PACE-IT: Network Monitoring (part 2) - N10 006

14
Network monitoring II.

Transcript of PACE-IT: Network Monitoring (part 2) - N10 006

Page 1: PACE-IT: Network Monitoring (part 2) - N10 006

Network monitoring II.

Page 2: PACE-IT: Network Monitoring (part 2) - N10 006

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of Expertise Industry Certifications

PC Hardware

Network Administration

IT Project Management

Network Design

User Training

IT Troubleshooting

Qualifications Summary

Education

M.B.A., IT Management, Western Governor’s University

B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions.

Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3: PACE-IT: Network Monitoring (part 2) - N10 006

Page 3

Network monitoring II.

– Active network monitoring tools.

– Wireless monitoring tools.

– Environmental monitoring.

PACE-IT.

Page 4: PACE-IT: Network Monitoring (part 2) - N10 006

Page 4

Active network monitoring tools.Network monitoring II.

Page 5: PACE-IT: Network Monitoring (part 2) - N10 006

Page 5

Active network monitoring tools.

Port scanners are used to scan a network for open ports and protocols. The information gathered is then used to harden the network.

Port scanners are a great method of finding vulnerabilities in the network infrastructure and plugging them before a security breech can occur.

A word of caution: only use a port scanner on a network or system that you are authorized to scan. Port scanning is a possible sign of someone trying to breech a system and can lead to problems if you are not authorized to scan that system.

Network monitoring II.

Page 6: PACE-IT: Network Monitoring (part 2) - N10 006

Page 6

Active network monitoring tools.

– Interface monitoring/packet flow monitoring.

» These are usually deployed as active software tools to monitor and analyze network traffic within a network segment.

• Commonly called packet sniffers or protocol analyzers, they allow for an in depth look at what traffic is on the network and may reveal security issues that the network administrator can then mitigate.

» They can identify top talkers on a network segment.• The interfaces that are sending the most network

traffic (or utilizing the most bandwidth for sending packets).

» They can identify top listeners on a network segment.• The interfaces that are receiving the most network

traffic (or utilizing the most bandwidth for receiving packets).

» Microsoft Message Analyzer and Wireshark are examples of free packet flow monitoring tools.

Network monitoring II.

Page 7: PACE-IT: Network Monitoring (part 2) - N10 006

Page 7

Wireless monitoring tools.Network monitoring II.

Page 8: PACE-IT: Network Monitoring (part 2) - N10 006

Page 8

Wireless monitoring tools.

– Wi-Fi analyzer.» A similar tool to the protocol analyzer, but for wireless

networks. • Sniffs out packets on wireless networks.

» Can check for bandwidth usage, channel usage, top talkers etc.

» Can identify networks by passively scanning the radio frequencies (RFs).

» Can identify hidden networks if given enough time.» Can infer non-beaconing networks based on data

traffic.

– Wireless survey tools.» Most commonly used as a design tool for setting up

high quality wireless networks.• Through the use of mapping tools, the survey tools

can help to establish the required amount of access points (APs), ideal antenna placement, and optimum channel overlap.

• Can also be used to identify possible causes of RF» Used to eliminate wireless network performance and

security issues before they even occur.

Network monitoring II.

Page 9: PACE-IT: Network Monitoring (part 2) - N10 006

Page 9

Environmental monitoring.Network monitoring II.

Page 10: PACE-IT: Network Monitoring (part 2) - N10 006

Page 10

Environmental monitoring.

A network’s health can be affected by more than just a network interface failing or a possible security breech.

Network and systems administrators also need to be concerned about environmental factors. Some of those factors include electrical power, heat, and humidity.

Network monitoring II.

Page 11: PACE-IT: Network Monitoring (part 2) - N10 006

Page 11

Environmental monitoring.

– Power monitoring.» Systems and tools can be used to evaluate the amount

of and the quality of the electrical power being delivered to the system.

• Power monitoring is often deployed with, or alongside, an uninterruptable power supply (UPS).

• The monitor will issue an alert when an issue with electrical power has been identified.

– Environmental monitors.» Heat monitors.

• All electrical components are designed to operate within a specified heat range.

• While they are designed to operate within a range, electrical components also generate heat when in use.

• Monitors allow administrators to control temperature levels.

» Humidity monitoring.• Too little humidity increases the risk of electrostatic

discharge and too much humidity increases the risk of condensation.

• Monitors allow administrators to control humidity levels.

Network monitoring II.

Page 12: PACE-IT: Network Monitoring (part 2) - N10 006

Page 12

What was covered.Network monitoring II.

Port scanners are used to scan for unsecured ports and protocols. The information gathered by port scanners is used to harden networks and make them less vulnerable to security breeches. Interface monitoring evaluates network traffic at the packet level. Packet sniffers can help to identify issues on the network that can then be mitigated.

Topic

Active network monitoring tools.

Summary

A Wi-Fi analyzer is similar to a packet sniffer, but checks wireless network packets instead. Analyzers can also identify which RF channels are in use. The analyzer can help to identify wireless networks, even ones that are hidden. Wireless survey tools are used to help design efficient and secure wireless networks.

Wireless monitoring tools.

A network’s function and health can be affected by environmental factors. Power monitors are used to evaluate the electrical supply being delivered to the system. Heat and humidity monitors are used to help maintain the correct levels of heat and humidity.

Environmental monitoring.

Page 13: PACE-IT: Network Monitoring (part 2) - N10 006

Page 13

THANK YOU!

Page 14: PACE-IT: Network Monitoring (part 2) - N10 006

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.

PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.