NOetpAsdTmooinls
Txx(MMh(SDaoehonnnrekagitokeyerN))etwork  Swamp

Review from Module 7

Review: Application Services and Resilience  

Key Module 7 Ideas

Why This Matters in Module 8

Operations and monitoring keep those services healthy, measurable, and recoverable in production.

Learning Outcomes

Learning Outcomes  

After completing this module, you will be able to:

1 Documentation and Operational Control

1.1 Documentation, Inventory, and Change

Operations begin with accurate documentation, controlled changes, and lifecycle-aware asset management for stable environments.

8.1 Documentation: Maps for the Kingdom  

Why Document?

Without a map, the network is a murky swamp. If the Admin leaves, the knowledge leaves with them!

Two Types of Maps

1.

Physical Diagram:

2.

Logical Diagram:

Logical Map:
RS1W:1 1:9 12.9162.81.168.1.1.2
PPCh1y:s 1ic9a2.l16 M8a.1p.1:0
Uxxx??DRPn??oaod??ccrouktcm2Gue,0/mnU1et14nedtedC Sawstalemp

Configuration Management: Avoiding Chaos  

The Concept

Managing device settings centrally to ensure consistency.

Key Terms

SwSwSwSwiiiitctctctchhhhABAB
DVVDVVMayeeayeerarrr1nu111.101.a(B.000.02*la(HsDacelrikinft!e)!)

This configuration drift diagram shows the problem: on Day 1 (Baseline), both Switch A and Switch B are at version 1.0 (green boxes). On Day 100, Switch A remains at 1.0, but Switch B has been manually updated to 1.2 (red box) without approval. This divergence from the documented baseline (drift) introduces inconsistency, increases risk, and makes troubleshooting harder. The gray arrow shows time passing, and the "Manual Hack!" callout labels the problematic change. This visualization demonstrates why automation tools must force devices back to a consistent baseline.

The Solution

Use automation tools (Ansible/Python) to force devices back to the Baseline!

Backups: Dragon Insurance  

What to Backup?

It’s not just files. You need:

1.

Configuration: The ‘running-config‘ text file.

2.

OS Image: The IOS/Firmware file.

3.

State Data: ARP tables, MAC tables (for forensics).

The 3-2-1 Rule

xLxUxCCCxDivSloooreBuppagC/dyyooT12nnFT!figP

Change Management: The Royal Decree  

Why we need Rules

Ogres are clumsy. If you smash a core switch without a plan, the kingdom goes dark. Change Mgmt minimizes risk.

1.2.3.4.5. R I A I RempmoqpppluarlelbesctovmactAaeknl(nt?aClyAsiBs)

This change management flowchart shows the five-step approval workflow: Request (1) Impact Analysis (2) CAB Approval (3, green box) Implement (4) Rollback? (5). The dashed arrow from Approval to Implement emphasizes that implementation only proceeds after human approval by the Change Advisory Board (CAB). This formal process minimizes the risk of network outages by requiring advance planning, impact assessment, and rollback strategies before any change touches production infrastructure.

Critical Component: Rollback

Before you change anything, you must answer: "How do I undo this if it breaks the network?"

Change Types

Standard: Routine (Reset Password). Normal: Risky (New VLAN) -> Needs Approval. Emergency: Fix it NOW! (Firewall down).

Case Study: Donkey’s Unauthorized Wi-Fi  

Scenario: "I’m making Waffles... and Wi-Fi!"

Donkey wants to stream music in the Swamp. He buys a cheap $20 Router from Best Buy and plugs it into the main Corporate Switch.

The Result:

Discussion

1.

Which Change Management steps did Donkey skip?

2.

What technical control could have stopped this immediately?

Case Study Solution  

The Fix

8.1 Asset Inventory: Counting the Swamp Creatures  

The Problem

If you don’t know what you own, you can’t patch it, and you certainly can’t secure it.

What to Track (The Tags)

IDIP::1SW0.1-C.1O.1RE-01
APLSSroouSpc:pEe Dp:Trtu AyncogtfFeoivTaneArqGuaad

Lifecycle Management: The Circle of Life  

Hardware has a lifespan

Like onions (and ogres), hardware gets old and smelly.

