Traffic Analysis Techniques for Flow and Non-Flow Networks

28
1 Traffic Analysis How To Webinar Series Traffic Analysis for Flow and Non Flow-Enabled Networks: January 26, 2010

description

Learn how to best analyze your traffic on flow enabled and non-flow enabled networks. We cover how to optimize the power of flow-based traffic analysis in networks and create valuable strategies to ensure future network stability and security.

Transcript of Traffic Analysis Techniques for Flow and Non-Flow Networks

Page 1: Traffic Analysis Techniques for Flow and Non-Flow Networks

1

Traffic Analysis How ToWebinar Series

Traffic Analysis for Flow and Non Flow-Enabled Networks:

January 26, 2010

Page 2: Traffic Analysis Techniques for Flow and Non-Flow Networks

22

Agenda:

Today’s Presenters:– Kevin Gillis, VP Product Management, Network Management– Jason Williams, Product Manager & The WhatsUp Guru

Agenda:– The Need for Traffic Analysis– Session 1,2 and 3 Recap– Flow Publisher Overview– “Mixed Network”– Technical Demonstration– Q&A – Next Steps

Page 3: Traffic Analysis Techniques for Flow and Non-Flow Networks

3

The Need for Traffic Analysis

• My network is slow and I do not know why…– Existing tools don’t give me any or enough visibility…

• Into user and application network bandwidth utilization• Into network performance issues• Into locating and troubleshooting issues• Into applications and their effect on the network• Into security breaches and unauthorized usage

Tools are either too expensive or complex to deploy

Page 4: Traffic Analysis Techniques for Flow and Non-Flow Networks

4

The Need for Traffic Analysis• My network is slow and my network does not know why…

– Existing hardware does not give me any or enough visibility…• My network hardware is not NetFlow, sFlow or J-Flow capable• My network hardware is not NetFlow, sFlow or J-Flow enabled• My network hardware is flow capable but it’s too expensive enable by taking

down the network, adding hardware and upgrading the IOS • The segment of my network is not 100% flow enabled

• Current solutions– Require expertise in packet level and protocol level analysis– Require device or network upgrades/downtime– Require investment in appliances or probes

Flow enabled hardware is either too expensive or complex to deploy

Page 5: Traffic Analysis Techniques for Flow and Non-Flow Networks

Recap of Traffic Analysis Series Session 1:

Application and User Traffic Analysis

Page 6: Traffic Analysis Techniques for Flow and Non-Flow Networks

6

Application and User Traffic Analysis

• Rapid isolation of server versus network based issues• Insight into reasons for application traffic

– Traffic loads– Users– Peak usage timeframes

• Establish a performance baseline• Locate under and over subscribed applications and servers

– Standalone servers– Virtualized servers

• Traffic to individual virtual machines (VMs)

Why is server based traffic analysis important?

Creates opportunity to optimize server infrastructures based upon actual user and application utilization data.

Page 7: Traffic Analysis Techniques for Flow and Non-Flow Networks

7

Server Traffic Analysis Deployment

• Flow Publisher Server Agent– Windows Server

• 32 & 64 bit: Standard and Enterprise Server 2008 and Standard & Enterprise Server 2003 SP2

• Non-virtualized and virtualized servers

• Network interface

– Runs as a Windows service• Small resource footprint

Application and user traffic analysis at the source

Page 8: Traffic Analysis Techniques for Flow and Non-Flow Networks

Recap of Traffic Analysis Series Session 2:

Traffic Analysis for Non Flow-Enabled Networks: “TAP”ing

Page 9: Traffic Analysis Techniques for Flow and Non-Flow Networks

9

TAPing…What’s a TAP and how does it work?

– TAP stands for Test Access Point.– A network tap is a fully passive device.– Electrically or optically packets are copied onto the tap ports.

Considerations– Fidelity: You get 100% guaranteed view of network traffic even with larger deployments of 10

Gigabit+. They are completely passive and do not cause any distortion even on FDX and full bandwidth networks.

– Security: Taps are not addressable network devices & therefore cannot be hacked– Ease of Use: Taps have no setups or command line issues so getting all the data is assured

and saves users time. They are also fault tolerant.

Summary:– Taps offers high integrity and fidelity with 100% packet capturing; no packet or frame

alterations.– As a fully passive device, it does not impact the performance or scalability of the switch or

router unit.– Requires additional hardware to be purchased and installed potentially leading to downtime.

