Wednesday, August 5, 2020

Week 10 - FINAL ENTRY: Network Monitoring Tools/Blog Lessons Learned

Part I: Network Monitoring Tools
For my last blog posting, I have compiled a list of network monitoring tools that are either free or affordable for the average user. Network system monitoring is necessary for every small business or large enterprise. Knowing what sort of threats your company is at risk for will help understand why your data needs monitoring and protecting. Every system should have some sort of performance monitoring system in place. One of the top tools available (which also comes with a free 30 day trial) is from SolarWinds. SolarWinds Network Performance Monitor is a comprehensive network performance monitoring tool that can monitor the status of devices with SNMP. It can automatically discover network devices connected to your network. Use the dashboard to monitor the availability and performance of connected network devices from a holistic perspective. It also includes a network topology map and you can set alerts to see when issues are impacting your network. This tool costs about $2995 (below).


Some other recommended network monitors include:
  • ManageEngine OpManager (FREE TRIAL) Network monitor that can monitor SNMP devices, switches, servers, and virtualized network services.
  • Paessler PRTG Network Monitor Free network monitoring software that uses SNMP, packet sniffing and WMI to monitor your network.
  • Atera Cloud-based RMM system includes a large range of monitors – server, network device, and application – suitable for all sized businesses.
  • Site24x7 Network management platform tools that can monitor network devices, websites, servers, applications, and more.
  • Nagios Core – One of the top open-source network monitoring tools. Includes a dashboard view, alerts system, community plugins, and more.
  • Zabbix – Open source network monitoring software with SNMP and IPMP monitoring. Includes an alerts system and community plugins.
  • Icinga – Open source network monitoring system with a DSL. Includes extensions.
  • Spiceworks Connectivity Dashboard – Free network monitoring software with a high-quality dashboard and simple alert system.
For more information on these tools, please visit: https://www.comparitech.com/net-admin/network-monitoring-tools/

Part II: Blog Lessons Learned
Writing once a week in a blog format for 10 weeks wasn't as challenging as I thought it would be. It was fairly easy to pick a topic and do some research on said topic to make a post about it. I have blogged in previous classes before so this experience isn't entirely new. It makes it easier to have a theme for the week from material covered in our chapters in class. 

I think blogging during a college class helps retain the information that you are learning every week. Usually a discussion post or paper topic will align similarly to the blog posting, so I can further elaborate on the subject and understand it better. I think that blogs are useful and can provide the reader with new information and first-hand experiences/scenarios that normal news articles or websites cannot provide. Blogging is a more intimate setting and I appreciate the impact this experience has given me. As for blogging on my own, I'm not sure if it is something I would continue in my personal time, but the idea of keeping some sort of log or journal is definitely beneficial to the individual writing it and potentially other viewers.

Until next time, this is Holly G. signing out! 😏


Tuesday, July 28, 2020

Week 9 - Hardening A Network



There are many ways to harden your network against potential cyber attacks. Hardening a network means protecting it from outside threats. Many companies have been forced to fork out millions of dollars in settlement fees because of not protecting consumer data. These days, almost every electronic device has some sort of WiFi or Bluetooth capability. The Internet of Things (IoT) devices are estimated to reach nearly 75 billion by 2025, and that means people are even at more of a risk for a cyber breach. Protecting your data is more important than ever before. Here are some ways you can harden your network (home or office).


1. Educate employees on how to protect/backup their data. Make sure they complete annual/semi-annual training on network security. Conducting exercises or simulations of cyber attacks or phishing attempts will help employees be more vigilant and aware of suspicious activity. More often the security breach happens from an internal source, so it's vital that employees receive the proper training.

2. Adopt a zero trust culture. Authenticate first/connect second. Traditionally users would connect to the internet first before authenticating. This reverse process is great for protecting the network. It works best against DDoS, man-in-the-middle, and advanced network attacks.

3. Combine on-site and cloud based storage solutions. Having this strategic combination will make it harder for an attacker to access the entire system of files.

4. Use out-of-band remote access controls. Use out-of-band methods where possible for remote access rather than opening up your firewalls to inbound network attacks.

5. Automate configuration management and firmware updates. Leaving platforms prone to configuration mistakes or open to known vulnerabilities can be mitigated by automation.


Tuesday, July 21, 2020

Week 8 - Basics of Virtualization

What is Virtualization? 

Virtualization is the process of creating a virtual version of something, such as an operating system, a server, a storage device or other network resources.

Virtualization describes a technology in which an application, guest operating system or data storage is eliminated from the true underlying hardware or software. A key use of virtualization technology is server virtualization, which uses a software layer called a Hypervisor to act as the underlying hardware. This often includes the CPU's memory, input/output, and network traffic. Hypervisors take the physical resources and separate them so they can be utilized by the virtual environment. They are able to sit on top of an OS or they can be directly installed onto the hardware. The latter is how most enterprises virtualize their systems.

Below are the basic steps of virtualization:

  1. Hypervisors detach the physical resources from their physical environments.
  2. Resources are taken and divided, as needed, from the physical environment to the various virtual environments.
  3. System users work with and perform computations within the virtual environment.
  4. Once the virtual environment is running, a user or program can send an instruction that requires extra resources form the physical environment. In response, the hypervisor relays the message to the physical system and stores the changes.

The virtual environment is often referred to as a guest machine or virtual machine (VM). The VM acts like a single data file that can be transferred from one computer to another and opened in both; it is expected to perform the same way on every computer. 

Reference: https://searchservervirtualization.techtarget.com/definition/virtualization

Tuesday, July 14, 2020

Week 7 - Wireless Internet



Wireless network connections have replaced the traditional wired connection as the more popular form of internet. They are considered faster, cheaper, and more reliable. When it comes to wireless, there are many different configurations to consider and it all depends on how you will be using it. Each type of wireless network connection has a specified range for the wireless signal and certain standards to follow. They are also configured a little differently. The format of a wireless network follows closely to the traditional wired formula, there is just the wireless concept added. 
The chart below explains a WPAN, WLAN, WMAN, and WWAN.



There are a number of things that can cause degradation to your wireless internet. The below graphic provides some helpful information and tips on how to stop your internet from slowing down.

Monday, July 6, 2020

Week 6 - IPv6

IPv6 is the newest Internet Protocol (IP) standard created to replace IPv4, the protocol many Internet services still use today. Every computer, cell phone, and any other device connected to the Internet needs a numerical IP address in order to communicate with other devices. 

IPv4 uses a 32-bit addressing scheme to support billions of devices. Computer engineers realized that eventually there wouldn't be any unique address left, so they created a new standard. In 1998, IPv6, a new protocol that uses 128-bit addressing, was introduced. Instead of the IPv4 address method of four sets of 1 to 3 digit numbers, IPv6 uses eight groups of four hexadecimal digits, separated by colons.

So how do you know if you are using IPv6? You can check out this list to see if your ISP pr device is on it. You can also visit one of many free websites that test your IPv6 connection.

test-IPv6.com is an open-sourced web site dedicated to helping end users identify whether or not their IPv6 is working; and whether specific detectable errors are found. This is meant to be useful both to end users (with reasonably friendly terminology and explanations); as well as useful to help desks.

I decided to check my own IPv6 connection, and here is what I found:


















I discovered that my ISP (COMCAST) is in fact using IPv6. I can also see what my IPv4 and IPv6 addresses are on the public Internet. It also says that my readiness score for IPv6 stability and readiness is a 10/10.


















Under the Tests Run tab, I see what tests were run to determine my compatibility for when other websites start using IPv6. All of these tests came back "ok."

There is also a "For the Help Desk" tab on the right that has specific information you would need to give to your help desk technician if you were experiencing any issues. This information can help them troubleshoot the problem.

What sources have you found helpful for IPv6? And is your ISP using it yet?

Thursday, July 2, 2020

Week 5 - TCP/IP Applications


TCP/IP, or Transmission Control Protocol/Internet Protocol, is a group of communication protocols used to connect network devices on the internet. The entire Internet Protocol set -- a set of rules and procedures -- is commonly referred to as TCP/IP. TCP and IP are the two main protocols. These protocols work between internet applications and the routing/switching fabric.

What do people use their computers for? There are several applications that run on the TCP/IP protocol. Checking email, searching for a website, downloading and saving files... computers are used for many different functions, and it’s the applications that run on TCP/IP that allow people to use these functions and ultimately make your computer useful. Below is a list of common applications and what they are used for. Which ones are you familiar with?



Monday, June 22, 2020

Week 4 - TCP/IP Routing

TCP/IP is a series of protocols used to transmit data over the internet. What is a protocol you ask? Well, a protocol is a set of rules that computers use to talk to each other. This communication happens on the Transmission Control Protocol (TCP) and Internet Protocol (IP). TCP prepares data by breaking it down into packets, and IP makes sure these packets get sent and delivered from one computer to another.

IPv4 vs IPv6

When data packets arrive at the router, the router needs to know where the data came from and where to send the data. This is what the IP address is for. An IP address is a 32-bit label that is unique to that device, so in transmitting data, there is a source IP and a destination IP. Internet Protocol version 4 (IPv4) is the 32-bit number that was created back in 1983. There are over 4 trillion unique addresses available, but that still wasn’t enough. In the 2000s, developers started to create Internet Protocol version 6 (IPv6). This version is still in the process of replacing IPv4 and officially became an Internet Standard in 2017. With the rapid growth of the internet and its users, developers had to develop a 128-bit identifier. The problem with this is that IPv4 and IPv6 were not designed to be interoperable, so the switch has been more complicated than developers would have liked.

When it comes to routing, IPv6’s larger address space makes room for address allocation hierarchy which allows route aggregation and the expansion of routing tables. There is also device mobility and security that was considered when developing IPv6.

 

Here is a more detailed blog about why IPv6 adoption has been so slow at being implemented: 
https://www.auvik.com/franklymsp/blog/ipv6-network-design/

Also, here is a report card on the state of deployment of IPv6 and who is currently using it:
https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018/


Personally, I don't have any experience with IPv6 yet, but hopefully soon!

What experience have you had? What are some of the pros/cons you have heard about IPv6?


References:
https://en.wikipedia.org/wiki/IP_address
https://en.wikipedia.org/wiki/IPv6
https://www.sangoma.com/how-ip-routing-works/