Network management
W8,Q2 : Describe how SDN facilitates the management of the network. How is it an improvement over the traditional approach? What are the challenges in implementing it?
100-150 word response: (no references)
(Jacob Bennett) Security management is one of the basic network management function. It ensures that access to a network in controlled to eliminate malicious users or content to infect the host. Security management often includes some type of AAA architecture, which stands for authentication, authorization, and accounting. For example, Cisco uses TACACS to control access to devices by using the routers and switches to prompt users for username and password credentials (Cisco, 2019). A user has to be authenticated first in order to determine if they the correct credentials to access the necessary devices. Different forms of authentication include something you have (like an ID card), something you know (like a password), and something you are (biometrics, i.e. retinal scanner). After successful authentication, a user is then authorized to perform certain work functions based on their authenticated credentials. I’ll use the military as an example. Soldiers are usually granted either Secret, Top-Secret, or Confidential security clearances. Users with Secret clearances may be able to access the same network as the user with Top-Secret clearance, but they will not have the authorization to perform the same work functions as the Top-Secret user. Accountability is used for reports and often audits. As a previous network manager for my unit, I was able to determine who was responsible for conducting cross-domain violations while on their computers. Since all Soldiers are given ID cards that give them access to networked computers, I was easily able to identify who the last person to access the computer while the violation occurred. This process mitigated the back and forth of “he says, she says” and implemented non-repudiation, which prevented the user from denying their actions.
References
Cisco. (2019, February 11). Network management system: Best practices white paper. Retrieved April 7, 2020, from https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html#secmanagement
W8: Q2 RESPONSE
Software-Defined Networking (SDN) is a network architecture approach that allows a network to be controlled centrally and intelligently through software applications (IBM Services, 2019). The whole network behavior is programmed, enabling the administrators to manage the network and its devices efficiently irrespective of the underlying network technology. Traditional networks are highly invested in physical infrastructure to meet user demands. Conversely, SDN is software-based, meaning it can manage traffic flow within the network with much detail, more resources, and higher bandwidths without the need for more physical infrastructure (IBM Services, 2019). The current user demands for untethered access to network infrastructure and the need for flexible networks lead to users choosing SDN over the traditional approach. Nevertheless, the main challenge that comes with SDN is the difficulty in achieving a continuous end to end network visibility (Netscout, 2018). Applications used in the software are continually evolving, which come in with other dependencies making the whole network complex. This compromises the monitoring levels that can be achieved, which is very vital.
Response 2
In security management, both routers and catalysts have their security features. The features incorporate the SNMP security protocol for configuration changes (Cisco, 2019). Configuration in network devices for the prevention of unauthorized access. It is crucial that the community strings follow the standard password rules and should be changed in public and private defaults. The security features in routers include the SNMP Privilege level, SNMP Access control list, SNMP View, SNMP Version 3, and Access Control List on Interfaces (Cisco, 2019). Each of the features has its functions, such as the SNMP Privilege level being the management station while the SBMP Access Control limits information to specific management stations. The security features in Catalyst LAN Switch is the IP Permit List that restricts inbound Telnet and SNMP access to the switch from unauthorized sources (Cisco, 2019). The combination of security features aids in managing the routers and catalyst switches. Nonetheless, a security policy is prudent in terms of management stations that can access the two.
References
Cisco. (2019, February 11). Network management system: Best practices white paper. Retrieved April 7, 2020, from https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-bestpractice.html#secmanagement
IBM Services. (2019, August 9). SDN versus traditional networking explained. Retrieved from https://www.ibm.com/services/network/sdn-versus-traditional-networking
Netscout. (2018). Are you up to the challenge of software-defined networking? Retrieved from https://www.netscout.com/blog/software-defined-networking-challenge