Page 10: Traffic Analysis Techniques for Flow and Non-Flow Networks

10

Internet

Firewall

This Switch does not support port mirroring or SPAN

Netflow Datagram

Example TAP Deployment

Page 11: Traffic Analysis Techniques for Flow and Non-Flow Networks

Recap of Session 3: Mirroring and SPANing

Page 12: Traffic Analysis Techniques for Flow and Non-Flow Networks

SPANing by any other name…What’s a SPAN and how does it work?

– Port Mirroring, Port Monitoring, Switched Port Analyzer or SPAN (Cisco world), or Roving Analysis Port (RAP-3COM)

– A port mirror is active packet duplication• The network device physically has the duty of copying packets onto a mirror port. • This device has to carry on this task by using some resources (e.g. CPU) and that both traffic directions will be

copied into the same port. – The network device must support port mirroring

Considerations– Packet Loss: Full duplex links can’t exceed the network speed before packet loss occurs. This

because there’s physically no space to copy packets. • LAN switches are designed to groom data (change timing, add delay), extract bad frames and ignore all layer 1 & 2

information. • VLAN tags are not normally passed which can lead to false issues detected and difficulty in finding VLAN issues.• Frame interaction timing is changed, corrupt packets and/or small packets are dropped.

– Time Consuming and Potentially Political:• Proper spanning requires that a network engineer configure the switches properly • You must ensure that no packet flow is mirrored more than once. • Configurations can become a political issue between IT team, the security team and the compliance team

Summary:– Port mirroring may not require any new hardware as it can be performed by many switches (but not

all) – Fidelity and integrity must be considered. Packet loss can happen for a variety of reasons. – Scalability is a real concern: With Gigabit and 10 Gigabit technologies (and Full Duplexing doubling

the base bandwidth), switches/routers can’t both mirror and handle primary job of switching and routing.

Page 13: Traffic Analysis Techniques for Flow and Non-Flow Networks

13

Flow Publisher 1.0 Overview

Page 14: Traffic Analysis Techniques for Flow and Non-Flow Networks

14

Flow Publisher v1.0 Summary

• Flow data generated from raw network traffic– Convert raw traffic into NetFlow v1, v5 and v9 compliant flow records

• Full range of NetFlow information• Not sampled flow data

• Pinpoint or broad traffic analysis– Windows servers and any applications (e.g. Oracle, SAP, Exchange)– Passive using TAPs (Test Access Point)– Active packet duplication through virtually any network device

supporting port mirroring

• High impact: non-invasive and inexpensive to maintain– Leverages existing network infrastructure– No device hardware or software upgrades required– Does not require network or device downtime

Enables flow analysis for non-flow capable devices

Page 15: Traffic Analysis Techniques for Flow and Non-Flow Networks

15

Flow Publisher v1.0 Features

• Two Components1. Agent Manager Interface

• Configure and manage a single or multiple agents

2. Flow Publisher Agent• Processes raw traffic data• Standalone installation

» Windows computer

– TAP or mirrored interfaces

– Accepts raw traffic from up to 4 individual interfaces

• Hosted installation– Directly on Windows Servers

» Application monitoring

» User monitoring

» VMware Virtualized Systems

Software only solution

2.

1.

Page 16: Traffic Analysis Techniques for Flow and Non-Flow Networks

16

Flow Publisher v1.0 Features cont’d

• Integrates with v14.x of WhatsUp Gold and v2.0 of Flow Monitor for:

– Real-time traffic monitoring and analysis

– Threshold alerting

– 40+ reports (web and mobile)

• Maps MAC addresses to reported interfaces • Jumbo and fragmented packet support• Configurable logging

– 3 levels of detail

• 2 levels of traffic capture– Normal

– Promiscuous

Page 17: Traffic Analysis Techniques for Flow and Non-Flow Networks

17

Flow Publisher v1.0 Features cont’d

Provides the same information into Flow Monitor for analysis and reporting as other NetFlow sources. This includes the following:

1. Protocol 2. Application (port number) 3. Conversations 4. Sender host 5. Receiver host 6. Sender domain 7. Receiver domain 8. Sender top level domain (TLD) 9. Receiver TLD 10. Top sender country 11. Top receiver country 12. Type of service (ToS) 13. Top Senders with the Most Conversation Partners14. Top Senders with the Most Failed Connections15. ICMP Types16. Top Receivers with the Most Conversation Partners17. Top Receivers with the Most Failed Connections18. Packet Size Distribution

