This is a course for those who need to manage diverse Network and NOC operations. It consists of a combination of theory and lab, with lab work on Linux constituting about 60% of the total course.
Engineers and system staff at ISPs and large networks, including academic networks, who are involved with system management, network monitoring and management, and problem response. The course is for those who need to manage diverse Network and NOC operations.
Participants are assumed to have good knowledge of the Unix/Linux command line environment, and understand the general concepts related to networking and IPv4 addressing.
Please note: Participants are required to bring laptops.
This class is suitable for class sizes up to 36 students.
The workshop will be a combination of theory and lab. Ubuntu Linux server version 16.04 LTS will be the workshop platform. The course will cover:
- Introduction to Network Monitoring and Management
- Recap of Linux command line use. Depending on the class level this may be very basic to more in-depth. Potential topics include:
- Introduction to Linux
- TCP/IP network essentials
- Security essentials including SSH
- Linux commands and the command line interface (CLI)
- Text editors (vi, nano)
- Cisco IOS Configuration Basics
- SNMP (Simple Network Management Protocol)
- Installation, configuration and understanding of output of some or all of the following network monitoring and management tools:
- LibreNMS – Automated Network Monitoring and discovery
- Smokeping – Latency/Round Trip Time, Jitter and packet loss monitor
- Nagios – Server and Service monitoring and alerting
- Netflow, NfSen – traffic analysis and exploration
- RANCID: network equipment configuration backup, change tracking & automation including the use of WebSVN
- Network Operation Center (NOCs)
- Network Documentation
- Netdot (Network Documentation Tool)
- RT (Request Tracker): Ticketing systems for helpdesk /support and integration of RT and Nagios to automatically generate tickets.
- Log management: Collecting logs, monitoring them, using forensic tools and pattern matching utilities to alert when there are problems:
- syslog / rsyslog
- Simulated network attack and detection using installed tools