“ Local Area Network Management with use of Simple Network Management Protocol over Microsoft Windows Operating System “
Dariusz Terefenko
X00088029
Table of Contents
1
1.1
1.1.1
1.2
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.3
1.3.1
1.3.2
1.3.3
Introduction
Network Management
Network Audit
The Areas of Management
Management of Emergency Situations
Managing the Use of Resources
Configuration Management
Performance Management
Security Management
Network Management Systems
The Network Management Software Architecture
Distributed Network Management
Traditional Network Management
3
4
4
5
5
5
6
6
7
7
9
11
12
2
2.1
2.1.1
2.1.2
2.1.3
2.2
2.3
2.3.1
2.3.2
2.3.3
2.4
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
Network Management Protocols
SNMPv1
SNMPv1 Architecture
MIB Databases in SNMP
Limitations of SNMP
SNMPv2
SNMPv3
SNMPv3 Architecture
Message Processing in SNMPv3
Security in SNMPv3
Security between SNMP Versions
Elements of Security
SNMP Version 1
SNMP Version 2
SNMP Version 3
White Papers and Threats
Summary
14
14
17
20
23
23
26
26
27
28
29
29
29
30
33
40
42
3
3.1
3.2
3.2.1
3.2.2
3.2.3
3.3
3.3.1
3.4
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.4.6
Practical Network Management
SNMP Service in Windows
Management of Active Network Devices
MRTG
PRTG
PRTGdroid
Simulation and Data Capture Tools
GNS3
SNMP Simulation
Addressing Scheme
Interface Configuration
IP Routing Configuration
SNMP Configuration
Running Configuration
PRTG Configuration
43
43
45
46
49
51
51
52
52
54
55
55
55
55
55
4
4.1
4.2
4.3
4.4
4.5
4.6
Simulation Tests
Connection State
System Uptime and Downtime
Free CPU Memory
CPU Load
Bandwidth
Security
59
59
63
66
69
72
77
5
5.1
5.2
5.3
Interviews and Survey
Interviews
Survey
Conclusions
82
82
86
96
Acknowledgments
Glossary of Abbreviations
List of Tables
List of Figures
List of References
List of Appendices
97
References: [10] SolarWinds (2012) SNMP MIB Browser Features, Available at: http://www.solarwinds.com/products/toolsets/mibbrowser.aspx (Accessed: 27th August 2012). [22] Carnegie Mellon University (2002) Multiple Vulnerabilities in SNMPv1 Request Handling, Pittsburgh: United States Computer Emergency Readiness Team. [23] Carnegie Mellon University (2008) SNMPv3 Improper HMAC Validation allows Authentication Bypass, Pittsburgh: United States Computer Emergency Readiness Team. [24] Carnegie Mellon University (2002) Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP), Pittsburgh: United States Computer Emergency Readiness Team. [26] Paessler (2012) PRTG Network Monitor - Paessler Router Traffic Grapher Network Monitor, Available at: http://www.paessler.com/prtg/ (Accessed: 30th August 2012). [27] Paessler (2012) PRTGdroid - Paessler Router Traffic Grapher for Android Based Device, Available at: http://www.paessler.com/apps/androidapp (Accessed: 1st September 2012). [34] Dariusz Terefenko (2012) SNMP Survey, Available at: http://kwiksurveys.com/app/rendersurvey.asp?sid=8d3guoypx85vgwk25102&refer= (Accessed: 29th September 2012). [35] Cisco Networking Academy (2012) Cisco Packet Tracer, Available at: http://cisco.netacad.net (Accessed: 30th September 2012). [36] HEAnet Limited (2010) Ireland’s National Education & Research Network, Available at: http://www.heanet.ie (Accessed: 3rd October 2012). [37] Paessler (2013) PRTG Network Monitor Feature Overview, Available at: http://www.paessler.com/prtg/features (Accessed: 23rd March 2013). [38] GNS3 (2007-2013) GNS3 - Graphical Network Simulator, Available at: http://www.gns3.net (Accessed: 23rd March 2013). [39] Wireshark Foundation (2013) Wireshark - The World 's Foremost Network Protocol Analyser, Available at: http://www.wireshark.org (Accessed: 23rd March 2013). [40] Paessler (2013) What does error code PExxx mean? Knowledge Base [Online] [43] Colasoft LLC (2010) Colasoft - Maximise Network Value, Available at: http://www.colasoft.com/ping_tool/ (Accessed: 27th March 2013). [44] i2CAT (2013) AutoBAHN system under the GN3 project SA2.T5, Available at: http://dana.i2cat.net/autobahn-a-bandwidth-on-demand-service-for-geant/uncategorized (Accessed: 30th March 2013).