Monitoring Cisco Content Services Switch Using ehealth

Size: px
Start display at page:

Download "Monitoring Cisco Content Services Switch Using ehealth"

Transcription

1 Focus Topic April 2006 Monitoring Cisco Content Services Switch Using ehealth The Cisco CSS Series Content Services Switch (CSS) is a layer 7 switch which routes messages to devices based on message content, going well beyond traditional routing based on layer 3 packet headers. The switch is useful for tasks like load balancing and adapting to server failure. The ehealth Suite now offers enhanced support for the switches. You can monitor them using the ehealth system to ensure that your service is performing as expected. When performance does not meet expectations, ehealth reports can help you pinpoint the cause of the problem. Support for the Cisco switch described in this topic is available with ehealth Release 5.7 Patch 2 and later. ehealth s Solution for Cisco Content Services Switch This topic describes how to actively monitor the Cisco switch using ehealth reports. It contains the following sections: License and Software Requirements lists the release requirements, third party support, ehealth licensing information, and discovery information. Element Overview describes the elements and their naming conventions that ehealth monitors. Reports describes how to run At-a-Glance, Trend, and Top N reports for Cisco switches. Live Exceptions Monitoring describes how profiles monitor Cisco switches. Reference Information provides lists of supported Trend and Top N variables and At-a-Glance charts. Further Information describes how to obtain an ehealth Element Variable report for the Cisco switch. License and Software Requirements ehealth provides support for Cisco switches running software versions 7.20 and later. Cisco switches need to be explicitly configured with policies and rules that route transactions to appropriate servers. Discovery To discover Cisco CSS elements, you use the Router mode and Application mode in the Discover dialog box. If you discover the Cisco elements using the Application mode and subsequently the router elements using Router mode, the CSS elements will not be associated with the router elements. Correct this by rediscovering the elements using both modes. The switch element uses the standard ehealth licensing model; each switch element consumes one license.

2 Element Overview Monitoring Cisco Content Services Switch Using ehealth Figure 1. Cisco CSS Data Model Figure 1 illustrates the ehealth model for the Cisco switch. The nonshaded elements represent the CSS application features and the traditional router elements are represented by the shaded elements. Elements The following describes each of the Cisco switch elements: CSS - Represents the entire device and contains box-wide flow statistics. There is a single element for each CSS device. Buffer Pool - Represents statistics associated with a buffer pool. There can be as many as 2 buffer pools per subslot. Content Rule - Represents a single content rule. There is one element per content rule. DOS Attacks - Tallies various categories of denial-of-service (DOS) attacks. There is a single element for the entire device. Group - Represents a collection of local servers that are capable of initiating flows viewed as a single virtual server with its own IP address. There is one element for each group. An element group differs from the ehealth concept of a group as a collection of monitored elements. Service - Represents a server to which connections are forwarded. There is one element per service. Service Content Rule - Represents content rule statistics broken down by service. There is one element per content rule per relevant service. Subslot/Resources - Represents resource consumption associated with a single subslot. The number of elements equals the number of subslots. Since each slot can have as many as 8 subslots, there can be as many as 14 * 8 = 112 subslots on the device. Slot/Flow Stats - Represents a slot on the device and contains per-slot flow statistics. The number of elements equals the number of slots, up to 14. This element is supported by Cisco software versions 7.50 and later only. Element Naming Conventions ehealth offers the following conventions for naming elements: Router: routerid-ah CSS Element: routerid-ah-css Buffer Pool Element: routerid-ah-css-poolslotnumber-subslotnumber-bufferpoolnumber Content Rule Element: routerid-ah-css-ruleruleowner-rulename DOS Attacks Element: routerid-ah-css-dos Group Element: routerid-ah-css-groupgroupname Service Element: routerid-ah-css-serviceservicename Service Content Rule Element: routerid-ah-css- SCR-ruleOwner-ruleName-serviceName Slot/Flow Stats Element: routerid-ah-cssslotnumber Subslot/Resources Element: routerid-ah-css- Subslot-slotNumber-subSlotNumber 2

