Network Management Fundamental
Network Management Fundamental
In this course I'm going to demonstrate Multiple Solar Winds Applications including
network performance monitor or NPM, Kiwi Syslog server, Kiwi CatTools tools and
others that may be of interest to you.
Please give feedback if there's any tools that you'd like to add to the course. But
before we get into the demonstrations it's important that you understand the
protocols that these applications rely on, to manage the network.
->So, you need a knowledge of protocols such as ICMP, SNMP or simple network
management protocol, SNMP traps, syslog and WMI. These protocols enable
applications such as NPM to access devices in GNS3 or in a production topology and
to extract information from those devices.
So, it's important that you as a network engineer or network manager have an
understanding of these protocols.
If you already know what SNMP is or what a syslog is. Feel free to skip ahead. But in
this video, I'm going to discuss some of these protocols.
->In addition to those protocols. You should know what a MIB is, or a management
information base, and what an OID is or object identifier. You should also know what
a performance counter.
->Now they are two main types of network management protocols that you should
be aware of when studying network management protocols and how to manage
your network. Always think about how the protocols work, and the advantages and
disadvantages of the two main types of network management protocols.
The two types of Query based, which means that the network management
station or NMS asks a question from a device and then waits for a response.
And then you have event-based protocols where the network management
station simply listens for announcements or events from the network.
So, with query based the network management station is sending a query to a
Router to extract information from that Router,
whereas with event-based protocols, a router switch would inform the network
management station of an issue or something taking place.
as an example, an interface goes down that's an event, and a message is sent to
the network management station to inform the network management station of
that event taking place.
->There are several advantages and disadvantages to why you'd want to use a
query-based network management protocol.
Firstly, query-based protocols are reliable, because its query based, the network
management station is queering or asking for information from a network device.
If the NMS doesn't receive a response from the device that indicates a problem.
The fact that the NMS made inquiry and didn't get back a response, indicates
that there's a problem on the network.
so, no response equates to a problem.
->Query based also called polling-based network management protocols can be
scheduled and you can set how frequently that's done.
So, you could poll the network on a very frequent basis or polled the network
less frequently to reduce the impact of the queries on the network.
As an example, you may not necessarily want to query a network device every
five seconds, because of the overhead that you are putting on the network.
Now in Orion Network Performance Monitor or Orion NPM. Also referred in this
course too as solar winds NPM.
The default setting is two minutes for Query based poles for status information and
9 minutes for Query based polling for statistics.
Orion NPM uses both query and event-based protocols.
Another key area of network management planning is knowing how to build and
leverage reports.
Now the NPM report writer makes it quite easy to create various types of reports. but
it's worthwhile having a look, at seeing which reports are available for you and how
you can customize those for different business requirements.
Now baselines are important when you're doing capacity planning or doing service
level agreement or SLA management.
You also want to think about things such as availability, which means how much a
network is up during that period of measurement.
You also want to think about performance and capacity planning.
As an example, with availability. You need to understand the term 59s or 49s.
what 59s simply means is that during the period of a year as an example. the
network is up 99.999% of the time. In other words, they are five nines in that
number, that equates to about five minutes of downtime per year.
When you deploy a network management system. it's typically going to add an
overhead to your network. This is especially true if you are using a query-based
system that's polling the network using a very short interval.
So, you should determine the scope and impact on the network that the network
management system will have.
So, as mentioned, one of the things you need to think about is polling frequency.
This means how often you're going to poll devices to collect data.
The more often that you poll devices the more granular and the more detailed
your statistics are gonna be.
However, on the flip side that means that it's going to have a larger impact on
your network because there's more traffic being transmitted on the network. The
network management system is polling the network on a more frequent basis
which puts more traffic on the network.
And in addition, there's a higher load on your network devices because they have
to reply back to the network management station with information that you
trying to gather from that network device.
So, more polling equates to more detail, and quicker detection of issues but it
puts a higher load on both the network and the devices in your network.
