Logs and Monitoring - N10-008 CompTIA Network+ : 3.1

Professor Messer
25 Oct 202111:21

Summary

TLDRThe video script discusses the importance of analyzing logs from network devices like routers, switches, and firewalls for monitoring traffic flows and identifying potential issues. It highlights how logs can provide detailed insights into network activity and be used for real-time monitoring or historical analysis. The script also covers the use of syslog for standardized log collection and the role of SIEM in centralizing log data. Additionally, it touches on environmental monitoring in data centers, the use of NetFlow for traffic analysis, and the value of third-party service status pages for gauging network health.

Takeaways

  • πŸ“‘ Network infrastructure devices like routers, switches, and firewalls generate logs that provide insights into traffic flows and data summaries.
  • πŸ”₯ Firewall logs are particularly detailed, showing every flow of traffic with information about the protocol, hostname, username, ports, and disposition of the traffic.
  • πŸ•΅οΈβ€β™‚οΈ Logs are useful for real-time monitoring and for retrospective analysis to determine the cause of network events.
  • πŸ—‚οΈ Different devices have different log types, such as audit logs in Active Directory that record login and logout events.
  • πŸ”„ Logs can be consolidated using the syslog protocol, which allows for centralized logging and management.
  • πŸ‘¨β€πŸ’» Syslog assigns facility codes and severity levels to logs, aiding network administrators in prioritizing and taking action on log information.
  • πŸ” Administrators can filter logs based on severity levels to focus on critical alerts or view detailed debug information as needed.
  • πŸ› οΈ Monitoring individual interfaces on devices can help identify potential network issues such as runts, giants, or CRC errors.
  • 🌑️ Environmental factors like temperature, humidity, and electrical systems are crucial for the health and availability of network equipment.
  • πŸ“Š NetFlow is a tool for collecting detailed statistics from network traffic, providing insights into conversations, endpoints, applications, and more.
  • 🌐 Third-party services and cloud status pages can provide service availability and performance metrics, which can be cross-referenced with internal network data.

Q & A

  • What types of network devices can provide valuable logs for analysis?

    -Network devices such as routers, switches, firewalls, and other infrastructure devices can provide logs that detail traffic flows and summaries of data traversing the device.

  • How detailed are the logs typically found in firewalls?

    -Firewall logs are often very detailed, showing every single flow of traffic and providing information about what's contained within that traffic flow.

  • What is the utility of storing historical network logs?

    -Storing historical network logs allows administrators to go back in time to determine what may have happened before or after a particular event.

  • What kind of information can be extracted from a highlighted firewall log?

    -A highlighted firewall log can show the protocol, hostname, username, client field, client port number, server IP address, server port number, and the disposition of the traffic.

  • How can logs help in searching for specific network events?

    -Logs allow administrators to run searches for particular IP addresses or port numbers to view all traffic flows on the network that match those values.

  • What are some examples of logs from an Active Directory infrastructure?

    -Active Directory infrastructure logs might include audit logs that show who has logged in or out of the network, including details like process ID, file name, username, and login event.

  • How can syslog help in consolidating logs from various network devices?

    -Syslog is a standard protocol that can be used to configure different devices to send log information to a centralized logging receiver, often consolidating this data into a SIEM (Security Information and Event Manager).

  • What is the purpose of severity levels in syslog?

    -Severity levels in syslog help network administrators filter and take action on the information received from logs, distinguishing between informational details that may not require immediate action and critical details that do.

  • Why might a network administrator be interested in analyzing individual switch interfaces?

    -Analyzing individual switch interfaces can help identify potential problems with data traversing the network, such as a large number of runts or giant frames, which may indicate a collision or communication problem.

  • What are some environmental factors that can affect the health and availability of a network?

    -Environmental factors such as room temperature, humidity levels, electrical system stability, and the presence of water in cooling systems can all impact the health and availability of a network.

  • How can NetFlow provide additional network insights beyond SNMP and log files?

    -NetFlow allows for the collection of statistics and details from the raw traffic traversing the network, providing extensive information on conversations, endpoints, applications in use, and more.

