CHAPTER FOUR
Network
Management
CONTENTS
Network Management
Configuring our network
Network Services
TCP/IP Troubleshooting Commands
Remote administration
WHAT IS NETWORK MANAGEMENT?
Network: autonomous system of 100s, 1000s or 10000s interacting hardware/software
components.
Management: accomplishing goals and objectives, efficiently and effectively
network management is about:
❍ configuration of the network
❍ monitoring equipment performance
❍ monitoring network traffic
❍ meeting business goals: eg partitioning of users
❍ dealing with issues – equipment failure, overload, malicious attacks, …
A NETWORK MANAGEMENT SYSTEM (NMS)
It refers to a collection of applications that enable network components to be
monitored and controlled.
NETWORK MANAGEMENT FUNCTIONS
has grouped the management functions into five areas:
(i) configuration management
(ii) fault management
(iii) accounting management
(iv) security management
(v) performance management.
CONFIGURATION MANAGEMENT
It is concerned with initializing a network, provisioning the network
re-sources and services, and monitoring and controlling the network.
It consists of both device configuration and network configuration.
Device configuration can be performed either locally or remotely.
Automated network configuration, such as :
Dynamic Host Configuration Protocol (DHCP) and
Domain Name Services (DNS)
When an IP-based local area network is installed, each
computer must be configured with an IP address.
If the computers need to access the Internet, they should also
be configured with a gateway address and one or more DNS
server addresses.
Dynamic Host Configuration Protocol (DHCP)
Used to automatically obtain the configuration information. A device
on the network may act as a DHCP server.
The DHCP server stores a list or pool of IP addresses, along with
other information (such as subnetmask, gateway and DNS
addresses) that it may assign to the other devices on the network.
Domain Name Systems (DNS) is mechanisms that assign easy to
remember names to IP address.
Allows you to translate domain names automatically to Ip address on
the Internet.
A key element of the DNS is a worldwide collection of DNS servers.
Domains have been made on the base of organization type or
geographical locations, e.g., the domain name google.com (where,
com indicates that Google is a commercial organization).
FAULT MANAGEMENT
It involves detection, isolation, and correction of abnormal operations
that may cause the failure of the OSI network.
The major goal is to ensure that the network is always available and
when a fault occurs, it can be fixed as rapidly as possible.
Faults should be distinct from errors. An error is generally a single
event, whereas a fault is an abnormal condition that requires management
attention to fix.
SECURITY MANAGEMENT
Protects the networks and systems from unauthorized access and security
attacks.
The mechanisms for security management include
Authentication
Encryption
authorization.
It concerned with generation, distribution, and storage of encryption keys
as well as other security-related information.
ACCOUNTING MANAGEMENT
It enables charge for the use of managed objects to be
measured and the cost for such use to be determined.
The measure may include :
the resources consumed
the facilities used to collect accounting data
set billing parameters for the services used by customers
The maintenance of the databases used for billing purposes
the preparation of resource usage and billing reports.
PERFORMANCE MANAGEMENT
It is concerned with evaluating and reporting the
behavior and the effectiveness of the managed network
objects.
A network monitoring system can measure and display
the status of the network, such as gathering the statistical
information on traffic volume, network availability,
response times.
NETWORK MANAGEMENT PROTOCOLS
FTP (File Transfer Protocol) allows the transfer of collection of files between
two machines connected to the Internet.
Telnet (Terminal Protocol) allows a user to connect to a remote host in
terminal mode.
SMTP (Simple Mail Transfer Protocol) defines a basic service for electronic
mails.
SNMP (Simple Network Management Protocol) allows the management of
the network. Gather performance data (CPU usage, bandwidth, errors, uptime,
receive alerts etc.) from devices like routers, switches, servers, firewalls, and
printers.
CONFIGURING A LINUX BOX FOR NETWORKING
To communicate on a modern TCP/IP network every computer needs
compatible IP address for that network.
The IP address is composed of two portions-the network id and host id.
The network id must be the same and the host id must be unique on each
TCP/IP subnet.