Now once again the advantage of more polling is that you have more detail and it's
quicker to detect issues. However, on the flip side it can create extra traffic on the
network.
Now most modern network management systems and a lot of modern network
devices can handle a larger amount of network management traffic than was
possible in the past. The processing power of your network devices and the speed of
interfaces are a lot greater today than they were a few years ago. So, it's not as much
of a problem as it may have once been.
This is another reason that you want to leverage both event-based and network
management protocols as well as query-based network management protocols.
Event based protocols once again of a real time unsolicited feedback from your
network devices. A router is going to inform the network management station when
an interface goes down.
With polling based or query-based protocols. There's a query and response. In other
words, the NMS is queering a device for information and it's responding or
answering back to that query.
Now less polling equates to less bandwidth utilization, but in addition equates to
smaller storage requirements which is another important thing to think about.
If you're collecting a large amount of data, you need to think about your disk
requirements for your sequel's server which is where NPM stores data.
large amounts of data equate to biggest databases which in turn means that you
need more disk space.
Another important topic to discuss, is the impact of the network topology on your
network monitoring.
If an interface goes down does it impact the ability of the NMS to collect data
from your network devices.
So as an example, if you viewed the network topology in something as simple as
Visio or within one of your management tools. how would an outage affect the
ability of your network management system to collect data from devices in your
network?
If you had devices at a remote site and you wanted to collect statistics from those
devices, how will a link down affect your ability to get to those statistics.
If there was only a single link to the remote site and you had a central network
management system, and the link went down, the NMS would no longer be able
to access those devices to collect data.
So, you may need to deploy a network management collector on the remote site to
collect data remotely rather than trying to collect everything from a central site. So,
this would mean as an example that you deploy a distributed network management
architecture rather than having a single centralized network management system.
This is especially true where you have multiple data centers. In that case you
might want to deploy multiple copies of NPM, one in each data center that then
forward data to an enterprise operation console or EOC.
So, remember if you can't get to it, you can't monitor it.
So, it's important that you keep track of your network topology because you need to ensure
that you have reachability status when the topology changes.
Things that may affect your own network reachability are access control lists or ACL and
firewall rules. In many networks that aren't actively being managed, you'll find that security
engineers have blocked protocols such as SNMP and ICMP.
Those two protocols are very important network management protocols, but for security
reasons they may have been blocked in various points in the network by security conscious
engineers.
So, it's important that when you starting to audit the network, in preparation to NMS roll
out. that you pay special attention to where traffic is allowed and where it's denied.
Now from a best practice point of view it's ideal to deploy a management plan which is
separate to the VLAN used for user traffic. So, a separate network or separate VLAN created
and network management traffic is permitted on that VLAN.
So, ACL and firewall rules on network devices would allow network management protocols
on that VLAN and allow an NMS to access the loopback of a router as an example.
Just be aware that if you limit access to network devices from only specific IP addresses. So,
as an example you only allow the IP address of the network management system to access
the router loopback interface using SMP.
When you change things in your network such as expanding the network management
applications. you may need to go back and adjust your access list or just your firewall rules.
So, it may be simpler to permit a subnet access to your network devices rather than locking
it down to an individual IP address.
In the same way when discussing security, you need to pay attention to different security
zones. A customer may have an outside interface on a firewall and inside interface and a
DMZ interface on their firewall.
These security zones can impact your network management systems. So, you need to
understand how you're going to deploy them in a mess and how security rules and firewalls
zones are going to affect overall reachability and the management strategy that you deploy.
Now last but not least, you need to think about overlapping and non-routable addresses in
your network. overlapping and non-routable addresses can be a real headache when
deploying network management systems.
You should audit your network and understand which addresses are reachable and from
when the network and take that into account as you start documenting the systems and
decide where to roll out your network management system.
In many cases if you have overlapping address space and you have devices on each of those
overlapping subnets that you need to monitor. you'll need to create a separate polling
engine for NPM for each duplicate address space zone.