3 Live Exceptions Monitoring ehealth offers two default Live Exceptions profiles to monitor Cisco switches. Apply these profiles to groups (or group lists) that contain these elements in order to raise alarms for failures and unusual workload: The Cisco CSS - Failure profile contains Time over Threshold rules to indicate when there are too many switch failures. This can indicate: availability problems, any DOS attacks, subslot CPU utilization is too high, or buffer use is too high. The Cisco CSS - Unusual Workload profile uses Deviation from Normal rules to indicate unusually large number of content rule requests and flows per second boxwide. The profile can help show sudden and unexpected growth in capacity. Reports ehealth offers Top N, Trend, and At-a-Glance reports for Cisco switches. Use these reports to gain insight into the performance of your switches. At-a-Glance reports contain a set of pre-defined charts that provide insight into the performance of the elements. Review Table 1 on page 5 for a list of At-a- Glance charts that appear for each element. You can use the At-a-Glance reports to compare variables and look for combinations of problems that could indicate problem sources. From At-a-Glance charts, you can drill down to Trend reports and view performance data in greater detail. The ehealth software supports drill downs between the At-a-Glance reports associated with the switch elements. This allows you to navigate to a higher or lower view for a resource, and enables you to review the performance of related elements. Also, the linking capabilities between At-a-Glance reports follow the element hierarchy as shown in Figure 1., where each element can drill down to its subordinate element or drill up to its superordinate element. Trend reports allow you to view more granular data on a particular performance variable or set of variables for an element. You can also view trends over time from both At-a-Glance and Trend reports. Top N reports provide information on groups of elements. These reports use the same variables as Trend reports, but in addition they offer variables such as peak values. You use this report type when you want to compare variables for multiple elements in a group. When you run Top N reports, you select a group of elements and the variables that you want ehealth to compare for each element in that group. Sample At-a-Glance Report When you run At-a-Glance reports for Cisco switch devices and you choose a Technology, select App Service. This At-a-Glance report displays several charts for the 360:4186 Subslot element. The charts show the percentage of Submobile Availability, CPU utilization, and the Available System Heap Memory in the previous 24 hours. 3

4 Sample Trend Report When you run a Trend report for an element, you can select up to 10 variables. For instructions on accessing the most current list of Trend and Top N variables for each element, refer to the Trend and Top N Variables section on page 5. This Trend report shows that the percentage of average CPU utilization remained consistent over a one hour period. Sample Top N Report When you run a Top N report, you select a group of elements for which you want to view common values, and then select up to six variables for comparison. The sample Top N report displays the percentage of average CPU utilization for the Cisco switch elements in the selected group. 4

5 Reference Information This section lists the following: How to access current Trend and Top N variables for the Cisco CSS elements. Supported At-a-Glance charts that gauge the performance of each Cisco CSS element over a specified time period. Accessing Trend and Top N Variables You can use the ehealth Element Variable Report (available from the ehealth Web interface Organization Page) to obtain details about supported Trend and Top N variables. This sample Element Variable Report shows the Trend variables for a Cisco switch element. It shows how ehealth combines and evaluates the MIB variables to obtain the data for each Trend variable for the element. At-a-Glance Charts Table 1. At-a-Glance Charts for the Cisco CSS Elements (Sheet 1 of 2) Element Charts Element Charts Buffer Pool Buffer Failures /sec Buffer Pool Low Threshold Count Content Rule Average Load, Local Services Bytes Passed /sec Drops /sec Frames Passed /sec Primary Sorry Server Hits /sec Redirects /sec Rejects /sec, no service Rejects /sec, service overload Rule Hits /sec Secondary Sorry Server Hits /sec CSS Box-Wide Active Flows Box-Wide Dropped Flows /sec Box-Wide Hits /sec Box-Wide TCP Flows /sec Box-Wide Total Flows /sec Box-Wide UDP Flows /sec Subslot CPU Utilization DOS Attacks Denial of Service Attacks /sec Denial of Service Illegal Destination xxattacks /sec Denial of Service Illegal Source xxattacks /sec Denial of Service LAND Attacks / xxsec Denial of Service Port 0 Attacks /sec Denial of Service Smurf Attacks /sec Denial of Service SYN Attacks /sec 5