The IP address can be obtained either statically or dynamically. The
interfaces are: eth0, enp3s0 → Wired
wlan0, wlp2s0 → Wireless
lo → Loopback
DHCP exists on networks to allow linux obtain compatible ips to
communicate on TCP/IP networks.
A Linux Box is a desktop, server, virtual machine, or even an embedded device that
runs the Linux operating system
CONFIGURE A LINUX SYSTEM AS A ROUTER
Router is a special device that not only provides the IP forwarding as the
main function but also supports several other IP based features such as;
packet filtering, voice over IP, IP firewall, routing etc.
It is an expensive device. Configuring it is also a complex task.
Linux provides a zero-cost solution for the IP forwarding. If you have a
Linux system in your network, you can use it for the IP forwarding.
CONFIGURING A WEB SERVER (APACHE)
Apache is currently the most widely used web server in the world. It is an
open-source software.
Apache prefer for its speed, security, reliability, robustness, and ease of
customization.
It is able to meet the needs of many environments as it allows the
installation of various extensions and modules.
It is responsible for accepting directory requests from Internet users and
sending them their desired information in the form of files.
If your server doesn’t already have Apache, you can easily install it using
one command. #sudo apt-get update
#sudo apt-get install apache2
What is Web Server?
Web servers are used to serve Web pages requested by client
computers.
Clients typically request and view Web pages using Web
browser applications such as Firefox, Opera, Chromium, or
Internet Explorer.
CONFIGURING A DOMAIN NAME SERVICE (DNS)
Domain Name Service (DNS) is an Internet service that maps IP
addresses and fully qualified domain names (FQDN) to one another.
In this way, DNS improves the need to remember IP addresses.
Computers that run DNS are called name servers.
Ubuntu ships with BIND (Berkley Internet Naming Daemon), the most
common program used for maintaining a name server on Linux.
A FQDN includes
Hostname – The specific machine or service (e.g., www, mail, ftp).
Domain name – The registered domain (e.g., example).
Top-Level Domain (TLD) – The domain extension (e.g., .com, .org, .edu).
Root (.) – The DNS root (often omitted when written).
INSTALL AND CONFIGURE BIND
1. Install BIND9 on Ubuntu: #sudo apt update
#sudo apt install bind9 bind9utils bind9-doc -y
2. Check if the Service is Running: #sudo systemctl status bind9
replace status with start and enable to start and enable the service
3. Configure a Forward Lookup Zone: #sudo nano /etc/bind/named.conf.local
4. Create the Zone File: #sudo cp /etc/bind/db.local /etc/bind/db.example.com
#sudo nano /etc/bind/db.example.com
5. Configure Reverse Lookup Zone (Optional): #sudo nano
/etc/bind/named.conf.local
6. Check Configuration: #sudo named-checkconf
#sudo named-checkzone example.com /etc/bind/db.example.com
#sudo named-checkzone 1.168.192.in-addr.arpa /etc/bind/db.192
7. Restart BIND: #sudo systemctl restart bind9
8. Test the DNS Server: #dig @192.168.1.10 example.com
#dig @192.168.1.10 www.example.com
CONFIGURING MAIL TRANSFER AGENTS (POSTFIX)
The mail server that is also known as Mail Transfer Agent is responsible
for transferring email from server to server on the internet, while mail
client performs the activities of retrieving these emails.
Postfix is a popular open-source Mail Transfer Agent (MTA) that can
be used to route and deliver email on a Linux system.
It is estimated that around 25% of public mail servers on the internet run
Postfix.
Postfix is a default package in the Ubuntu repositories, we can install it
easily by using the ‘apt-get’ command.
#sudo apt-get update #sudo apt-get install postfix
CONFIGURING A PROXY CACHES (SQUID)
Squid is a caching proxy for the web. It is a great proxy server
mainly used for caching frequently requested web content in order
to speed up response time and also save network bandwidth.
Squid optimizes the data flow between client and server to
improve performance and caches frequently used content to save
bandwidth.
Acts as a firewall or filter to block harmful sites or content.
