255.255.252
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
454545© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 45© 2002, Cisco Systems, Inc. All rights reserved.
Designing for Management Redundant Infrastructure
• High availability management
• Completely separates management from user data
• Management link is in separate subnet, VLAN, and switch
• Higher assurance for management data delivery during congestion or convergence
SNMP Manager
10.1.100.12 10.1.100.13 10.1.100.14
10.1.100.10 10.1.100.11
10.1.100.15
464646© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 46© 2002, Cisco Systems, Inc. All rights reserved.
Designing for Management Terminal Servers
• Out of band
• Failsafe access
• Console connection only, no SNMP
• Connect to redundant infrastructure
• Secure AUX ports when using modem
Serial Cable
Regional Offices
TerminalServer
Corp Network
Telnet
Modem
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
474747© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 47© 2002, Cisco Systems, Inc. All rights reserved.
Incorporating FCAPS into the Network
Fault
Configuration
Accounting
Performance
Security
484848© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 48© 2002, Cisco Systems, Inc. All rights reserved.
Fault ManagementReal World Example
• Network administrator was receiving fault notifications of a recurring problem; each evening between 8:00 and 8:30 connectivity is lost to a branch office; connectivity is restored at approximately 9:00pm
8:30pm
The ProblemThe Problem
7:50pm 9:00pm
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
494949© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 49© 2002, Cisco Systems, Inc. All rights reserved.
Fault ManagementReal World Example
Considerations• Is an entire device failing? If so, what device?
• Is a link failing? If so, which link?
• How can this be prevented in the future?
Management Processes in Place• Actively polling critical devices for availability
• Notification tool to alert administrator
The SolutionThe Solution
505050© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 50© 2002, Cisco Systems, Inc. All rights reserved.
Fault ManagementReal World Example
The Loss of Connectivity Was Linked to the Late Night Janitor Unplugging the WAN Router to Plug in His Radio
The Solution Was to Provide the Late Night Janitor with an Extension Cord
The SolutionThe Solution
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
515151© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 51© 2002, Cisco Systems, Inc. All rights reserved.
Fault Management Device Fault Manager
• Administrator was notified of failure via a notification tool
• Device level fault analysis for Cisco products
• Identify POSSIBLE problems
• Determines root cause of exceptions
• Monitor for high availability
• Pager/e-mail/trap forwarding
• MIBs, polling intervals and thresholds set—OUT OF THE BOX
• NO RULES TO WRITE
525252© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 52© 2002, Cisco Systems, Inc. All rights reserved.
Fault Management ToolsHP and Tivoli
• Correlate and manage events and SNMP traps
• Perform fault isolation and root cause analysis
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
535353© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 53© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementReal World Example
• Network administrator notices night time configuration changes in the production networkfollowed by immediate configuration rollbacks to disguise any tampering
logging 192.168.76.228logging 192.168.76.229!
snmp-server community public ROsnmp-server community forks RWsnmp-server system-shutdown
logging 192.168.76.228logging 192.168.76.229
logging 192.168.76.4!snmp-server community public RO
snmp-server community spoons RWsnmp-server system-shutdown
logging 192.168.76.228logging 192.168.76.229!
snmp-server community public ROsnmp-server community forks RWsnmp-server system-shutdown
10:55pm 11:05pm 11:23pm
The ProblemThe Problem
545454© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 54© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementReal World Example
The solutionThe solution
•What changes were made?
•When were the changes made?
•Who made them?
•How can this be prevented in the future?