Page 18: Traffic Analysis Techniques for Flow and Non-Flow Networks

18

Agent & Collector High-level InteractionServer with Flow

Publisher agent Installed

TAP

Switch

Switch forwards mirrored traffic to Flow Publisher agent

Agent forwards NetFlow records to Flow Monitor collector

TAP forwardsbi-directional traffic to Flow Publisher agent

Server based agent forwards NetFlow records to Flow Monitor collector

`

Flow Publisher agent on PC

`

WhatsUp Gold and Flow Monitor

collector

Three flexible deployment models provide unlimited choices

Page 19: Traffic Analysis Techniques for Flow and Non-Flow Networks

1919

Flow and Non Flow-Enabled Flow Monitoring

Page 20: Traffic Analysis Techniques for Flow and Non-Flow Networks

20

A Flow is a Flow is a Flow…

Application and user traffic analysis at the source

Application TrafficWindows service, small resource footprint, normal & promiscuous mode

Passive TapHardware solution, <$1k, 100% capture, minimal admin and skills

SPAN/MirroringHardware solution, Free or low costs, drops packets, remote admin, specialized skills

Page 21: Traffic Analysis Techniques for Flow and Non-Flow Networks

SummaryApplication TAP SPAN/Mirror

Active device Passive device Active device

No Cost Moderate Cost No to low cost

Normal or Promiscuous mode

100% capture including errors

Drops physical layer, bad and/or small frames

No packet loss Full visibility into FD networks

Drops packets on busy FD Networks

N/A Can not monitor intra-switch traffic

Can monitor intra-switch traffic

Does not alter timing Does not alter timing Can change timing of frame interaction

Local or Remote config Local configuration Remote Configuration

Minimal config skills Minimal config skills High config skills

Page 22: Traffic Analysis Techniques for Flow and Non-Flow Networks

2222

Flow and Non Flow-Enabled Flow MonitoringTechnical Demonstration

Page 23: Traffic Analysis Techniques for Flow and Non-Flow Networks

23

Generate flow based traffic without expensive software, hardware, operating system upgrades or sacrificing down-time.

Page 24: Traffic Analysis Techniques for Flow and Non-Flow Networks

2424

Q & APlease submit your questions

via the Q&A feature in the lower right corner

Additional Questions?

Jason Williams – [email protected] Gillis – [email protected]

orhttp://whatsupgold.com/community – then go to Forums

Page 25: Traffic Analysis Techniques for Flow and Non-Flow Networks

25

Questions from customers…• Anthony F

– Q: Did I hear and see correctly...This application will flow monitoring of non-flow enabled devices?  Such as some of Cisco's smaller catalysts switches.

– A: That is correct.  Our other sessions will go into details on how to set that up.• Michael M

– Q: Can you set thresholds per TOS field per device? For example can I set up a threshold that will alarm me if EXP traffic exceeds 30% on any device?

– A: Yes, you should be able by creating a Flow Monitor Custom Threshold.• Scot L

– Q: How can unclassified traffic be further defined?– A: By configuring or monitoring the ports.

• Temple M– Q: In a case where you are spanning or mirroring a core switch to the agent, which in turn reports to the Whatsup box, does that

create an intense increase in traffic or storage to the Whatup system?– A: It may, but remember that Flows contains only headers and there are several options to keep the volume under control.

• Kai M– Q: But a switch with port mirroring is as good as a tap right?– A: Yes, but mirroring has a small limitation in performance, when both directions are used at the same time at higher level. It

may drop some packets.• Ming W

– Q: Is the Flow Monitor licensed based on the number of WUG devices licensing?– A: The Flow Monitor license is based on the number of devices sending netflow data, totally independent of the WhatsUp

devices.

Page 26: Traffic Analysis Techniques for Flow and Non-Flow Networks

2626

Next Steps…

Find out more about Flow Publisher v1.0http://www.whatsupgold.com/whatsnew

Try - free 30 day evaluationhttp://www.whatsupgold.com/download

Buy – (3) ways to purchase www.whatsupgold.com/buy

1. WhatsUp Gold Representative2. An Ipswitch Reseller Partner of your choice3. Online via our ecommerce shop

Increased visibility into single segment, multi-segment, application and user traffic on your network!

Page 27: Traffic Analysis Techniques for Flow and Non-Flow Networks

27

Flip over this…1 randomly selected attendee will receive a Flip Mino camcorder

Page 28: Traffic Analysis Techniques for Flow and Non-Flow Networks

2828

Thank you!