PrRDodisiukspc Zotosionalne
BDED(N(WueOe(IoiypLatpldWPeooatDyrkchas)etas!))

The "EoL" Danger

End of Life (EoL) means the vendor stops making security patches. If you keep an EoL firewall, you are inviting the Dragon in.

Decommissioning

Wipe the disk! Don’t sell a router on eBay with the Castle passwords still on it.

Physical Diagrams: The "Real World" Map  

What it shows (Layer 1)

Used when you need to walk into the server room and touch something.

Scenario

"Donkey, go to the Dungeon Server Room, Rack 2. Move the yellow cable from Switch 1, Port 5 to Port 6."

RUUUUUPSCF←a12345awailctcitblePkhcheSor 2PMert (a1gveADne(Amr3ulct(tnAceShog(srSeoOs)ekWnffi-1)cN-0esA4)S)

Logical Diagrams: The "Data Flow" Map  

What it shows (Layer 3)

Used when you need to configure routing or firewalls.

Comparison

Physical: "The cable is plugged into Port 2." Logical: "The traffic flows from the User Subnet to the Server Subnet."

 VVLLAANN 1200
xC(xIn(S(C.1.1RoGtew10a10((oureara.1st.GGt Rtnem.1le1.WWinoewtp0S20))gua(U.0e.0LtyFas/rv/oe)rer24e2girFs)rs4ca)rAway)

IPAM: The Royal Guest List  

IP Address Management (IPAM)

You cannot have two Ogres sitting in the same chair.

Tools

Don’t use an Excel spreadsheet! Use NetBox or phpIPAM.

1xxC0O.1N.F1L.IC5T!

Agreements: The Royal Treaties  

Definitions

When Shrek hires Puss in Boots, they sign a contract.

SLA

Service Level Agreement The Promise. "I will catch 99.9% of mice." (Binding Contract)

NDA

Non-Disclosure Agreement The Secret. "You cannot tell anyone where the Swamp is." (Legal Privacy)

MOU

Memo of Understanding The Handshake. "We agree to work together on this quest." (Less Formal)

2 Discovery and Baseline Monitoring

2.1 Discovery Techniques and Visibility

Discovery workflows identify active hosts and services, building the visibility needed for baseline and anomaly detection.

8.2 Host Discovery: "Who Goes There?"  

The Goal: Visibility

Shrek cannot defend the Swamp if he doesn’t know who is in it.

Tools

Ping Sweeps: Yelling "Is anyone there?" ARP Scans: Asking "Who has this IP?"

xSxxxPcainngn?er

Discovery: Shouting vs. Listening  

Active Discovery (Shouting)

Sending packets to devices to provoke a response.

Passive Discovery (Listening)

Just listening to network traffic (like sniffing the air).

xAxPctasivseiv(eL(Qouudi)et)

Nmap Concepts: The Three States of a Door  

What is Nmap asking?

When Nmap scans an IP, it knocks on every "Door" (Port) and categorizes the response into three main states.

1. OPEN (Success)

Response: "Come in!" (SYN-ACK). Meaning: An application is listening. Risk: This is an entry point for hackers.

2. CLOSED (Rejection)

Response: "Go away!" (RST). Meaning: The device is up, but nothing is running on that port.

3. FILTERED (The Void)

Response: Silence... (Timeout). Meaning: A Firewall (Dragon) blocked the packet. Nmap doesn’t know if the port is open or closed.

OACNFFxpploiirepoSlenLsetewiservraltdicelenedBinlogcked

Nmap in Action: Reading the Output  

roStoat@rtswinagmp N:˜ma#p n 7ma.p94-..A. 10.1.1.5
NmHoaspt sc isanup re (p0or.0t0 f2sor ladotenknceyy-). pc (10.1.1.5)

PO22R/Ttc STpA oTEpe SnE sRVshICEOp VenESRSSHIO 8N.2p1
8044/3tc/tpcp opeclnos hettdp h Attpapsche httpd 2.4.41

OSSeTrerdevimitacenaillsIn- N:fom:aLipnOSuxS:ca 4 Ln.i15nu-x; 5.CP6E: cpe:/o:linux:linux_kernel

Decoding the Scan

Scan Techniques: Stealth vs. Noise  

TCP Connect (-sT)

The "Polite" Knock.

SYN Scan (-sS)

The "Ding-Dong-Ditch".

ST123Nca...oar S S RLngeYYSonetNNTgr(-A(EHCRnelKutrlony?(YAC)ewrs?ayea)!)ted*

Timing Flags (-T)

-T0 (Paranoid) to -T5 (Insane).

Case Study: Puss in Boots’ Reconnaissance  

Scenario

Puss has been hired to test the Swamp’s security. Shrek says: "Find out what ports are open, but don’t wake up the babies (don’t crash anything)."

Target: 10.0.0.0/24 subnet. Constraints: Business hours (9am-5pm).

Strategy Questions

1.

Should Puss use a loud "Connect" scan or a stealthy "SYN" scan?

2.

Should he scan all 65,535 ports or just the Top 100?

3.

How can he identify if the server is running Windows?

Case Study Solution  

Puss’s Plan

1.

Discovery: Use ‘nmap -sn‘ first just to see what is alive (Ping Sweep). Low impact.

2.

Port Scan: Use ‘nmap -sS‘ (SYN Scan) because it is stealthier and lighter on network traffic.

3.

Depth: Scan top 100 ports first. Full scans happen after hours.

4.

OS Detect: Use ‘nmap -O‘ carefully (it sends weird packets to confuse the target).

xPxTSuatessrgaeltthScan

Discovery Protocols: "Hello Neighbor!"  

The Concept

Network devices act like friendly neighbors. Every 60 seconds, they shout their details to anyone connected to them.

What they shout (The Risk)

The Protocols

IIamam CHisPc!o!
xSxSLIPIPwwLD::itcitcP11hh0.0.ABM11e.1.1(C(Hss.1.2iPasc)geos)

Performance Monitoring: Checking the Pulse  

Key Metrics (The Vital Signs)

LCirnitkical!Saturation

Baselines

You need to know what "Normal" looks like. Is 80% CPU usage bad? Not if it’s always at 80% doing video rendering.

Availability: Is the Drawbridge Down?  

Availability = Uptime

"Can users actually do their work?"

Ping vs. Service Check

A server can respond to Ping but still show a "404 Error" website!

TUDUAimpoplewenrAtxi!s

The "Five Nines"

99.999% Uptime means only 5 minutes of downtime per year. This is the gold standard for Enterprise Networks.

Configuration Monitoring: Who Changed the Settings?  

Configuration Drift

The network rots over time because people make quick, manual changes and forget to undo them.

The Solution (RANCID)

Tools that automatically backup configs every night and compare them. If a line changed, Shrek gets an email!

+ permit ip any any
CCxC-ooodnnmenpyfifiar iggep avvny12 any

3 Telemetry and Event Monitoring

3.1 SNMP and Syslog Workflows

This section covers telemetry and event pipelines using SNMP, syslog, and SIEM correlation for operational awareness.

8.3 SNMP: The Royal Messengers  

Simple Network Management Protocol

How we talk to devices without logging into them.

The "Restaurant" Analogy

xMxAxAGTaggERnenenTAatt(Pge12P(rolA (l)leNrtM!)S )

Ports

UDP 161 (Polling) / UDP 162 (Traps)

SNMP Operations: Asking vs. Yelling  

1. Polling (GET)

The Manager asks the Agent a question.

2. Traps (Alerts)

The Agent yells at the Manager because something broke.

xMxAGRxATagEegRneTseAanponPgt(nter(DCs(A(L(ePUeliNv?(1ernMic)5t)kSe)%D))own!)

SNMP Versions: Evolution of Security  

Version History

1.

SNMPv1: The original. No security.

2.

SNMPv2c: Faster (Bulk transfers), but still Cleartext.

3.

SNMPv3: Secure. Adds Encryption + Authentication.

The Community String Risk

In v1/v2c, the "Password" is called a Community String.

Ver Security Notes
v1 None Original; cleartext
v2c None Faster (bulk); cleartext
v3 Auth + Enc Users, AES/3DES, hashes

Case Study: Lord Farquaad’s Open Door  

Scenario: "Welcome to Duloc"

Lord Farquaad set up SNMP monitoring on all his castle switches. Because he was in a rush, he used the default settings:

Robin Hood sat in the bushes with a laptop and ran a tool called ‘snmpwalk‘. Within seconds, he downloaded the entire network map, including IP addresses, router models, and uptime stats.

Discussion Questions

1.

What specific vulnerability allowed Robin Hood to read the data?

2.

Did Robin Hood need a complex password cracker to do this?

3.

What is the industry-standard way to fix this vulnerability?

Case Study Solution: Lord Farquaad’s Open Door  

The Answers

1.

Vulnerability: Cleartext Community Strings. "public" is the default string known by every hacker on earth.

2.

No Cracker Needed: It was an "Open Door." He just asked the routers nicely using the default password.

3.

The Fix: Upgrade to SNMPv3. It uses AuthPriv (Authentication + Privacy/Encryption), so even if Robin Hood captures the packets, he can’t read them.

xxxXAACllLow/eEdn(cv3ry)ption

8.4 Syslog: The Royal Scribe  

The Standard Diary

Network devices don’t have screens. They need a place to write down what is happening.

The Components

Facility: "Who is speaking?" (Kernel, Mail, User). Severity: "How bad is it?" (0 to 7).

10:00: Router1LinkDown
xSyxxxLiLo1010sng:0:0lokin12gD::SoFa S FerwilwWvn!it1erchD2eFnaynIPFail

Syslog Severity Levels: 0 to 7  

The Scale (Lower = Worse)

# Name Meaning
0 Emergency System is dead (Panic).
1 Alert Action needed NOW.
2 Critical Critical error (RAM fail).
3 Error Standard error message.
4 Warning Event occurred (Link flap).
5 Notice Normal but significant.
6 Info Just information.
7 Debug EVERYTHING (Developer).

Mnemonic

Every Alert Creates Errors When Networks Interrupt Donkey.

035-2-4-7(((WCNahokeecisek)Shlarteker))

SIEM: The Magic Mirror  

Security Information & Event Mgmt

Syslog collects logs. SIEM understands them.

Correlation Example

1. Badge Reader: "Puss entered building at 2AM." 2. Server: "Puss logged into Database." 3. Firewall: "Database sending 5GB to Internet." SIEM Conclusion: Data Theft!

xxxRS!AaIlewErLMtogs

Case Study: The Silent Failure  

Scenario: "Why is the bridge up?"

The Castle Drawbridge (Router) stopped working at 3:00 AM. Traffic stopped flowing.

Shrek wakes up at 8:00 AM. He logs into the Router, but the logs only go back to 7:00 AM because the buffer overwrote the old messages. He has no idea why it crashed.

Discussion Questions

1.

Where were the logs stored (Locally vs. Remotely)?

2.

Why did the logs disappear?

3.

What tool would have saved the 3:00 AM error message?

Case Study Solution: The Silent Failure  

The Fix

1.

Storage: They were stored in RAM (Buffered Logging). When RAM fills up, old logs are deleted.

2.

Reason: Lack of persistence. Also, if the router rebooted, RAM logs would be lost entirely.

3.

Tool: A Syslog Server. The router should have sent the critical error ("Fan Failure") to the server immediately at 3:00 AM. Shrek could read it later.

xRxSyUSaousDvtloPederg5S1toer4:Dv "ierI’skmdying!"

4 Traffic Analysis and QoS

4.1 Flow Data, Packet Capture, and Prioritization

Traffic analysis and QoS policies are used to diagnose performance and prioritize critical applications under load.

8.5 Traffic Analysis: NetFlow vs. Packet Capture  

1. NetFlow (Metadata)

The Phone Bill.

2. Packet Capture (PCAP)

The Wiretap.

F"rDoemar:A Blobice,
TSNTiPoiehsC:zete1A A:Fp23Pl 1loa4icKwss."(eBwC(ooErdnnvteenlotp)e)

NetFlow / IPFIX: Watching the River  

How it works

Routers summarize traffic into "Flows" and send the summary to a Collector.

Finding the "Top Talker"

"Why is the internet slow?" NetFlow says: "Because Donkey’s iPad (10.1.1.50) is downloading 4TB of movies from Netflix."

Top Apps:
xxU12D..P N Yeo2tflu05iTu5xb(eExport)

Packet Capture: The Microscope  

Tools

Port Mirroring (SPAN)

Switches normally keep secrets. To capture traffic not meant for you, you must configure a SPAN Port (Switched Port Analyzer). "Copy all traffic from Port 1 to Port 2 (My Sniffer)."

xxxWCiorpesyh!ark

tcpdump: The Command Line Sniffer  

Troeromtin@alsw-atcmpdpu:˜m#p tcpdump -i eth0 -n port 80
tcpdump: verbose output suppressed...
listening on eth0, link-type EN10MB...
10:42:01.52 IP 10.1.1.5.54321 > 10.1.1.1.80: Flags
[S]...
1[0S:4.]2.:.0.1.53 IP 10.1.1.1.80 > 10.1.1.5.54321: Flags
10:42:01.54 IP 10.1.1.5.54321 > 10.1.1.1.80: Flags
[.]...
3 packets captured

Decoding the Output

Why use tcpdump?

Key Flags

Pro Tip

Capture with tcpdump -w file.pcap on the server, then download the file and open it in Wireshark for ease of use!

Wireshark: Anatomy of a Packet Capture  

DRecawodPeadylLaoayedr7
WFAN121314FEInUSve000000iriltppo.rathteseimrs012eserlymeerrnrplio000ha:s1neetDaen: 0 0 7rknT1010103tPtaN v000-mim.1.2.2:II,rogetw2 50 35 spe 18Storaocnm2rccmrk(15600pby:olPM) c 3_Ste 11Vroa05hao191910s:2erton 0 0ckur22.1on2:siocoag00.pce.1.1.1w33nl,em 0 2ca6868.1i:44Se81p.1.1re.4:,Srcnt 00 1a.5.5..55rPP00:6c:orro0c2b6 1t:to....D11...92 5c..es0.0.1.143olt1.1.96821.1.2..11..1116.5.8.0.1...P50rSNSNotMMSoPPNMIPnfggoetet-re-regeqqt-ueuereststsponse

2. Details (Layers)

"The Inspection." Breaks down the packet by OSI Layer.

3. Bytes (Hex)

"The Raw Data." What actually went over the wire.

8.6 Quality of Service (QoS): The VIP Lane  

The Problem

Bandwidth is limited. If Donkey downloads a 4K movie while Shrek is on a Video Call, the video will freeze.

The Solution: QoS

Prioritization. Giving critical traffic (Voice/Video) a "Fast Pass" to skip the line.

VxGxxxSIetuPnc Lerk!aanle T (raVffiocice)

Managing Bandwidth: Shaping vs. Policing  

Traffic Shaping (The Buffer)

"Please Wait."

BSumrsototh

Traffic Policing (The Chop)

"Get Out!"

DROP!

Classification: Stamping the Envelope  

How does the router know?

We add a "Tag" to the packet header so routers know it is VIP.

Layer 2: CoS (Class of Service)

Layer 3: DSCP (DiffServ Code Point)

DEDaFStCaP TPagacket

Case Study: The Robot Voice  

Scenario: "I c-c-can’t h-hear y-you!"

Shrek is trying to call Fiona using VoIP (Voice over IP). The audio sounds robotic and choppy.

Meanwhile, the 3 Blind Mice are streaming 4K movies in the next room.

Diagnosis:

Discussion Questions

1.

Which metric is ruining the call: Latency or Jitter?

2.

How can we fix this without banning movies entirely?

3.

What DSCP tag should the VoIP phones be using?

Case Study Solution: The Robot Voice  

The Fix: Apply QoS

1.

Root Cause: Jitter. (Variation in arrival time makes voice sound robotic).

2.

Strategy: Configure Queuing on the router.

3.

Tagging: Ensure VoIP phones mark traffic as EF (Expedited Forwarding) or DSCP 46.

VFWirastit!...

Module Summary

Module 8.0 Summary  

Key Concepts:

Quality of Service (QoS):

Conclusion

This module covered network operations and monitoring: documentation practices, configuration management, device lifecycle, and baselines for performance tracking. You learned monitoring protocols (SNMP, Syslog, NetFlow), traffic analysis tools (Wireshark), and QoS mechanisms for prioritizing critical traffic. In the final module, we’ll explore security concepts including threats, defense strategies, and access control.