•Devices configured to send config change syslog messages to NMS
•User authentication tool
•Configuration archiving
Considerations
Management Processes in Place
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
555555© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 55© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementReal World Example
= $$The Network Configuration Changes Were Being Made by a Colleague Studying for His CCIE Exam after Hours Using the Production Network
The Solution Was to Provide the Culprit with an Unused 2600 Router to Be Used in His Home
The SolutionThe Solution
565656© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 56© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementResource Manager Essentials Change Audit Service
All Syslog Events
All Syslog Events
Syslog AnalyzerSyslog
AnalyzerManagedSyslogEvents
ManagedSyslogEvents
Change AuditReports
AAA
SyslogDatabase
Change AuditDatabase
InventoryDatabase
56
Changes to CLIChanges to CLI11
ConfigurationManager
ConfigurationManager
InventoryManager
InventoryManager
SoftwareManagerSoftwareManager
Changes from CiscoWorksPeriodic Scans or Scheduled Jobs22
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
575757© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 57© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementRME Change Audit Setup
Change Audit relies on syslog messages to operate• Point syslogs from all managed devices (except Pix firewalls) to
the RME server
Collection of usernames occurs in 3 ways:
1. Using usernames on devices themselves
2. Using a RADIUS or TACACS server
3. Using a configurations change tool in RME (NetConfig, Config Editor)
That User Name Field Is
Important to Most Customers
That User Name Field Is
Important to Most Customers
585858© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 58© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementResource Manager Essentials
• Inventory ManagerComplete Cisco asset management
Support for IGX, BPX and MGX
• Software Image ManagerSoftware lifecycle management for routers and Catalyst switches
Improved browse bug by device
• Configuration ManagerVersion control, archival, editing and reporting
Network-wide config changes
• Change Audit ServicesSingle interface for all hardware, software, and configuration changes
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
595959© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 59© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementRME Inventory Manager
• Hardware and software summary information
Chassis type
Memory
Flash
Modules
• Support for all Cisco devices in the network including Call Manager, VPN 3000, IGX, BPX, MGX
• Multiservice port reporting
606060© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 60© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementIOS and CatOS Upgrades
• Use a dedicated TFTP server to store and distribute software images
core-6506-msfc#copy tftp flash
Address or name of remote host []? 19.16.76.175 Source filename []? 12.1.8a
Destination filename []? 12.1.8a
• Resource Manager Essentials includes Software Image Manager to automate the upgrade process
or
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
616161© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 61© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementRME Configuration Manager
• NetConfigWizard-based template for global configuration changesChanges can be performed against multiple devices in the networkAdhoc can be used for any CLIs
• Config EditorOpens config from selected device in “notepad” like window
Edit functions (cut, paste)Changes a single device at a time
626262© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 62© 2002, Cisco Systems, Inc. All rights reserved.
Configuration ManagementAccess Control List Manager
• Integrated with CiscoWorks Resource Manager Essentials
Leverages functions from Inventory, Configuration Archive, Transport, Change Audit, Schedule, etc.
• Structured approach to managing ACL policies
Reduces time to deploy multiple changes
Reduces errors in ACL definition
Reduces time and improved accuracy for add, moves and changes for users and servers
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
636363© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 63© 2002, Cisco Systems, Inc. All rights reserved.
Accounting Management NetFlow
Flow Profiling
Accounting/Billing
Network Planning
Network Monitoring
Flow Collectors
Flow Collectors
End-User AppsEnd-User AppsNetFlow/Data Export
NetFlow/Data Export
*NAM
RMON Probe*RMON Probe*
646464© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 64© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementReal World Example
• A university network administrator observes dramatic increase in outgoing WAN traffic resulting in increased costs and decreased response times
Solid Green Represents Incoming Traffic
Blue Line Represents Outgoing Traffic
The ProblemThe Problem
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
656565© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 65© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementReal World Example
Considerations
• What traffic type is leaving the university?
• Why is the traffic being generated?
• Who is generating the traffic?
• How can this be prevented in the future?
The SolutionThe Solution
Management Processes in Place
• Link usage trending software
• Traffic capture and analysis capability
• Scalable QoS policy deployment software
666666© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 66© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementReal World Example
The Network Congestion Was Being Caused by File Sharing Applications
The Solution Was to Deploy Quality of Service Policies to Edge Devices
Pre-Policy Traffic Post-Policy Traffic
The SolutionThe Solution
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
676767© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 67© 2002, Cisco Systems, Inc. All rights reserved.
Performance Management Link Usage Trending
• University was logging incoming and outgoing usage over time with MRTG
• Monitors traffic load on network links based on SNMP statistics
• Generates real-time HTML traffic reports
• Can be used to monitor any SNMP variable you choose
• It’s FREE! www.mrtg.org
686868© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 68© 2002, Cisco Systems, Inc. All rights reserved.