The squid proxy server acts as an intermediate between the client
(web browsers, etc.) and the internet. Installation Commands are:
#sudo apt update
#sudo apt install squid -y
TCP/IP TROUBLESHOOTING
The TCP/IP describes a set of general design guidelines and
implementations of specific networking protocols to enable computers to
communicate over a network.
TCP/IP provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed and received at the destination.
Linux and other Unix operating systems use the TCP/IP protocol.
There are troubleshooting guide can help you resolve wireless network
(Wi-Fi) issues for systems with the Ubuntu Linux Operating System (OS).
TROUBLESHOOTING COMMANDS
1. ping: Tests connectivity between your computer and
another host (IP or domain). It sends ICMP Echo Request
packets and waits for Echo Reply. Exa ping 8.8.8.8
2. traceroute / tracert: Shows the path packets take to
reach a destination, hop by hop. Eg. traceroute
google.com
3. ifconfig / ipconfig: Displays and configures network
interfaces (Linux). Shows IP addresses, MAC addresses,
and interface.
4. netstat: Shows active network connections, routing
tables, interface stats. Example: netstat -tulnp
NETWORK CONFIGURATION
Refers to the process of setting up and managing the settings and
parameters of a computer network. It involves tasks such as
assigning IP addresses,
configuring routers and switches,
enabling network protocols, and
establishing network security measures.
Proper network configuration ensures that devices within the network
can communicate effectively and securely.
NETWORK SERVICES
Refer to the various technologies, protocols, and applications that enable
communication and connectivity within computer networks. Some common
network services include:
DNS (Domain Name System): Translates domain names into IP addresses to
facilitate web browsing and other network communication.
DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses
dynamically to devices on a network, simplifying network configuration.
NAT (Network Address Translation): Translates private IP addresses to public
IP addresses, allowing multiple devices to share a single public IP address.
Firewall: Provides security by monitoring and controlling network traffic,
protecting against unauthorized access and potential threats.
CONT..
VPN (Virtual Private Network): Creates a secure and encrypted connection
over a public network, enabling remote access and ensuring privacy.
Proxy Server: Acts as an intermediary between client devices and the
internet, improving performance, caching content, and enhancing security.
Email Services: Include protocols such as SMTP (Simple Mail Transfer
Protocol) for sending emails and POP3/IMAP (Post Office Protocol/Internet
Message Access Protocol) for receiving emails.
File Transfer Protocol (FTP): Allows the transfer of files between computers
on a network, commonly used for website hosting and file sharing.
VoIP (Voice over Internet Protocol): Transmits voice communications over
IP networks, enabling voice and video calls over the internet.
NETWORK TIME SERVICES (NTP)
Network Time Services (NTP): NTP is a protocol used to synchronize the clocks of
computers on a network.
It ensures that all devices have the correct time, which is essential for various network
activities and applications.
NTP servers distribute accurate time information, while client devices synchronize
their clocks with these servers to maintain accurate timekeeping.
Virtual Network Computing (VNC): VNC is a remote desktop sharing system that
allows you to view and control a remote computer's desktop environment over a network
connection.
It enables you to interact with a remote computer as if you were physically present at
its location.
VNC consists of a server component running on the remote computer and a client
component running on the local machine.
RPC-Based Services: RPC (Remote Procedure Call) is a
protocol that allows a program on one computer to call a
procedure on another computer without worrying about the
underlying network details.
RPC-based services are services that use RPC to
communicate between different systems or processes.
CONFIGURATION, TELNET REPLACEMENT, SECURE
COPY AND RSYNC (REMOTE SYNC)
1. Configuration: Configuration refers to the process of setting up and
adjusting the settings of a system, device, or software to meet specific
requirements or preferences.
2. Telnet Replacement: Telnet is a protocol used for remote terminal
connections, but it is considered insecure due to its lack of encryption.
Secure alternatives to Telnet, such as SSH (Secure Shell) .
3. Secure Copy (SCP): is a secure file transfer protocol. It is based on
SSH and uses encryption to protect data during transmission.
4. Rsync (Remote sync): is a utility used for efficient file synchronization
and transfer between systems.
It is particularly useful for synchronizing files and directories between
a local and a remote system over a network.
Thank You!