throbber
Global Information Assurance Certification Paper
`
`Copyright SANS Institute
`Author Retains Full Rights
`
`This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.
`
`Interested in learning more?
`Check out the list of upcoming events offering
`"Security Essentials Bootcamp Style (Security 401)"
`at http://www.giac.org/registration/gsec
`
`EX1032
`Palo Alto Networks v. Sable Networks
`IPR2020-01712
`
`0001
`
`

`

`
`Christian Boniforti
`Version 1.4b Option B
`March 2003
`
`
`
` Securing a University’s Bandwidth with
`PacketShaper
`
`
`
`Introduction:
`This paper is not limited to universities and could be applied to any network
`architecture. It is meant to bring attention to the importance of securing any
`network’s bandwidth. This paper will assist the reader in the implementation,
`installation and configuration of the PacketShaper and the processes that are
`necessary to apply bandwidth utilization policies. It is important to remember that
`there is no “one size fits all” solution. I suggest using what is pertinent to your
`scenario and learn from my mistakes. I am not providing a guaranteed solution
`or an instructional paper; I am merely providing you with tools, strategies and the
`technology that I used in securing and providing reliable bandwidth to our
`institution.
`
`One must also understand that this paper is written with an emphasis on a
`university network which differs greatly from traditional corporate enterprises.
`According to Ted Udelson, academic institutions are presented with special and
`complex challenges which are not faced by commercial or government entities.
`He further lists the most common threats:
`
`They have difficulty in controlling end users.
`
`The culture cultivates free thinking and “open” access to
`information.
`
`The university serves as a research body, corporation, and Internet
`service provider. Colleges and universities must analyze each of
`these functions to determine the proper stance to take with regard
`to security (Udelson, p. 10).
`
`
`These points brought up by Mr. Udelson, present a network administrator with
`many challenging and unique tasks. It is important to first, understand the
`threats that are specific to your network environment and then develop a solution
`that will fit best for your specific scenario.
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0002
`
`

`

`
`Scenario: Before PacketShaper
`In late 2001, administration had received complaints from several students that
`the bandwidth that was provided to them was not adequate at times to conduct
`research. Specifically, students complained that at certain times of the day (a
`stretch between 10:00pm and 2:00am) internet access would come to a
`complete halt.
`
`This was brought up to the CIO and the concern was later passed off to me. I
`conducted some research and monitoring using MRTG tool on our single T1. My
`report of the utilization of bandwidth showed that the T1 line idled between 80%
`and 90% utilization on working hours (9-5), and reached 100% during the
`10:00pm – 2:00am stretch. Figure 1 shows the basic public network setup.
`
`
`
`
`
`
`
`
`My observation was passed along to my CIO and then onto administration. The
`problem needed to be resolved quickly and thus a very reactive decision was
`reached. Administration decided that the university should purchase an additional
`T1. This additional T1 was purchased in early 2002.
`
`
`The university decided that it would purchase a device called Linkproof by
`Radware for the integration of both T1 lines. These T1 lines would be setup to
`provide load balancing, redundancy, and a larger bandwidth capacity. Figure 2
`shows the new design that was created for the integration of the dual T1.
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0003
`
`

`

`
`
`
`
`
`The implementation of an additional T1 and the Radware Linkproof device were
`to provide the additional bandwidth needed and supply the university with some
`redundancy. The Linkproof device was able to eliminate
`. . . link congestions and bottlenecks from multi-homed networks,
`for fault tolerant connectivity and continuous availability of web
`services. By intelligently routing traffic and controlling bandwidth
`service levels across all Internet links, Linkproof enables effective
`link utilization, accelerating responsiveness, controlling bandwidth
`consumption and economically scaling operations. (LinkProof, p. 1)
`The additional T1 and Radware Linkproof solution provided the university with
`larger amount of capacity and offered the university the needed tolerance, but it
`was not able to monitor internal usage.
`
`Two weeks into the winter semester of 2002, the administration continued to
`receive complaints of slow internet access. Bandwidth monitoring was
`conducted once again and during the peak hours for the university (10:00pm to
`2:00am) bandwidth readings would burst to the 100% capacity.
`
`My first approach to this situation was to use portions of the “Defense in Depth”
`strategy and identify the business goals by the administration, faculty, students
`and the IT Department. Administration wanted a controllable, cost effective and
`quick solution. Faculty wanted guaranteed bandwidth and the Communications
`Department wanted designated bandwidth to conduct their streaming video
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0004
`
`