Performance Management Traffic Analysis
• Packet Capture and Decode
• Three-tier organization model example
• Collects RMON data from intermediate devices
• Tool analyzes data for performance metrics
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
696969© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 69© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementTraffic Analysis• Network Analysis Module
Integrated Traffic Monitoring solution for Catalyst 6000 Family
• Enables full Traffic MonitoringReal time traffic analysis
Performance monitoring
Troubleshooting
• Web based embedded Traffic Analyzer
VoIP, QoS(DSMON), ART, VLAN(SMON), RMON 1&2 monitoring
Data Capture and Decode, Alarms
• Supported by other applicationsnGenius Real-Time Monitor, CiscoView, Concord eHealth
707070© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 70© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementManaging QoS
• Application discovery• Classification into
service classes• Service class provisioning
and enforcement
CampusBackbone
VODServers
Order Entry, Finance,
Manufacturing
Order Entry, Finance,
Manufacturing
FinanceManager
RemoteCampus
Catalyst Switch
Cisco Router
CiscoRouter
DataToS
ColoringColoring
ClassificationClassification
EnforcementEnforcement
Monitor Traffic Monitor Traffic by Applicationby Application
Monitor Traffic Monitor Traffic by Service/Appby Service/App
Gold Silver Bronze
VoIP SAP E-Mail
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
717171© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 71© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementInternetwork Performance Monitor
• WAN troubleshootingMeasures hop-by-hop response time, availability, jitter, and drops
Provides real-time and historical reports
• Utilizes Service Assurance Agent embedded in Cisco IOS
Validates and measures TCP, UDP, HTTP, VoIP, DNS, ICMP with QoS awareness
727272© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 72© 2002, Cisco Systems, Inc. All rights reserved.
Security ManagementReal World Example
• Network administrator was concerned that should the device SNMP community strings get into the wrong hands sensitive information could be extracted and unauthorized changes made
Simple Network Management ProtocolVersion: 1Community: publicPDU type: RESPONSERequest Id: 0xd1786f78Error Status: NO ERRORError Index: 0Object identifier 1: 1.3.6.1.2.1.2.2.1.8.8Value: INTEGER: 1 (0x1)
------------------------------------------------------------------------------------------------0000 00 50 04 6f d7 40 00 d0 d3 9d 73 d0 08 00 45 00 [email protected]. 0010 00 4a 59 83 00 00 ff 11 47 d9 c0 a8 4c 01 c0 a8 .JY.....G...L... 0020 4c f4 00 a1 13 11 00 36 fd 93 30 2c 02 01 00 04 L......6..0,.... 0030 06 70 75 62 6c 69 63 a2 1f 02 04 d1 78 6f 78 02 .public.....xox. 0040 01 00 02 01 00 30 11 30 0f 06 0a 2b 06 01 02 01 .....0.0...+.... 0050 02 02 01 08 08 02 01 01 c3 6f 2e 6b .........o.k ------------------------------------------------------------------------
The ProblemThe Problem
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
737373© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 73© 2002, Cisco Systems, Inc. All rights reserved.
Security ManagementReal World Example
• Administrator must make choose from the following:
Make frequent and time consuming changes of the community strings on all devices
Lock down SNMP access to the managed devices
The SolutionThe Solution
The ProcessThe Process
747474© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 74© 2002, Cisco Systems, Inc. All rights reserved.
Security ManagementReal World Example
• The network administer deployed access lists to the vulnerable devices to restrict SNMP from all hosts except those in a known secure subnet
CatOS Cat-IOS IOS
snmp-server community <MyString> ro 100
snmp-server community <MyString> rw 100
access-list 100 permit 19.16.76.192 0.0.0.63
set ip permit enable snmp
Set ip permit 19.16.76.192 255.255.255.192 snmp
The SolutionThe Solution
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
757575© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 75© 2002, Cisco Systems, Inc. All rights reserved.
Security ManagementRestricting Network Access
• User access to network servicesVPN access becoming more and more common
Common vulnerabilities are shared resources (i.e. computer labs)
• Administrator access to network devicesThird party authentication software
Usernames on network devices
Access control lists
Telnet, Console, and SNMP Access must be secure
767676© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 76© 2002, Cisco Systems, Inc. All rights reserved.
Security Management
• Controls network access by configuring access points
• Protects the flow of sensitive information by provisioning IPSecVPNs to encrypt the data
• Protects from malicious network attacks using intrusion detection sensors
VPN
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
777777© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 77© 2002, Cisco Systems, Inc. All rights reserved.
Voice ManagementPulling It All Together
• Branch office user complains of inability to make a VoIP telephony call to corporate headquarters
Corporate HeadquartersRegional Office
The ProblemThe Problem
787878© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 78© 2002, Cisco Systems, Inc. All rights reserved.