6 Table 1. At-a-Glance Charts for the Cisco CSS Elements (Sheet 2 of 2) Element Charts Element Charts Group Bytes Passed /sec Connections /sec Current Connections Current FTP Control Connections Group Uses /sec Frames Passed /sec FTP Control Connections /sec Service Availability (%) Average Load Average Response Time (msec) Current TCP Connections Load, Long Lived Flows Load, Short Lived Flows State Transitions /sec Service Content Rule Service Bytes Passed /sec Service Frames Passed /sec Service Rule Hits /sec Slot/Flow Stats Active Flows Dropped Flows /sec Hits /sec TCP Flows /sec Total Flows /sec UDP Flows /sec Subslot/Resources Available System Heap Memory xx(bytes) CPU Utilization (%) Submodule Availability (%) System Heap Chain Depth Copyright 2006 CA. All rights reserved. 6

Managing Cisco QoS Using ehealth

Managing Cisco QoS Using ehealth Focus Topic January 2006 Managing Cisco QoS Using ehealth Quality of Service (QoS) is a measure of performance that allows you to configure different levels of service for various types of traffic in your

More information

Monitoring UPS Devices and Environmental Sensors Using ehealth

Monitoring UPS Devices and Environmental Sensors Using ehealth Focus Topic August 2005 Monitoring UPS s and Environmental s Using ehealth Uninterruptible Power Supplies (UPS) and Environmental s are widely deployed in IT environments. A UPS provides reliable power

More information

Advanced Application Reporting USER GUIDE

Advanced Application Reporting USER GUIDE Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product

More information

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide May 2006 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide March 2007 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

Configuring Simple Network Management Protocol (SNMP)

Configuring Simple Network Management Protocol (SNMP) CHAPTER 5 Configuring Simple Network Management Protocol (SNMP) This chapter provides information on configuring Simple Network Management Protocol (SNMP) features of your CSS. It also provides a brief

More information

Performing Path Traces

Performing Path Traces About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Configuring Firewall TCP SYN Cookie

Configuring Firewall TCP SYN Cookie The Firewall TCP SYN Cookie feature protects your firewall from TCP SYN-flooding attacks. TCP SYN-flooding attacks are a type of denial-of-service (DoS) attack. Usually, TCP synchronization (SYN) packets

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 9 CHAPTER To have the sensor send SNMP traps, you must also choose Request SNMP Trap as the event action when you configure signatures. For more information, see Assigning Actions to Signatures, page 5-23.

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Getting Started with ehealth for Voice--Cisco CallManager

Getting Started with ehealth for Voice--Cisco CallManager Focus on Setup Getting Started with ehealth for Voice-- Cisco CallManager manages IP telephony devices and call services over a data network and manages call setup, controls call devices, and collects

More information

NAT Support for Multiple Pools Using Route Maps

NAT Support for Multiple Pools Using Route Maps NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host

More information

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 Table of Contents 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 i 1 Intrusion Detection Statistics Overview Intrusion detection is an important network

More information

Performing Basic System Management

Performing Basic System Management This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding

More information

About Clients, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10. Monitor and Troubleshoot the Health of All Client Devices

About Clients, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10. Monitor and Troubleshoot the Health of All Client Devices About Clients, on page 1 Monitor and Troubleshoot the Health of All Client Devices, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10 Trace the Path of a Device, on page 13 About

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge Focus on Setup Getting Started with ehealth for Voice Cisco Unity & Unity Bridge What s Inside About ehealth for Voice Cisco Unity. An overview of the product components. Requirements. Prerequisites for

More information

Assure the Health of Your Network

Assure the Health of Your Network DNA Center Assurance Overview, on page 1 Monitor and Troubleshoot the Overall Health of Your Enterprise, on page 4 Monitor and Troubleshoot the Health of Your Network, on page 7 Monitor and Troubleshoot

More information

Overview of the NAM Traffic Analyzer

Overview of the NAM Traffic Analyzer CHAPTER 1 These topics provide information about using the various components of the NAM Traffic Analyzer: Introducing the NAM Traffic Analyzer, page 1-1 Using the NAM Graphical User Interface A Closer

More information

VoIP and Network Quality Manager

VoIP and Network Quality Manager GETTING STARTED GUIDE VoIP and Network Quality Manager Version 4.4.1 Last Updated: Wednesday, August 9, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/voip_network_quality_manager_(vnqm)/vnqm_documentation

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Monitoring WAAS Using WAAS Central Manager. Monitoring WAAS Network Health. Using the WAAS Dashboard CHAPTER

Monitoring WAAS Using WAAS Central Manager. Monitoring WAAS Network Health. Using the WAAS Dashboard CHAPTER CHAPTER 1 This chapter describes how to use WAAS Central Manager to monitor network health, device health, and traffic interception of the WAAS environment. This chapter contains the following sections:

More information

Protection Against Distributed Denial of Service Attacks

Protection Against Distributed Denial of Service Attacks Protection Against Distributed Denial of Service Attacks The Protection Against Distributed Denial of Service Attacks feature provides protection from Denial of Service (DoS) attacks at the global level

More information

Monitoring Data CHAPTER

Monitoring Data CHAPTER CHAPTER 4 The Monitor tab provides options for viewing various types of monitored data. There are options for: Overview of Data Collection and Data Sources, page 4-2 Viewing the Monitor Overview Charts,

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

CA Spectrum MPLS Transport Manager

CA Spectrum MPLS Transport Manager CA Spectrum MPLS Transport Manager User Guide Release 9.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SPECTRUM. QoS Manager User Guide (5165) r9.1.1

SPECTRUM. QoS Manager User Guide (5165) r9.1.1 SPECTRUM QoS Manager User Guide (5165) r9.1.1 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

SPECTRUM MPLS Transport Manager

SPECTRUM MPLS Transport Manager SPECTRUM MPLS Transport Manager User Guide (5120) r9.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

ehealth Administration Overview Guide

ehealth Administration Overview Guide ehealth Administration Overview Guide MN-EHADMOV-001 October 2006 This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker

More information

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices Preface p. xv Acknowledgments p. xvii Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices p. 6 Firewall

More information

Troubleshooting High CPU Utilization Due to the IP Input Process

Troubleshooting High CPU Utilization Due to the IP Input Process Troubleshooting High CPU Utilization Due to the IP Input Process Document ID: 41160 Contents Introduction Prerequisites Requirements Components Used Conventions IP Input Sample IP Packet Debugging Session

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Configuring TCP Header Compression First Published: January 30, 2006 Last Updated: May 5, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Phone NTP Reference Configuration

Phone NTP Reference Configuration CHAPTER 5 If you want to do so, you can configure phone Network Time Protocol (NTP) references in Cisco Unified Communications Manager Administration to ensure that a SIP Phone gets its date and time from

More information

IMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP

IMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution

More information

Configuring IP Services

Configuring IP Services This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Inspection of Router-Generated Traffic

Inspection of Router-Generated Traffic Inspection of Router-Generated Traffic The Inspection of Router-Generated Traffic feature allows Context-Based Access Control (CBAC) to inspect traffic that is originated by or destined to the router on

More information

Multicast Subsecond Convergence

Multicast Subsecond Convergence Multicast Subsecond Convergence Last Updated: January 11, 2012 The Multicast Subsecond Convergence feature comprises a comprehensive set of features and protocol enhancements that provide for improved

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices

More information

Finding the Needle in the Haystack

Finding the Needle in the Haystack Finding the Needle in the Haystack Jonzy Data Security Analysis, Sr. Finding the Needle in the Haystack With all the information available via NetFlows, finding the "Needle in the Haystack" (the bad actor

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks Security+ Guide to Network Security Fundamentals, Fourth Edition Network Attacks Denial of service Attacks Introduction: What is DoS? DoS attack is an attempt (malicious or selfish) by an attacker to cause

More information

Cisco Device Management

Cisco Device Management Cisco Device Management User Guide Document 0809 Notice Copyright Notice Copyright 2002-present by Aprisma Management Technologies, Inc. All rights reserved worldwide. Use, duplication, or disclosure by