`

`projects and presentations. Students wanted everything, from peer to peer
`networks to online gaming and Xbox live gaming. The IT Department wanted a
`better solution, one that would provide filtering, control and designate bandwidth
`on a policy based system. The IT Department also needed to be able to
`implement a VOIP (Voice Over IP) solution with adequate QoS (Quality of
`Service) in the near future.
`
`It became apparent to the IT department that we could not continue to add T1’s,
`and that we needed to come up with a solution that would be able to measure,
`monitor, filter and shape the bandwidth traffic. A solution also needed to be
`backed up by an “Issue-specific Policy”. Currently the university had no specific
`internet utilization policy neither developed nor implemented.
`
`
` A
`
` New Problem:
`At around the same time we were beginning to experience constant problems
`with our firewall. At first we did not know or realize that this problem was part of
`our lack of bandwidth control and knowledge. The log files would grow at a rate
`that the OS could not handle. This would cause the firewall to either freeze and
`hang or the hardrive designated for the log files would fill up and consequently
`shut down the firewall.
`
`After researching the log files it was determined that the culprit was SMTP traffic
`initiating from internal clients (specifically students). There were two different
`options to solve this problem. Allow SMTP to go through the firewall which would
`propagate SMTP traffic to the outside world, or stop SMTP traffic at the internal
`core router. Our core router also served as our VLAN manager. We setup an
`ACL (Access Control List) to not allow student traffic to send SMTP traffic. This
`solution seemed to work. We began to experience problems with the core router
`less than a week into the implementation phase. The core router began to crash
`every 24 hours. Once the router was reloaded some SMTP traffic was still being
`filtered, but not all. It was agreed that we were going to not filter at the router
`level, and try to find the culprit students? At this point, I was not able to identify
`this problem as a miss management of bandwidth.
`
`We decided that we would try to answer the following key questions, Why?
`What ? Where? and How?. Why monitor and secure bandwidth? What were
`we going to use to measure and secure bandwidth? Where did we need to
`monitor bandwidth? And How would we enforce these solutions?
`
`Understanding the Importance of Securing Bandwidth
`Before we can understand Why we should secure and manage bandwidth we
`must define bandwidth. Scientifically speaking,
`
`
`…bandwidth is the width of the range of frequencies that an
`electronic signal occupies on a given transmission medium. Any
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0005
`
`

`

`digital or analog signal has a bandwidth. In digital systems,
`bandwidth is expressed as data speed in bits per second (bps). In
`analog systems, bandwidth is expressed in terms of the difference
`between the highest-frequency signal component and the lowest-
`frequency signal component. (SearchNetworking.com, p. 1)
`
`
`Generally speaking we identify bandwidth as the speed in which flow of
`information is transmitted back and forth within a network or between
`many networks. Usually the more bandwidth one has the better the flow
`of information is exchanged. This statement is generally true. We are
`going to identify some reasons Why it is important to secure your
`network’s bandwidth.
`
`The number one reason to secure your bandwidth is cost. Cost can be
`measured in a many different ways. The most obvious associated cost
`with bandwidth is your ISP costs. In our scenario, the university was
`currently using two T1 lines and one point to point WAN link. The total
`cost of the university bandwidth was about a $30,000 yearly investment.
`This investment needed to be monitored, secured and efficiently utilized.
`Once bandwidth was converted to an investment it became apparent and
`easier to convince the administration that further studies and policies
`should be implemented.
`
`Another reason to secure your bandwidth can be performance. We are
`referring to the overall performance of the university’s bandwidth.
`Bottlenecks, congestions, dropped or lost packets and unnecessary
`retransmissions are all signs of an ill performing network. Many of these
`symptoms can be traced back to poorly managed bandwidth. Optimizing
`performance on a network basically attempts to minimize negative
`effecting traffic or “less desirable” traffic (P2P, video, sharing) and provide
`or guarantee the mission-critical applications their needed bandwidth.
`
`Policy may dictate and mandate the need to secure and manage campus
`bandwidth. Our IT Department had no policies set to limit bandwidth,
`block “less desirable” traffic or manage bandwidth.
`
`What to use? PacketShaper by Packeteer – A Brief
`Description
`The next question that we needed to answer was, what were we going to use to
`measure and control bandwidth? We knew that we could setup MRTG tools and
`measure the overall bandwidth, but it was not going to help us analyze packets,
`protocols or control bandwidth. After an extensive comparison and research, we
`decided to use a product by Packeteer called PacketShaper.
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0006
`
`