Fault Management
• Do you have a fault detection and notification tool in place in the network? If so, you may already have the answer
Corporate HeadquartersRegional Office
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
797979© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 79© 2002, Cisco Systems, Inc. All rights reserved.
Corporate HeadquartersRegional Office
Configuration Management
• Verify device configurations have not been changed to adversely affect VoIP
Yesterday Today
808080© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 80© 2002, Cisco Systems, Inc. All rights reserved.
Corporate HeadquartersRegional Office
Performance Management
• Compare current network performance against established baseline
VoIP Jitter Test between Offices
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
818181© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 81© 2002, Cisco Systems, Inc. All rights reserved.
Performance ManagementA Note on IPM Jitter Reports
If You Want These…
You Have To Do This…
core-6506-msfc(config)#rtr responder
• Your “source” and “target” must be an SA Agent capable router
• You must issue the global configuration to turn on the RTR (Response Time Reporter ) responder on the target
828282© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 82© 2002, Cisco Systems, Inc. All rights reserved.
Corporate HeadquartersRegional Office
Voice ManagementPulling It All Together
• When faced with a network problem regarding downtime or significant degradation, many different components of proper management must be in place to simplify the troubleshooting process
The SolutionThe Solution
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
838383© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 83© 2002, Cisco Systems, Inc. All rights reserved.
Review of Agenda and Main Points
• The Need for Management
What Have We Learned Today?
• Network Management Defined
• Protocols and Technologies
• Functional Areas of Network Management
• Real World Applications of Proper Management
• Preparing a Network for Management
Contribution to Bottom Line through High Availability
Understanding and Controlling Network Information and Services
Communication Models, MIBs, SNMP gets, SNMP Sets, SNMP Traps
Fault, Configuration, Accounting, Performance, Security
Configuring SNMP, Syslog, Telnet, CDP, ILMI, NTP, LoopBack
Real World Examples
848484© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 84© 2002, Cisco Systems, Inc. All rights reserved.
Conclusions
• Network management can best be defined in terms of the goals—Providing network users services with the quality and transparency they expect
• The network management model: Incorporation of all FCAPS components
• Network management tools to address each functional area
• Network management helps the bottom line—Efficiency and productivity
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
858585© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 85© 2002, Cisco Systems, Inc. All rights reserved.
• What: Cisco network management product web surveys
• How: E-mail sent to product user list with URL link to a survey
• Who: Primary users of a Cisco network management product
• When: Surveys sent via e-mail after a product has shipped for 6 months. Typically we do two surveys on a specific product per month
Cisco Network Management Surveys – Continuous Improvement
868686© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 86© 2002, Cisco Systems, Inc. All rights reserved.
• Send an e-mail to Greg Ryan at Cisco: [email protected] if you wish to be on the survey list. He will ask you what Cisco network management products you have and which versions you are using.
• There is no obligation and you can opt not to take the surveys. A gift is mailed to all survey takers.
Cisco Network Management Surveys – Getting Involved
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
878787© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 87© 2002, Cisco Systems, Inc. All rights reserved.
Further Study and References
• Network Management: A Practical Perspective—Leinwand and Fang Conroy ISBN# 0201609991
• Network Management: Principles and Practice—Subramanian ISBN# 0201357429
• How to Manage Your Network Using SNMP: The Networking Management Practicum—Rose and McCloghrie ISBN# 0131415174
• Performance and Fault Management—Della Maggiora, Elliott, Pavone, Phelps, and Thompson ISBN# 1578701805
• Cisco Enterprise Management Solutions—Wynston ISBN# 1587050064
888888© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 88© 2002, Cisco Systems, Inc. All rights reserved.
Other Network Management Sessions
• NMS-2021: Configuration of Large Scale Networks with CiscoWorks
• NMS-1031: Introduction to Collecting Traffic Accounting Information
• NMS-1011: Principles of Fault Management
• NMS-1051: Securely Managing your Network
• NMS-2001: Network Troubleshooting Tools and Techniques
• SEC-1000: Introduction to Network Security
• SEC-2006: Managing Security Technologies
Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.8230_06_2003_X2.scr
898989© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 89© 2002, Cisco Systems, Inc. All rights reserved.
Recommended Reading
Performance and Fault Management ISBN: 1578701805
Available on-site at the Cisco Company Store
909090© 2003, Cisco Systems, Inc. All rights reserved.NMS-10018230_06_2003_X2 90© 2002, Cisco Systems, Inc. All rights reserved.
Please Complete Your Evaluation Form
Session NMS-1001