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic;

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic; NetVizura NetFlow Analyzer enables you to collect, store and analyze network traffic data by utilizing Cisco NetFlow, IPFIX, NSEL, sflow and compatible netflow-like protocols. It allows you to visualize

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Configuring Real Servers and Server Farms

Configuring Real Servers and Server Farms 6 CHAPTER This section provides an overview of server load balancing and procedures for configuring real servers and server farms for load balancing on an ACE appliance. When you use the ACE CLI to configure

More information

9. Security. Safeguard Engine. Safeguard Engine Settings

9. Security. Safeguard Engine. Safeguard Engine Settings 9. Security Safeguard Engine Traffic Segmentation Settings Storm Control DoS Attack Prevention Settings Zone Defense Settings SSL Safeguard Engine D-Link s Safeguard Engine is a robust and innovative technology

More information

Viewing Router Information

Viewing Router Information CHAPTER39 The Cisco Router and Security Device Manager (Cisco SDM) Monitor mode lets you view a current snapshot of information about your router, the router interfaces, the firewall, and any active VPN

More information

script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide.

script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide. script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide. script [play script_name { argument } record script_name]

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

IMC Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved.

IMC Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved. Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved. Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

Configuring Network Proximity

Configuring Network Proximity CHAPTER 9 This chapter describes how to configure a Global Site Selector to perform network proximity to determine the best (most proximate) resource for handling global load-balancing requests. This chapter

More information

Nested Class Map Support for Zone-Based Policy Firewall

Nested Class Map Support for Zone-Based Policy Firewall Nested Class Map Support for Zone-Based Policy Firewall The Nested Class Map Support for Zone-Based Policy Firewall feature provides the Cisco IOS XE firewall the functionality to configure multiple traffic

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.

More information

Configuring Logging for Access Lists

Configuring Logging for Access Lists CHAPTER 17 This chapter describes how to configure access list logging for extended access lists and Webytpe access lists, and it describes how to manage deny flows. This section includes the following

More information

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V.

A taste of HTTP v1.1. additions. HTTP v1.1: introduces many complexities no longer an easy protocol to implement. G.Bianchi, G.Neglia, V. Why HTTP needed extensions? A taste of HTTP v1.1 additions HTTP v1.1: introduces many complexities no longer an easy protocol to implement Simple (one packet) ) Web Page SYN Retrieval Time Propagation

More information

Student ID: CS457: Computer Networking Date: 3/20/2007 Name:

Student ID: CS457: Computer Networking Date: 3/20/2007 Name: CS457: Computer Networking Date: 3/20/2007 Name: Instructions: 1. Be sure that you have 9 questions 2. Be sure your answers are legible. 3. Write your Student ID at the top of every page 4. This is a closed

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Wired Network Summary Data Overview

Wired Network Summary Data Overview Wired Network Summary Data Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE.

More information

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

The ehealth Traffic Accountant Reporting Application

The ehealth Traffic Accountant Reporting Application Focus on Value The ehealth Traffic Accountant Reporting Application Understanding data (or traffic ) flow is essential for capacity planning and enabling a consistent level of performance particularly

More information

Phone NTP Reference Configuration

Phone NTP Reference Configuration CHAPTER 8 If you want to do so, you can configure phone Network Time Protocol (NTP) references in Cisco Unified CallManager Administration to ensure that a Cisco SIP IP Phone gets its date and time from

More information

Configuring Control Plane Policing

Configuring Control Plane Policing 21 CHAPTER This chapter describes how to configure control plane policing (CoPP) on the NX-OS device. This chapter includes the following sections: Information About CoPP, page 21-1 Guidelines and Limitations,

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan

Power of Slicing in Internet Flow Measurement. Ramana Rao Kompella Cristian Estan Power of Slicing in Internet Flow Measurement Ramana Rao Kompella Cristian Estan 1 IP Network Management Network Operator What is happening in my network? How much traffic flows towards a given destination?