`

`PacketShaper is the bandwidth-management solution that brings
`predictable, efficient performance to applications running over
`enterprise wide-area networks (WANs) and the Internet. It balances
`traffic’s demands, giving each type of traffic the bandwidth it needs
`to perform. PacketShaper protects critical traffic, paces bandwidth-
`greedy traffic, and prevents any single type of traffic from
`monopolizing resources. It provisions bandwidth to applications,
`sessions, branch offices, and/or users. (Four Steps Packeteer, p.
`3)
`
`
`PacketShaper was the device that was going to be able to monitor inbound and
`outbound traffic, as well as analyze and filter. This product would secure our
`bandwidth and we would be able to set forth “Issue-specific Policies” that could
`be enforced. Packeteer has produced a simple introductory paper on the
`PacketShaper product and how to deploy it in your network. It can be found via
`this URL:
`http://support.packeteer.com/documentation/packetguide/5.2.1/documents/4Step
`s.pdf
`
`First Step: “Classify Network Traffic”
`This first steps means allowing PacketShaper to identify traffic as it passes
`through the device. PacketShaper has the ability to identify or classify traffic by
`applications, protocols, web pages, subnets, users and many more. It has the
`ability to automatically classify known applications and protocols. Since, new
`applications are added on a daily basis Packeteer makes new classification
`features available to customers by introducing new “easy plug in” features. If a
`vulnerability or application is introduced a new plug in will be offered. After
`downloading and applying the plug in; PacketShaper is able to automatically
`classify the new application or vulnerability.
`
`PacketShaper has the ability to manually classify applications, subnets, protocols
`and other network traffic. As new applications are introduced they become
`more integrated, more bandwidth intensive and more difficult to classify under
`one category. PacketShaper has the ability to manually classify these complex
`applications that may differ from the simple IP scheme and single port
`applications. Some of the manual classification categories are as follows:
`• Web Classification: Most of the traffic today resides through HTTP traffic.
`PacketShaper is able to identify and differentiate HTTP traffic, by direction
`of traffic, web URL, server based, or host name. This allows for more
`granularities within the HTTP class.
`Intricate Port Classification: PacketShaper is able to classify and analyze
`difficult traffic that uses multiple ports or conducts in port hoping. Through
`this same classification it is able to differ classify traffic that may share the
`same port
`• File-Sharing Protocol: This category refers to the famous Napster, Kazaa,
`and Gnutella.
`
`•
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0007
`
`

`

`
`Second Step: “Analyze Behavior”
`PacketShaper has the ability to measure the classes of traffic that were
`previously identified. It will be able to track “…traffic levels, detects network
`trends, measures response time, and calculates network efficiency” (Four Step
`Packeteer, p. 5). This period of analysis will help answer many questions
`regarding the bandwidth traffic of an organization. PacketShaper is managed
`through a simple web interface. This interface contains many helpful tabs that
`will be useful to analyze the classified traffic. One of the helpful tabs is the
`Monitor Tab:
`
`
`
`
`This tab will identify the automatic or manually set classes on the left column, it
`also will shows such columns as Current (bps), 1 Minute (bps), and Peak (bps).
`This tab will be very helpful in pulling data on desired classes and will become an
`important gathering tool for controlling bandwidth.
`
`Third Step: “Control Performance”
`PacketShaper is able to manage application performance and guarantee a
`preset amount of bandwidth. PacketShaper controls bandwidth through the
`usage of partitions. A partition “…creates a virtual separate pipe for a traffic
`class” (Four Steps Packeteer, p. 5). One is able to set a size for the reserve link,
`define whether it can expand over the cap and control that growth. Partitions
`work much like pipes within pipes. Figure 4 shows the relationship of partitions
`within partitions:
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0008
`
`