Outlines

00:00

πŸ” Analyzing Network Device Logs

This paragraph discusses the importance of analyzing logs from network devices such as routers, switches, and firewalls. It highlights how these logs can provide detailed insights into network traffic flows and summaries, which are crucial for real-time monitoring and historical analysis of network events. The paragraph gives an example of firewall logs that include detailed information about each traffic flow, such as protocol, hostname, username, client and server IP addresses, port numbers, and the disposition of the traffic. It also mentions how different devices, like active directory infrastructure, have different log types, but all can be consolidated using the syslog protocol. The use of a Security Information and Event Manager (SIEM) for centralizing log data is also discussed, along with the significance of syslog's facility codes and severity levels in filtering and acting upon log information.

05:00

πŸ“Š Monitoring Network Health and Environment

The second paragraph focuses on monitoring the health and environment of a network, particularly in data centers or computer rooms. It covers the importance of monitoring variables such as temperature, humidity, voltage, and the presence of water to ensure the network's availability and prevent damage to equipment. The paragraph also discusses the use of SNMP and log files for network monitoring and introduces NetFlow for gathering detailed statistics from raw network traffic. It explains the role of a NetFlow probe and collector in monitoring network traffic and creating detailed reports. Additionally, it touches on the use of third-party services for checking the status of cloud-based services and their impact on the network.

10:02

🌐 Network Traffic Analysis and Service Monitoring

The final paragraph delves into the analysis of network traffic using tools like NetFlow, which provides insights into conversations, endpoints, applications, and more. It describes how NetFlow can help in understanding the type of traffic on the network and in interacting with security devices to ensure proper information flow. The paragraph also mentions the utility of third-party services for monitoring the status of cloud services and how they can be correlated with NetFlow or log files to assess their impact on the network.

Mindmap

Keywords

πŸ’‘Network Infrastructure

Network infrastructure refers to the hardware and software components that support the network's operations. This includes devices such as routers, switches, and firewalls. In the video, the script discusses how these devices generate logs that provide insights into network traffic flows and summaries, which are crucial for monitoring and troubleshooting network issues.

πŸ’‘Logs

Logs are records of events that occur within a system or network. They are essential for tracking activities, diagnosing issues, and auditing security. The script mentions that logs from firewalls and other devices can be detailed and contain information about traffic flows, protocols, and dispositions of data packets.

πŸ’‘Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The video script highlights that firewall logs can be very detailed, showing every flow of traffic and providing information about the content within that traffic.

πŸ’‘Traffic Flow

Traffic flow refers to the movement of data packets across a network. The script explains that logs can detail each traffic flow, which is useful for real-time monitoring and historical analysis to understand network status and identify issues.

πŸ’‘Syslog

Syslog is a standard protocol used for sending log messages from a device to a centralized log management system. The video mentions configuring devices to send syslog messages, which allows for consolidated logging and easier analysis of network events.

πŸ’‘SIEM

SIEM stands for Security Information and Event Management. It is a system that aggregates logs and events from various sources to provide real-time analysis and historical searching. The script discusses how syslog data is often sent to a SIEM for central management and analysis.

πŸ’‘Severity Levels

Severity levels classify the importance or urgency of log messages. They help network administrators prioritize issues. The video script describes how syslog assigns severity levels to log messages, allowing administrators to filter and focus on critical alerts.

πŸ’‘Ethernet Frames

Ethernet frames are the data packets used in Ethernet networks. The script discusses runts (frames smaller than 64 bytes) and giants (frames larger than 1518 bytes) as indicators of potential network issues, such as collisions or communication problems.

πŸ’‘CRC Errors

CRC errors, or Cyclic Redundancy Check errors, indicate that data corruption has occurred in a network transmission. The video script mentions that CRC errors are often caused by bad cables or interfaces and can be resolved by fixing these hardware issues.

πŸ’‘Encapsulation Errors

Encapsulation errors occur when there is a mismatch in the expected protocol or frame type between network devices. The script gives an example of mismatched trunk links using ISL versus 802.1Q standards, leading to encapsulation errors.

πŸ’‘NetFlow

NetFlow is a network protocol for collecting IP traffic information and monitoring the flow of data across a network. The video script explains that NetFlow can provide detailed statistics and insights into network traffic, such as the type of conversations, endpoints, and applications in use.

Highlights

Network infrastructure devices like routers, switches, and firewalls generate logs that provide valuable insights into traffic flows and data summaries.

Firewall logs are particularly detailed, showing every flow of traffic and its contents.

Logs can be used in real-time for network status monitoring and can also be stored for historical analysis of events.

Example firewall log details include protocol, hostname, username, client and server IP addresses, port numbers, and traffic disposition.

Logs from different devices like active directory have unique types but all contain correlatable data.

Audit logs can show login and logout events, and attempts with incorrect credentials.

Standardized log retrieval using syslog protocol allows for centralized logging management.

SIEM consolidates log data into a central database for comprehensive security information and event management.

Syslog assigns facility codes and severity levels to logs, aiding network administrators in prioritizing actions.

Severity levels can be filtered to view only critical alerts or broader debug information as needed.

Analyzing individual interface statistics can reveal potential network issues such as runts or giant frames.

CRC errors, often caused by bad cables or interfaces, can be identified and resolved by monitoring logs.

Encapsulation errors can occur due to mismatched protocols like ISL and 802.1Q on different switches.

Interface statistics provide insights into normal operation and potential errors or issues with network ports.

Environmental factors like temperature, humidity, and electrical systems are crucial for network health and availability.

Flood monitors are necessary in large data centers using water cooling systems to prevent electrical equipment damage.

Creating a baseline of network events helps in understanding normal vs. abnormal network behavior over time.

NetFlow collects detailed raw traffic statistics for deeper network performance analysis.

NetFlow data can be collected using a probe and a collector to monitor network traffic and generate reports.

Third-party services provide status updates on cloud services, which can be correlated with network logs for impact analysis.

Transcripts

play00:02

If you're working with routers, switches, firewalls,

play00:05

or other infrastructure devices connected to the network,

play00:08

there's probably logs inside of that device that can tell you

play00:11

information such as the traffic flows and traffic

play00:14

summaries of the data traversing that device.

play00:17

If you're looking at logs inside of a firewall,

play00:20

for instance, these logs are often very detailed.

play00:23

They will show you every single flow of traffic

play00:25

that's traversing that firewall, and give you

play00:27

information about what's contained within that traffic

play00:30

flow.

play00:31

These logs are not only useful to use in real time

play00:34

so you can see the status of your network,

play00:37

but you can also store this information

play00:39

and go back in time to determine what

play00:41

may have happened before or after a particular event.

play00:45

Here, for example, is a set of logs from a firewall.

play00:48

Each one of the lines here on the left side

play00:51

is a separate flow of traffic.

play00:53

On the top line, I have highlighted one particular flow

play00:57

that shows protocol, in this case,

play00:59

UDP has a hostname, a username, a client field, a client port

play01:04

number, a server IP address, a server port number,

play01:08

and then the disposition of this traffic.

play01:10

You also get a detailed view of this along the right side,

play01:14

and as you can see, an extensive number of variables

play01:17

are stored for each individual traffic flow.

play01:21

This means if you wanted to run a search

play01:22

to look for a particular IP address or a particular port

play01:25

number, you'd be able to view all of the traffic flows

play01:28

on your network that match that particular value.

play01:32

Obviously, different devices will

play01:34

have different types of logs.

play01:36

For example, if you have an active directory

play01:38

infrastructure, it probably is going

play01:40

to have a series of audit logs that

play01:42

allow you to see who might have logged in

play01:44

or logged out of the network.

play01:46

For example, this audit log shows

play01:48

a message saying that a process has been created.

play01:50

It shows a process ID.

play01:52

Shows the file name.

play01:54

In this case, it was cmd.exe that was used in this process.

play01:58

And you can see more information about the username

play02:01

and the login event.

play02:02

You can also see details on the time, the host name, event IDs,

play02:06

and other specifics.

play02:08

This allows us to keep a historical view

play02:10

of exactly who logged into the network, who logged out,

play02:13

and perhaps who may have tried to log in

play02:15

but used incorrect credentials.

play02:18

When you start looking at the log files

play02:20

on switches, routers, firewalls, Windows servers, Linux servers,

play02:24

and other devices, you'll see that each one of those log

play02:27

types is very, very different.

play02:29

But all of these diverse log files

play02:31

contain details that would allow us to correlate

play02:34

data flows together.

play02:35

Although all of the logs contain very different information,

play02:39

we can use a standardized process

play02:41

to retrieve those log files from every single one

play02:44

of these devices using a standard protocol called

play02:47

syslog.

play02:48

We can configure all of these different devices

play02:51

to send information to a consolidated logging

play02:54

receiver using the standard syslog protocol.

play02:57

In many cases, we're consolidating this information

play03:00

to SIEM.

play03:01

This is a security information and event

play03:03

manager that allows us to bring all

play03:05

of that data back to one central database. syslog

play03:09

receives this data from a particular device,

play03:11

it logs a facility code, which identifies the program that

play03:15

originally created the log, and it assigns a severity level

play03:19

to the information contained within that log.

play03:22

This allows us as the network administrator

play03:24

to take action on the information

play03:26

we're receiving from all of these different logs.

play03:28

Some of these logs will contain informational details

play03:31

that may not need any type of immediate action,

play03:34

whereas other logs may have critical details

play03:36

and alert information that require immediate action.

play03:40

We can use these severity levels as a filter.

play03:43

So we can go to a single screen and say

play03:45

that we'd like to see everything that is a warning

play03:47

level or higher or maybe we want to view all of the debug

play03:50

information sent in every log.

play03:53

You as the network administrator get

play03:55

to determine exactly what information is important to you

play03:57

at any particular time.

play03:59

You may decide during normal operation

play04:01

that you only want to see alert or emergency log information,

play04:04

but if you're doing research on a previous event,

play04:07

you may want to expand this filter out to view debug

play04:10

information and higher.

play04:12

It might also be useful to perform

play04:14

ongoing analysis of individual interfaces on these devices

play04:18

to see if there may be any problems with the data

play04:20

traversing the network.

play04:22

For example, you may be looking at interfaces on a switch,

play04:25

and you may find that it has a large number of runts.

play04:28

The minimum size of an Ethernet frame is 64 bytes.

play04:31

So if you receive a frame that is smaller than 64 bytes,

play04:35

we qualified that as a runt, and in many cases,

play04:38

that means that a collision has occurred on the network.

play04:41

On most of our networks today, we're

play04:42

using full duplex ethernet so the identification

play04:45

of a runt and potentially a collision

play04:47

is something you probably want to be aware of.

play04:50

If you're not using jumbo frames,

play04:52

the maximum size of an ethernet frame

play04:54

is going to be 1,518 bytes.

play04:57

If your networking device identifies a frame that's

play05:00

larger than 1,518 bytes, it identifies

play05:03

that as a giant frame, and again, this

play05:06

may indicate that some type of communication problem

play05:09

is occurring on the network.

play05:11

If any of these ethernet signals are corrupted

play05:13

as they're being sent across the network,

play05:15

you may receive a cyclic redundancy check

play05:17

error, or CRC error.

play05:19

You might also see this referred to as a frame

play05:22

check sequence error, or FCS error.

play05:25

These are commonly caused by a bad cable or bad interface,

play05:28

and resolving the cable or interface

play05:31

causes the CRC errors to cease.

play05:33

And there may be cases where encapsulation errors might

play05:37

occur, where one switch is expecting one type of frame,

play05:40

and the other switch is expecting

play05:42

a different type of frame.

play05:44

On older switches, for example, you

play05:46

may see trunk links that are using inner switch link

play05:49

protocol, or ISL.

play05:50

These days, we tend to use the 802.1Q standard,

play05:54

but if one side is set for ISL and the other side is set

play05:58

for .1Q, then you'll have an encapsulation error.

play06:03

If you were to log in to a switch

play06:04

and view the statistics on an individual interface,

play06:07

you might get a message very similar to this.

play06:10

And although it seems like there's

play06:11

a lot of information on the screen,

play06:13

you tend to start focusing in on very specific areas

play06:17

to get the information you need.

play06:18

For example, you may want to look

play06:20

at the very first line that shows

play06:21

that fast ethernet interface 0/1 is up

play06:25

and the line protocol is up and connected,

play06:27

which means that this interface should be operating normally

play06:30

on the network.

play06:31

We can look at another line that shows

play06:33

this is configured for full duplex and 100

play06:36

megabits per second, and the media type

play06:38

is a 10/100 interface.

play06:40

We can also see that there have been 5,701 packets.

play06:44

We can see 1,157,662 bytes, and 0, no buffer frames.

play06:51

We can also see there have been 0 CRC errors, which

play06:55

means that this particular network should

play06:57

be performing normally.

play06:59

However, we can also see a large number of broadcasts.

play07:01

5,130 broadcasts and 2,269 multicasts.

play07:07

By looking at the individual interfaces on a switch,

play07:11

you can start putting together a view

play07:13

of exactly how each interface is performing

play07:16

and if there might be any errors or problems

play07:18

with individual ports.

play07:21

When you're working with a data center or a computer room,

play07:24

you also have to be concerned about the environment.

play07:26

There are many different variables

play07:28

that can affect the overall health and availability

play07:30

of the network, such as the temperature in the room.

play07:33

These devices can get very hot and need constant cooling,

play07:37

so we want to be sure that the air conditioning that we have

play07:40

in the room is always working properly,

play07:42

so we'll want to monitor that temperature.

play07:44

We might also want to monitor the humidity level.

play07:47

If we have a lot of humidity in the air,

play07:49

then we may have some condensation,

play07:51

and we certainly want to keep that water away

play07:53

from our electrical equipment.

play07:55

If we have a low amount of humidity,

play07:57

we may have an excessive amount of static discharge, which

play08:00

is also bad for the silicon.

play08:03

Since we are connecting all of these power devices

play08:06

to an electrical system, it would also

play08:08

be useful to know if we're receiving

play08:10

the proper amount of voltage and that everything is working

play08:13

as expected, so constant monitoring

play08:15

of the electrical system can be a very valuable metric.

play08:19

In a very large data centers, you

play08:21

may be using water as part of your cooling system.

play08:24

This means we may want to have flood monitors

play08:26

in different parts of the room to make sure

play08:28

that that water never gets close to our electrical equipment.

play08:32

If you start collecting this information over time,

play08:35

you can begin to create a baseline of what

play08:38

may be expected.

play08:39

For example, you may create an all events baseline that

play08:42

shows the number of information events

play08:44

that you have coming through during the day versus the debug

play08:48

or notice events, and this can be

play08:50

used to look at event categories, security

play08:53

events, important events, or other type of metrics

play08:56

on your network.

play08:57

SNMP and log files can tell you a lot about what's

play09:01

happening on the network, but you occasionally

play09:03

would like to have a lot more detail of information that

play09:06

may be contained within the ethernet packets themselves.

play09:09

In those cases, you may need additional collection tools,

play09:13

such as NetFlow.

play09:14

NetFlow allows you to gather statistics and details

play09:18

from the raw traffic traversing the network.

play09:20

There are many different ways to collect this data.

play09:23

It may require a separate individual NetFlow probe,

play09:26

or there may be NetFlow capabilities

play09:28

built into the equipment that you're already using.

play09:31

Generally, NetFlow will have a NetFlow probe and a NetFlow

play09:34

collector.

play09:35

The probe will sit out on the network

play09:37

sometimes as part of a tapped connection or it

play09:40

may be receiving traffic from a switched port analyzer or span

play09:44

connection, and it's watching all of the packets

play09:47

traverse the network.

play09:48

It's gathering those details and exporting

play09:51

all of that NetFlow traffic back to a central NetFlow collector.

play09:55

From the NetFlow collector, you can then

play09:57

create detailed reports of everything

play09:59

that's been seen over time.

play10:01

This allows you to get extensive information of what

play10:04

may be occurring on the network, such as the type

play10:07

of conversations, the endpoints communicating, the applications

play10:11

in use, and much more.

play10:13

For example, you can get a distribution

play10:15

showing the amount of TLS traffic versus port 0, UDP,

play10:19

in the clear HTTP, and Microsoft SQL server traffic on one view.

play10:24

This will give you some insight into exactly what

play10:27

might be traversing the network and might also

play10:30

help you interact with your security devices

play10:33

to make sure that only the proper information is

play10:35

being sent over the network.

play10:38

We've talked about a lot of different types of metrics

play10:41

in this video, but sometimes, all you want to know

play10:44

is whether a service is up or down.

play10:47

Fortunately, many third party services, especially services

play10:51

in the cloud, can provide you with a list of all

play10:53

of those services and a status of how

play10:56

that service is performing.

play10:58

So if you happen to connect to the status page

play11:00

and you see that a particular problem was recently resolved,

play11:03

you may be able to track that back to your NetFlow or log

play11:06

files to determine if that, indeed,

play11:08

had an impact on your network.

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Network MonitoringInfrastructure DevicesSecurity LogsSyslog ProtocolSIEM IntegrationTraffic AnalysisNetFlow DataEnvironmental MonitoringEthernet FramesService Status