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Transport Layer Review

Transport Layer Review Transport Layer Review Mahalingam Mississippi State University, MS October 1, 2014 Transport Layer Functions Distinguish between different application instances through port numbers Make it easy for applications

More information

Configuring Logging for Access Lists

Configuring Logging for Access Lists CHAPTER 20 This chapter describes how to configure access list logging for extended access lists and Webytpe access lists, and it describes how to manage deny flows. This chapter includes the following

More information

Implementing NAT-PT for IPv6

Implementing NAT-PT for IPv6 Implementing NAT-PT for IPv6 Last Updated: August 1, 2012 Network Address Translation--Protocol Translation (NAT-PT) is an IPv6 to IPv4 translation mechanism, as defined in RFC 2765 and RFC 2766, allowing

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Quality of Service. Understanding Quality of Service

Quality of Service. Understanding Quality of Service The following sections describe support for features on the Cisco ASR 920 Series Router. Understanding, page 1 Configuring, page 2 Global QoS Limitations, page 2 Classification, page 3 Marking, page 6

More information

CA Spectrum Infrastructure Manager

CA Spectrum Infrastructure Manager CA Spectrum Infrastructure Manager Non-Persistent Connections Manager User Guide r9.2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")

More information

Configuring RTP Header Compression

Configuring RTP Header Compression Configuring RTP Header Compression First Published: January 30, 2006 Last Updated: July 23, 2010 Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted.

More information

Introduction to Cisco ASA Firewall Services

Introduction to Cisco ASA Firewall Services Firewall services are those ASA features that are focused on controlling access to the network, including services that block traffic and services that enable traffic flow between internal and external

More information

Understanding Zone and DoS Protection Event Logs and Global Counters

Understanding Zone and DoS Protection Event Logs and Global Counters Understanding Zone and DoS Protection Event Logs and Global Counters Revision C 2015, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Threat Events for Zone and DoS Activity Monitoring...

More information

NETWORK PACKET ANALYSIS PROGRAM

NETWORK PACKET ANALYSIS PROGRAM NETWORK PACKET ANALYSIS PROGRAM Duration: 3 days (21 hours) Mode: 1. Instructor Led Class room Training and Labs 2. Online In this hands-on course, you will receive in-depth training on Protocol analysis

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls Attack Protection Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Configuration Example for CUCM Non-Secure SIP Integration with CUC

Configuration Example for CUCM Non-Secure SIP Integration with CUC Configuration Example for CUCM Non-Secure SIP Integration with CUC Contents Introduction Prerequisites Requirements Components Used Configure Configuration on CUCM Configuration on Unity Connection Verify

More information

Implementing Traffic Filters for IPv6 Security

Implementing Traffic Filters for IPv6 Security Implementing Traffic Filters for IPv6 Security Last Updated: November 14, 2011 This module describes how to configure Cisco IOS XE IPv6 traffic filter and firewall features for your Cisco networking devices.

More information

Configuring IP TCP MSS

Configuring IP TCP MSS Finding Feature Information, page 1 Feature History for IP TCP MSS, page 2 Information About IP TCP MSS, page 2 Licensing Requirements for IP TCP MSS, page 3 Default Settings for IP TCP MSS, page 3 Guidelines

More information

CSCI 466 Midterm Networks Fall 2013

CSCI 466 Midterm Networks Fall 2013 CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Memory Threshold Notifications

Memory Threshold Notifications The feature allows you to reserve memory for critical notifications and to configure a router to issue notifications when available memory falls below a specified threshold. Finding Feature Information,

More information

IP Source Tracker. Finding Feature Information. Restrictions for IP Source Tracker. Last Updated: January 18, 2012

IP Source Tracker. Finding Feature Information. Restrictions for IP Source Tracker. Last Updated: January 18, 2012 IP Source Tracker Last Updated: January 18, 2012 The IP Source Tracker feature tracks information in the following ways: Gathers information about the traffic that is flowing to a host that is suspected

More information

QoS: Time-Based Thresholds for WRED and Queue Limit

QoS: Time-Based Thresholds for WRED and Queue Limit QoS: Time-Based Thresholds for WRED and Queue Limit The QoS: Time-Based Thresholds for WRED and Queue Limit feature allows you to specify the Weighted Random Early Detection (WRED) minimum and maximum

More information