`

`Figure 4:
`
`
`
`
`Picture from Packeteer Website at URL:
`http://support.packeteer.com/documentation/packetguide/5.2.1/documents/4Step
`s.pdf, p. 20
`
`There are different kinds of partitions that can be utilized. PacketShaper can use
`either “hierarchical partitions” or “dynamic partitions” . “Hierarchical partitions”
`enable one to preset a certain amount of bandwidth within another subset of
`partitions. For example, one could set 30% of a link designated to HTTP traffic,
`and then assign different portions of the preset 30% to web servers that utilize
`HTTP traffic. One could assign half of the 30% to all web servers, quarter to
`OWA traffic and the remaining to any HTTP traffic. “Dynamic partition”, allows
`one set partitions on a per-user basis. It allows one to manage a user’s
`bandwidth allocation across all types of applications.
`
`Step Four: “Report Results”
`The reporting capabilities of the PacketShaper allow for a quick visual and
`comprehensive analysis of the traffic flow. PacketShaper will graph bandwidth
`based on time, network efficiency, average bandwidth and peak periods. This
`ability to quickly see what is traversing the network becomes a powerful and
`helpful tool in reaching your optimal goal of securing desired bandwidth
`performance.
`
`Where to Use PacketShaper?
`Now that we understand what to use to monitor, shape and manage our
`bandwidth I had to decide where to place this device within our network. The
`placement of the PacketShaper depended on our needs, desires, budget and the
`current topology of our network. I will discuss the basic options that we had and
`the advantages and disadvantages of each placement.
`
` I
`
` took a basic and common setup of most university topologies and introduce the
`possible options of placement. Figure 5 shows the different options:
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0009
`
`

`

`
`
`
`Option 1, implements PacketShaper outside the border router. One of the
`positives to this solution is that you will be able to shape incoming and outgoing
`packets at this topology level. The other positive is that only external traffic will
`be shaped all internal traffic will not be accessed or modified. One of the
`negatives is that internal traffic will not be controlled, or managed. Another
`negative is that the PacketShaper will need a WAN or T-1 interface which will be
`more expansive and less flexible.
`
`Option 2, does not require PacketShaper as we are using the router to shape
`bandwidth. The positives to this solution are that you do not have to buy or
`manage an additional device. Another positive is that internal traffic is not
`interfered with or shaped. The negatives to this option are that you are restricted
`to router based shaping, which is very limited and less effective. The other
`disadvantage is that you will be taxing the router CPU. Routers are designed to
`route traffic not to shape it and analyze it.
`
`Option 3, implements PacketShaper internally or inside your border router. The
`positives to this solution are that you can use more flexible and less expensive
`Ethernet interfaces to manage traffic. Also, this option will allow for partitioning of
`university’s internal network and the use of multiple shapers. Some of the
`negatives include a greater amount of bandwidth will be managed which may
`require a more capable and more expensive device. Another negative is that
`internal traffic will be interfered with and shaped.
`
`Option 3, allows administrators for the most flexibility and manageability of
`bandwidth.
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0010
`
`

`

`Now that we understand Why there is a need to manage bandwidth? What
`device? And Where to place it?, we can start discussing on How to use it? For
`this explanation we will return to the scenario previously mentioned.
`
`
`Scenario: During Installation
`Since our first three questioned have been answered and explored I will move on
`to the implementation of the PacketShaper and describe what I did to deploy this
`appliance. Figure 6 shows where our IT Department decided to install the
`PacketShaper:
`
`
`
`
`After exploring all of the different options and analyzing the pros and cons, it was
`decided that in our scenario it was important to be able to manage and shape
`internal traffic. The best place to do this was to implement the PacketShaper
`between the firewall and internal router. The PacketShaper has two Ethernet
`interfaces, one labeled “In” and the other “Out”. They basically describe the flow
`of traffic. The “In” interface describes traffic flow destined towards the internal
`
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0011
`
`

`

`network. While, the “Out” interface describes traffic flow initiated from the
`internal network destined to the outside world or DMZ. In our deployment of the
`PacketShaper we will not be able to monitor, shape or manage traffic that does
`not traverse the PacketShaper. This traffic will include internal peer-to-peer
`traffic and traffic between internal servers and internal clients.
`
`Configuring PacketShaper
`Once I decided where to implement the PacketShaper I needed to figure out how
`to physically plug the cables and what cables to use. Figure 7 shows the front
`end of the PacketShaper:
`
`Figure 7
`
`
`
`
`Picture from Packeteer Website at URL:
`http://support.packeteer.com/documentation/packetguide/5.2.1/documents/PacketShaper_Getting
`_Started_v521.pdf
`
`The RJ 45 interfaces are clearly labeled “Outside” and “Inside”. The types of
`cable that will be plugged into these interfaces depend on the type of device that
`you will be plugging into the PacketShaper. In our scenario, I used the firewall
`and router. Therefore, I will need cross-over cables to plug in to both interfaces.
`Servers and uplink ports also require cross-over cables, while hubs or switches
`require straight-over cables. Once, all ports and devices are plugged in correctly
`one will see traffic begin to flow and normal connectivity will be restored.
`
`After physically connecting the PacketShaper and verifying that traffic is
`traversing the device I was able to connect to the device and log in. There are
`three simple ways to connect and configure the PacketShaper:
`• Through a direct console connection
`• Telnet
`• Through a Web Browser
`
`The first time that I connected to the PacketShaper via any of the above
`mentioned ways I had to use the default IP. This is a factory set IP address that
`has been assigned to the device. I later changed this IP address to a more
`meaningful IP address. For the purpose of this paper we are only going to be
`covering connections via Internet Explorer.
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0012
`
`

`

`
`
`ON/OFF
`ON/OFF
`ON/OFF
`
`Total bandwidth available
`Total bandwidth available
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IP for Device
`Netmask for Device
`Next hop usually defines outbound flow
`Optional: Router which Device is plugged into
`Optional: Domains that will be monitored
`Name Servers that will be used to resolve host
`names
`
` I simply started an Internet Explorer session and typed in the default URL. The
`first time I connected I was directed straight to the basic configuration or setup
`page. In this page I was able to modify the following options:
`
`
`
`Shaping
`
`Traffic Discovery
`Easy Configuration
`
`
`IP Address
`
`NetMask
`
`Gateway
`
`Site Router
`
`Domain
`DNS Server
`
`
`
`
`Wan Settings:
`InBound Rate
`OutBound Rate
`
`Lan Settings:
`Inside Fast Ethernet NIC Mode Auto/ 100 Full/ 100 Half/ 10 Full/ 10 Half
`Outside Fast Ethernet NIC Mode Auto/ 100 Full/ 100 Half/ 10 Full/ 10 Half
`
`These are the basic configuration settings for the PacketShaper.
`I made sure to leave the Shaping option on the OFF position, because at
`•
`this point we are not going to start shaping traffic.
`• The Traffic Discovery option should be set to the ON position. This will
`allow the PacketShaper to begin discovering traffic.
`• The Easy Configuration will not be covered in this paper as it is a less
`flexible option with many limitations; I kept this option set to the OFF
`position.
`• The IP Address option is a management option. Simply select an IP
`Address that makes sense to your scenario. This depends on the
`placement of the PacketShaper. In our scenario we decided to place the
`PacketShaper behind our firewall, so we decided to go with an internal
`private IP address that made sense with our IP scheme. Remember this
`IP address option is for management and connection purposes only.
`• The Netmask option corresponds to the IP address that you decide to
`assign to your device set it accordingly.
`• The Gateway option will typically refer to the flow of traffic destined to
`outer networks. In our scenario the internal firewall network interface is
`the Gateway. Refer to Figure 6 for a better visual explanation. Typically
`the Gateway option will represent traffic destined for the outside world or
`internet.
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0013
`
`

`

`• Site Router and Domain options are optional settings. Site Router
`represents a router that will be used to monitor traffic and Domain can be
`used for FQDN (Fully Qualified Domain Name) or NT domain naming
`schemes. The DNS server option should be set so the PacketShaper will
`be able to resolve names to the IP address that it finds. In our scenario I
`used the NT 2000 internal DNS for both domains and the external DNS
`servers IP address.
`
`
`
`
`
`
`
`3M
`3M
`
`
`The next set of options are broken down into two separate categories, WAN and
`LAN. These are supposed to help you gauge the bandwidth that will be used
`and measured. In our scenario the WAN and LAN settings were used as
`following:
`WAN Settings:
`InBound Rate:
`OutBound Rate:
`LAN Settings:
`Inside Fast Ethernet NIC Mode 100 Full Duplex
`Outside Fast Ethernet NIC Mode 100 Full Duplex
`
`The WAN setting is used to set a maximum available rate of bandwidth. In our
`scenario we are currently using dual T1 and therefore our optimal bandwidth rate
`inbound or outbound is approximately 3.0 Meg. This will help create the pipe that
`we are going to be using to control bandwidth. If you refer back to Figure 4 we
`are creating the outer black pipe which will engulf all of our shaped traffic. The
`LAN settings are the optimal speed of your internal backbone speed and allow
`you to specify which kind of duplex mode is being used. If you know for sure the
`devices that are plugged into the PacketShaper are Full/Half or are 10/100 set it
`accordingly, if you are not sure you may use the Auto-negotiate option.
`
`Once these settings were configured I selected the apply changes button and the
`PacketShaper Basic configurations were set.
`
`Other Configuration settings that I would encourage to set are the SECURITY
`and DATE & TIME Setup Pages. The Security Setup Page will allow you to
`select a LOOK and TOUCH passwords. The LOOK mode is a read only mode
`while the TOUCH mode is write mode. Setting the DATE & TIME configuration
`will help you diagnose problems that are dependent on time and that only occur
`during specific times.
`
`Variation of the Four Step Deployment Guide
`Once I was done configuring and setting up the PacketShaper it was time to start
`deploying it and let it run on the network.
`
` I
`
` decided to follow the Four Step tutorial offered by Packeteer but I also decided
`to add two important steps to this model. As one can recall the Four Steps were
`to:
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0014
`
`

`

`1. Classify
`2. Analyze
`3. Control
`4. Report
`
`
`The following six steps were created;
`1. Classify-Identify and Simplify
`2. Analyze
`3. Control
`4. Report
`5. Develop Policies
`6. Recognize Unmanaged Traffic
`
`
`Step One: Classify, Identify and Simplify
`In order to analyze traffic I needed to let PacketShaper capture network traffic.
`Packeteer suggests allowing the device to analyze network traffic for 3 days, but
`I believed that it would be better to analyze traffic for a full week. By analyzing
`an entire week, you will be able to capture traffic for all seven days and a more
`accurate analyzes will be stored.
`
`The first thing that I looked at was the Monitor Tab. This tab showed all
`discovered traffic and it breaks up the traffic into two categories. The two
`categories are Inbound and Outbound. Under each category PacketShaper will
`identify classes of traffic. These classes are well known protocols such as HTTP
`and known applications like Citrix. I took some time to review and learn what
`was traveling along our network. The first thing that I did was to place the
`classes into more descriptive folders. I created a folder by going to the Manage
`Tab. This tab is similar to the Monitor tab, with all discovered classes on the left
`most side of the page. On the right side of the page there are some options that
`I needed to explore. The first button that I looked at was the Class button. This
`button allows one to create a Class folder. I did the following to add some
`classes:
`
`Select the Class Button (cid:224) Then Select the Add Folder option (cid:224) this brings up a
`window with an empty field, fill in a descriptive name (P2P) (cid:224) Select the OK
`button.
`
`The Manage tab page will now refresh itself and a new P2P Folder will appear
`under the InBound category. By simply selecting the P2P folder a new
`configuration page will display on the right side of the page. Figure 8 shows
`what the configuration page will look for all classes. The Traffic Classes are
`shown on the left panel of the web page. On the right panel of the configuration
`page are the CLASS, PARTITION, and STATISTIC buttons. I will discuss the
`CLASS button only in this particular section, the other buttons will be discussed
`later in this paper.
`
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 2003,
`
`As part of GIAC practical repository.
`
`Author retains full rights.
`
`© SANS Institute 2003, Author retains full rights.
`
`0015
`
`

`

` I have already used the CLASS button to create a folder. To move an already
`existing class into a folder simply select the CLASS button and then select the
`move option. A new screen will appear. Simply select the desired class “KaZaA”
`and select the Move Class button. The “KaZaA” application will now be under
`the P2P folder. I continued to classify and organize our traffic. The more
`organized and simple you keep your traffic classes the easier it will be to set
`traffic control settings.
`
`Figure 8
`
`
`
`Now that I have described the basics of the Manage tab, I am going to share a
`simple and useful list that I created and used in organizing our Monitor Tab.
`
`
`
`
`1. Identify critical traffic. For our scenario the following were selected
`a. HTTP
`b. SSL
`c. SMTP
`d. DMZ traffic
`e. RDP
`2. Identify less desirable traffic. We decided to focus on Peer to Peer
`Networks and Video protocols
`a. eDonkey
`b. Gnutella
`c. KaZaA
`d. Napster
`
`Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
`
`© SANS Institute 20

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket