Presentation Title Size 30PT

Download Report

Transcript Presentation Title Size 30PT

CCNA 5.0
Planning Guide
Chapter 8: Monitoring the
Network
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Chapter 8: Objectives
 Explain syslog operation in a small-to-medium-sized business
network.
 Configure syslog to compile messages on a small-to-medium-sized
business network management device.
 Explain syslog operation in small-to-medium-sized business
network.
 Configure SNMP to compile messages on a small-to-mediumsized business network.
 Describe NetFlow operation in a small-to-medium-sized business
network.
 Configure NetFlow data export on a router.
 Examine sample NetFlow data to determine traffic patterns.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Chapter 8: Overview
 This chapter covers three protocols that a network administrator
can use to monitor the network.
 Syslog, SNMP, and NetFlow are popular protocols with different
strengths and weaknesses. Together, they provide a good toolset
for understanding what is happening on a network.
 The Network Time Protocol is used to synchronize time across
devices, which is especially important when trying to compare log
files from different devices.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Chapter 8: Activities
What activities are associated with this chapter?
 8.0.1.2 Class Activity – Network Maintenance Development
 8.1.1.5 Activity – Interpreting Syslog Output
 8.1.2.5 Packet Tracer – Configuring Syslog and NTP
 8.1.2.6 Lab – Configuring Syslog and NTP
 8.2.1.7 Activity – Identifying Characteristics of SNMP Versions
 8.2.1.8 Lab – Researching Network Monitoring Software
 8.2.2.4 Lab – Configuring SNMP
 8.3.1.4 Activity – Comparing SNMP and NetFlow
 8.3.3.3 Lab – Collecting and Analyzing NetFlow Data
 8.4.1.1 Class Activity – A Network Monitor’s Toolbox for Monitoring
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Chapter 1: Packet Tracer Activity Password
The password for all the Packet Tracer activities in this chapter is:
PT_ccna5
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Chapter 8: Assessment
 Students should complete Chapter 8 Exam after completing
Chapter 8.
 Worksheets, labs and quizzes can be used to informally assess
student progress.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Chapter 8: New Terms
What terms are introduced in this chapter?
8.1.1.1
8.1.1.2
8.1.1.3
Syslog
Out-of-band (OOB)
Internal Buffer
8.1.1.4
Severity Level
Facility
Mnemonic
Time-stamped
8.1.2.1
Daemon
8.1.2.3
Trap Level
8.1.2.4
Pipe Option
8.2.1.1
Simple Network Management (SNMP)
Network Management System (NMS)
Traps
MIB
8.2.1.1
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Chapter 8: New Terms (cont.)
What terms are introduced in this chapter?
8.2.1.4
8.2.1.5
SNMPv1
SNMPv2Classic
SNMPv2c
SNMPv3
Community Strings
8.2.1.6
Object ID
8.3.1.1
8.3.1.3
Netflow
Flexible Netflow
Type of Service (TOS) Marking
8.3.2.2
Netflow Collector
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Chapter 8: Best Practices
 Prior to teaching Chapter 8, the instructor should complete Chapter
8, “Assessment.”
 Emphasize the value in using network monitoring to not only know
the “health” of your network, but to prevent future problems.
 Inform students that syslog servers are either a free or paid
application and that functional level varies among different servers.
 Remind students that without timestamps, troubleshooting can be
much harder as there is no way to view messages in synchronous
time.
 When discussing NetFlow, examples help students to understand
why it is important. Quality of service (QoS) in an IP Phone and data
network, for example.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Chapter 8: Additional Help
 For additional help with teaching strategies, including lesson plans,
analogies for difficult concepts, and discussion topics, visit the
CCNA Community at http://community.netacad.net/web/ccna/files.
 If you have lesson plans or resources that you would like to share,
upload them to the CCNA Community to help other instructors.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Chapter 8: Topics Not in ICND2 200-101
 This section lists topics covered by this chapter that are NOT listed
in the ICND2 200-101 Blueprint. Those topics are posted at
http://www.cisco.com/web/learning/exams/list/icnd2b.html.
 Instructors could skip these sections; however, they should provide
additional information and fundamental concepts to assist the
student with the topic.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Chapter 4: Topics Not in ICND2 200-101
What sections of this chapter are NOT in the ICND2 200-101
certification blueprint?
8.0
Section
Introduction
8.1.1
Topic
Syslog Operation
8.3.1
Topic
NetFlow Operation
8.3.2
8.4
Topic
Section
Configuring NetFlow
Summary
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14