Beruflich Dokumente
Kultur Dokumente
LornaRobertshaw,DirectorofApplicationsEngineering
OPNETTechnologies
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All
trademarks are the property of their respective owners and are used herein for identification purposes only.
Corporate Overview
Founded in 1986
Publicly traded (NASDAQ: OPNT)
HQ in Bethesda, MD
Approximately 600 employees
Worldwide presence through direct offices and channel partners
Corporate Enterprises
Government Agencies/DoD
Service Providers
Network Equipment Manufacturers
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
Network Engineering,
Operations, and Planning
Network R&D
Modeling and Simulation for Defense Communications
Wireless Network Modeling and Simulation
Accelerating Network R&D
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
Agenda
Monitoring Application Behavior
Case Study: Impact of rogue application and users
Case Study: Impact of worms and viruses
Case Study: Impact of bottlenecks
Monitoring, Triage, and Forensics
Monitoring network and application behavior with OPNET ACE Live
Deep-dive packet analysis and forensics with ACE Analyst
Using application characterizations in OPNET Modeler
Questions
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
MonitoringApplicationBehavior
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All
trademarks are the property of their respective owners and are used herein for identification purposes only.
CaseStudy:ImpactofRogueApplications
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
CaseStudy:ImpactofWormsandViruses
The perfect storm: Large software company. Battles
between IT staff and developers over management
of development servers.
unstable
Infected computers also caused major network
outages that impacted non-infected computers!
CaseStudy:ImpactofNetworkBottlenecks
Medical Service Provider
One data center with large research facilities (high bandwidth),
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ThreeDimensionsofApplicationPerformance
Management
Monitoring: high-level view
OPNET
Confidential
Not
release
third
parties.2009
2009OPNET
OPNETTechnologies,
Technologies,Inc.
Inc.AllAllrights
rightsreserved.
reserved.OPNET
OPNETand
andOPNET
OPNETproduct
productnames
namesare
aretrademarks
trademarksofofOPNET
OPNETTechnologies,
Technologies,Inc.
Inc. All
OPNET
Confidential
Not
forfor
release
to to
third
parties.
Alltrademarks
trademarksare
arethe
theproperty
propertyofoftheir
theirrespective
respectiveowners
ownersand
andare
areused
usedherein
hereinfor
foridentification
identificationpurposes
purposesonly.
only.
ACE Live
ACE Live
Data Center
10
OPNET
Confidential
Not
release
third
parties.2009
2009OPNET
OPNETTechnologies,
Technologies,Inc.
Inc.AllAllrights
rightsreserved.
reserved.OPNET
OPNETand
andOPNET
OPNETproduct
productnames
namesare
aretrademarks
trademarksofofOPNET
OPNETTechnologies,
Technologies,Inc.
Inc. All
OPNET
Confidential
Not
forfor
release
to to
third
parties.
Alltrademarks
trademarksare
arethe
theproperty
propertyofoftheir
theirrespective
respectiveowners
ownersand
andare
areused
usedherein
hereinfor
foridentification
identificationpurposes
purposesonly.
only.
EndUserExperienceMonitoring
24x7 application monitoring appliance
End-user response time for all transactions and users
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ACELiveInsights
Easy guided workflows for troubleshooting and analysis
Point-and-click wizards automate best practices
Accomplish complex tasks at a mouse-click
Customizable
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
BandwidthHogs
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
Alerts:PotentialDoSAttacks
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
WormHunt:DetectExternalAttacks
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
EndUserResponseTimes:ServerDelay
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
EndUserResponseTimes:NetworkDelays
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
AnalyticsforNetworkedApplications
Automatic root-cause analysis
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ACEAnalystforDeepDiveForensics
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ApplicationCharacterizationfor
simulationinOPNETModeler
Real traffic patterns add accuracy to simulated models
Simulate DoS attacks etc.
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ApplicationMonitoring:Summary
Quality monitoring tools will help you:
Weed out rogue applications
Detect and study security threats
Only pay for bandwidth you need
Avoid congestion caused by inefficient architecture
Understand import of issues on end-user experience
TRIAGE problems and allow deeper dive into FORENSICS tools
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
NetworkConfigurationMonitoring
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc. All
trademarks are the property of their respective owners and are used herein for identification purposes only.
CaseStudy:Impactofmisconfigurations
onWANinfrastructure
Global ISP
Core routers have HUGE routing tables
Peering points to customer networks use route filters to avoid bombarding CE
routers with Internet routing tables
Operator fat fingers route filter name
Cisco IOS responds by sharing no routes
Months pass
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
CaseStudy:DefaultPasswords
Large insurance company with stringent regulatory requirements
(SOX, HIPAA)
Some routers and switches in production network still have staging
configurations
Default username/pw combinations (cisco/test etc) found on Internet
facing devices
Production community strings found on devices
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
NetworkAudit,Security,andPolicyCompliance
SentinelArchitecture
Production Network
Scheduled
Audit Engine
Configuration
& Topology
Near Real-Time
Comprehensive
Network Model
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
SecurityStandardsandGuidelines
Standard/Guide
PCI Data Security
Standard
Description
Describes the Payment Card Industry (PCI) Data Security Standard (DSS) requirements.
Applicable Organizations
* Banks
* Credit Card Merchants
PCI DSS requirements are applicable if a Primary Account Number (PAN) is stored, processed, or
transmitted.
NIST Special Publication
800-53
(also basis for FISMA
compliance)
Provides technical guidance to enhance the confidentiality, integrity, and availability of Federal
Information Systems.
DISA Network
Infrastructure STIG
Provides security configuration guidance to enhance the confidentiality, integrity, and availability of
sensitive DoD Automated Information Systems (AISs).
This document is provided by NIST as part of its statutory responsibilities under the Federal Information
Security Management Act (FISMA) of 2002, P.L. 107-347.
This Security Technical Implementation Guide (STIG) is provided under the authority of DoD Directive
8500.1.
NSA Router Security
Configuration Guide
Provides technical recommendations intended to help network administrators improve the security of
their routed networks.
The initial goal for this guide is to improve the security of the routers used on US Government
operational networks.
* DoD
* Defense Contractors
* Federal Agencies
Provides technical recommendations intended to help network administrators improve the security of
their switched networks.
* DoD
* Federal Agencies
* Defense Contractors
* Federal Agencies
* DoD
* Enterprises
* Service Providers
* DoD
* Enterprises
* Service Providers
The initial goal for this guide is to improve the security of the switches used on DoD operational
networks.
Cisco SAFE Blueprint for
Enterprise Networks
Provides Ciscos best practices to network administrators on designing and implementing secure
networks.
* Enterprises
ISO-17799
Provides guidelines and general principles for initiating, implementing, maintaining, and improving
information security in an organization.
* Enterprises
This is an International Standard developed by the International Organization for Standardization (ISO)
and the International Electro technical Commission (IEC).
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ExampleSentinelReports
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
ExampleSentinelReports
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
AutomatedNetworkDiagramming
Automatically generate up-to-date
network diagrams
Published in Microsoft Visio format
Comprehensive and detailed unified
network views
Physical layouts
Detailed configuration information
Logical views including Layer 2/3,
VPN, OSPF, BGP, and VLANs
Custom annotations
Benefits
Meet regulatory compliance
requirements: PCI, SOX, etc.
Accelerate network troubleshooting
Perform effective asset & change
management
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.
Questions?
OPNET Confidential Not for release to third parties. 2009 OPNET Technologies, Inc. All rights reserved. OPNET and OPNET product names are trademarks of OPNET Technologies, Inc.
All trademarks are the property of their respective owners and are used herein for identification purposes only.