Preview

Local Area Network Management with use of Simple Network Management Protocol over Microsoft Windows Operating System

Good Essays
Open Document
Open Document
24851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Local Area Network Management with use of Simple Network Management Protocol over Microsoft Windows Operating System
.
“ Local Area Network Management with use of Simple Network Management Protocol over Microsoft Windows Operating System “

Dariusz Terefenko
X00088029

Table of Contents
1
1.1
1.1.1
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.3
1.3.1
1.3.2
1.3.3
Introduction
Network Management
Network Audit
The Areas of Management
Management of Emergency Situations
Managing the Use of Resources
Configuration Management
Performance Management
Security Management
Network Management Systems
The Network Management Software Architecture
Distributed Network Management
Traditional Network Management
3
4
4
5
5
5
6
6
7
7
9
11
12
2
2.1
2.1.1
2.1.2
2.1.3
2.2
2.3
2.3.1
2.3.2
2.3.3
2.4
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
Network Management Protocols
SNMPv1
SNMPv1 Architecture
MIB Databases in SNMP
Limitations of SNMP
SNMPv2
SNMPv3
SNMPv3 Architecture
Message Processing in SNMPv3
Security in SNMPv3
Security between SNMP Versions
Elements of Security
SNMP Version 1
SNMP Version 2
SNMP Version 3
White Papers and Threats
Summary
14
14
17
20
23
23
26
26
27
28
29
29
29
30
33
40
42
3
3.1
3.2
3.2.1
3.2.2
3.2.3
3.3
3.3.1
3.4
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.4.6
Practical Network Management
SNMP Service in Windows
Management of Active Network Devices
MRTG
PRTG
PRTGdroid
Simulation and Data Capture Tools
GNS3
SNMP Simulation
Addressing Scheme
Interface Configuration
IP Routing Configuration
SNMP Configuration
Running Configuration
PRTG Configuration
43
43
45
46
49
51
51
52
52
54
55
55
55
55
55
4
4.1
4.2
4.3
4.4
4.5
4.6
Simulation Tests
Connection State
System Uptime and Downtime
Free CPU Memory
CPU Load
Bandwidth
Security
59
59
63
66
69
72
77
5
5.1
5.2
5.3
Interviews and Survey
Interviews
Survey
Conclusions
82
82
86
96

Acknowledgments
Glossary of Abbreviations
List of Tables
List of Figures
List of References
List of Appendices
97



References: [10] SolarWinds (2012) SNMP MIB Browser Features, Available at: http://www.solarwinds.com/products/toolsets/mibbrowser.aspx (Accessed: 27th August 2012). [22] Carnegie Mellon University (2002) Multiple Vulnerabilities in SNMPv1 Request Handling, Pittsburgh: United States Computer Emergency Readiness Team. [23] Carnegie Mellon University (2008) SNMPv3 Improper HMAC Validation allows Authentication Bypass, Pittsburgh: United States Computer Emergency Readiness Team. [24] Carnegie Mellon University (2002) Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP), Pittsburgh: United States Computer Emergency Readiness Team. [26] Paessler (2012) PRTG Network Monitor - Paessler Router Traffic Grapher Network Monitor, Available at: http://www.paessler.com/prtg/ (Accessed: 30th August 2012). [27] Paessler (2012) PRTGdroid - Paessler Router Traffic Grapher for Android Based Device, Available at: http://www.paessler.com/apps/androidapp (Accessed: 1st September 2012). [34] Dariusz Terefenko (2012) SNMP Survey, Available at: http://kwiksurveys.com/app/rendersurvey.asp?sid=8d3guoypx85vgwk25102&refer= (Accessed: 29th September 2012). [35] Cisco Networking Academy (2012) Cisco Packet Tracer, Available at: http://cisco.netacad.net (Accessed: 30th September 2012). [36] HEAnet Limited (2010) Ireland’s National Education & Research Network, Available at: http://www.heanet.ie (Accessed: 3rd October 2012). [37] Paessler (2013) PRTG Network Monitor Feature Overview, Available at: http://www.paessler.com/prtg/features (Accessed: 23rd March 2013). [38] GNS3 (2007-2013) GNS3 - Graphical Network Simulator, Available at: http://www.gns3.net (Accessed: 23rd March 2013). [39] Wireshark Foundation (2013) Wireshark - The World 's Foremost Network Protocol Analyser, Available at: http://www.wireshark.org (Accessed: 23rd March 2013). [40] Paessler (2013) What does error code PExxx mean? Knowledge Base [Online] [43] Colasoft LLC (2010) Colasoft - Maximise Network Value, Available at: http://www.colasoft.com/ping_tool/ (Accessed: 27th March 2013). [44] i2CAT (2013) AutoBAHN system under the GN3 project SA2.T5, Available at: http://dana.i2cat.net/autobahn-a-bandwidth-on-demand-service-for-geant/uncategorized (Accessed: 30th March 2013).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    University of Phoenix. (n.d.). Service Requests Web Links. Academic Materials and Tools. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/cist/libraries/sitemap.htm…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What is seen in each of the three panes that display the packets seen on a local area network? Hint: For full credit, you must talk about what is displayed in each pane in addition to the name of each pane. (1 point)…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Best Essays

    References: Limoncell, T. A., Hogan, C. J., & Chalup, S. R. (2007). The Practice of System and Network Administration, Second Edition. Addison-Wesley Professional.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This test will verify whether Client Security checkpoints are effective in eliminating security breaches to client’s Cisco Network…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    This tool is used to identify the path that must be followed to reach one system from another. It…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    1. Both Wireshark and NetWitness Investigator can be used for packet capture and analysis. Which…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bsp-Ojt Report

    • 390 Words
    • 2 Pages

    Generate interface utilization reports for the TMS Network. Update, configure and add devices in WhatsUP monitoring with Engr. Gladys Lara.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays