Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Service Assurance Agent


The Service Assurance Agent (SAA) is embedded software within Cisco IOS devices that performs active monitoring. Before you can understand what an SAA is, you need to understand active monitoring. Active monitoring is an SAA capability that generates and analyzes traffic to measure the performance among several Cisco IOS devices or between an Cisco IOS device and an application server. With active monitoring, you can measure the network performance by using the following:

  • Network delay or latency

  • Packet loss

  • Network delay variation (jitter)

  • Availability

  • One-way latency

  • Website download time

  • Network statistics


SAA can be used to measure network health, perform network assessment, verify Service Level Agreements (SLAs), and assist with troubleshooting the network. SAA is supported on almost all Cisco IOS devices.

NOTE

The SAA is a new name for the Response Time Reporter (RTR) feature. SAA retains the use of the RTR acronym in many of the configuration commands. RTR is also used throughout the command-line interface in the output of help and show commands.

SAA is accessible using SNMP, so it can also be used in performance-monitoring applications for NMSs such as CiscoWorks.

To configure SAA, you need to configure operations on the router to collect information such as response time and availability. Operations use synthetic packets that are placed in the network to collect data about that network. These packets simulate other forms of network traffic as determined by the type of operation you are configuring. SAA operations have specific identification numbers so that you can track the various operations you configured on a router. To configure a new SAA operation, use the following steps in configuration mode:


Step 1.

Enter RTR configuration mode using the

rtr operation-number command.

Step 2.

Use one of the type commands listed in Table 15-4 to specify which type of operation you are configuring.

Table 15-4. Commands to Specify SAA Operations

Operation Type

Function

RTR Command

IP/ICMP Echo

The IP/Internet Control Message Protocol (ICMP) Echo operation measures end-to-end response time between a Cisco router and devices using IP.

type echo protocol ipIcmpEcho

IP/ICMP Path Echo

The Path Echo operations record statistics for each hop along the path that the operation takes to reach its destination. The IP/ICMP Path Echo probe computes this hop-by-hop response time between a Cisco router and any IP device on the network by discovering the path using traceroute. This type of operation is typically used to isolate bottlenecks in a path.

type pathEcho protocol IpIcmpEcho

TCP Connection

The Transmission Control Protocol (TCP) Connection operation is used to discover the time taken to connect to the target device. This operation can be used to test virtual circuit availability or application availability.

type tcpConnect

UDP Echo

The User Datagram Protocol (UDP) Echo operation calculates UDP response times between a Cisco router and any IP-enabled device.

type udpEcho

FTP

The FTP operation throughput probe measures the time taken to transfer (download) a file from a remote host to the Cisco router using FTP (over TCP).

type ftp

Step 3.

(Optional) Configure characteristics for the operation.

Step 4.

Exit RTR configuration mode.

Step 5.

Schedule the operation start time.


.

The">Figure 15-6 shows two routers connected to each other via an Ethernet interface.

Figure 15-6. SAA Path Echo

This example shows a PathEcho entry from RouterB to RouterA. Example 15-3 shows the configuration needed to accomplish this.

Example 15-3. CaptionPathEcho Entry


RouterB#

configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
RouterB(config)#

rtr 2
RouterB(config-rtr)#

type pathEcho protocol ipIcmpEcho 10.1.1.1
RouterB(config-rtr)#

frequency 10
RouterB(config-rtr)#

lives-of-history-kept 2
RouterB(config-rtr)#

buckets-of-history-kept 1
RouterB(config-rtr)#

filter-for-history all
RouterB(config-rtr)#

exit

To execute this operation, the following commands must be used:


RouterB(config)#

rtr schedule 2 start-time now life 25
RouterB(config)#

exit

This command indicates that operation 2 starts immediately and that it lasts for 25 seconds. If you want to see the outcome of the operation, you can use the

show commands in Example 15-4.

Example 15-4. show rtr Command


RouterB#

show rtr ?
application RTR Application
authentication RTR Authentication Information
collection-statistics RTR Statistic Collections
configuration RTR Configuration
distributions-statistics RTR Statistic Distributions
history RTR History
operational-state RTR Operational State
reaction-trigger RTR Reaction Trigger
responder RTR Responder Information
totals-statistics RTR Statistics Totals

With

show rtr history , you can see the history of the operation, as demonstrated in Example 15-5.

Example 15-5.

show rtr history Command



RouterB#

sh rtr history
Point by point History
Entry = Entry Number
LifeI = Life Index
BucketI = Bucket Index
SampleI = Sample Index
SampleT = Sample Start Time
CompT = Completion Time (milliseconds)
Sense = Response Return Code
Entry LifeI BucketI SampleI SampleT CompT Sense TargetAddr
2 1 1 1 196981662 0 4 255.255.255.255
2 1 1 2 196981662 0 5 10.1.1.1
2 1 1 3 196981662 0 5 10.1.1.1
2 1 1 4 196981662 0 5 10.1.1.1
2 1 1 5 196981662 0 5 10.1.1.1
2 1 1 6 196981662 0 5 10.1.1.1
2 1 1 7 196981662 0 5 10.1.1.1
2 1 1 8 196981662 0 5 10.1.1.1
2 1 1 9 196981662 0 5 10.1.1.1

All other commands can be found in the command reference at the following URL:


/ 196