IMC11

advertisement
The Evolution of Network Configuration:
A Tale of Two Campuses
Hyojoon Kim†, Theophilus Benson‡
Aditya Akella‡, Nick Feamster†
†Georgia Tech
‡University of Wisconsin, Madison
1
What is Network Configuration?
• Collection of
configuration files
• Express network policy
• Determines the overall
network behavior
2
The Network State Changes
• Topology change
• Policy change
Configuration change
Growth of firewalls in Georgia Tech
How does network configuration
change over time?
3
Configuration Changes
of line
WhatGeorgia
are Tech
causingNumber
the changes?
Network Devices
Routers
Firewalls
Switches
changes
326,458
539,171
353,420
Where are the changes happening?
Total
1,219,049
Line changes in the past 5 years
Is there a noticeable pattern?
4
Our Contribution
• Examine change patterns over time
• Look at many different types of devices
• Provide better understanding
– Help develop better configuration tools
• e.g., Change recommendations, feedbacks
– Reduce misconfigurations
5
Our Data
• Configuration data from two campus
networks
– 5 years of accumulated configuration files
• Tools
– CVS
– RANCID (Really Awesome New Cisco confIg Differ)
6
Collecting Configuration Files
…
Pull configuration
Remote login
(telnet, ssh)
RANCID
CVS commit
CVS Server
7
Revision Control on Configuration Files
• When is the change?
• What changed?
• Regenerate each
revision
...
RCS Format
1.51
log
@Fri Feb 5 15:04:28 EST 2010
@
text
@a141 1
port-object range bootps bootpc
a160 4
object-group service 12-123-12-13-any-udp udp
port-object range bootps bootpc
object-group service 12-123-12-14-any-udp udp
port-object range bootps bootpc
d173 16
a188 9
object-group service 13-14-15-16-any-udp udp
port-object range bootps bootpc
object-group service 14-15-16-17-any-udp udp
...
8
Our Approach
Take latest
snapshot
Compare revisions
Data
(RCS)
Revisions
Sort revisions
by time
Group
simultaneous
changes
Snapshot
Analysis
Change
Analysis
Longitudinal
Analysis
Correlation
Analysis
9
Classifying Configuration lines
logging buffered 1024000
enable secret [deleted]
username [deleted]
aaa new-model
…
Interface Port-channel1
description WiSM-A virtual channel
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 316,805,807-809,816,1296,1312
switchport mode trunk
…
router ospf xxxx
router-id x.x.x.x
…
ip access-list extended access-vty-in
permit tcp x.x.0.0 0.0.255.255 any range 22 telnet log-input
permit tcp x.x.0.0 0.0.255.255 any range 22 telnet log-input
…
Management
Layer 1
Layer 2
VLAN
Layer 3
ACL
Security
Control Filter
QoS
10
Overview of Results
• Routers are multi-functional
– Univ. of Wisc: Layer 3 changes are 30% of total changes
– Georgia Tech: Layer 3 changes are 5% of the total changes
• Firewall changes are concentrated on ACL
– Around 87% of the total changes
– Steep increase in the access control list lines
• Switches are about providing connectivity
– Port-centric changes
11
Change Analysis on Routers
78%
Static
ARP
Number of line changes in all routers over 5 years - GT
12
Change Analysis on Firewalls
87%
Access
Control
Number of changes in all Georgia Tech firewalls over 5 years
13
Longitudinal Analysis on Firewalls
Change in number of Lines in
all Georgia Tech firewalls
Change in number of firewalls
in Georgia Tech
14
Change Analysis on Switches
snmp trap
Number of line changes in all switches in Univ. of Wisconsin
15
Correlation Analysis on Switches
Univ. of Wisconsin Switches
Correlated changes
ACL, L1
L1, VLAN
L1, L2, MGT
MGT, L1
VLAN, MGT
%
24%
11%
11%
10%
9%
16
Conclusion
• Study on how network configuration
changes over time
• Reveal interesting characteristics about
network changes
– Magnitude and frequency of changes
– Causes of changes
17
Conclusion
• Provide better understanding
• Improve current methods of configuring and
managing network devices
– Change recommendations
– Reduce misconfigurations
– More automation
Questions?
joonk@gatech.edu
18
Georgia Tech Network
Routers
Firewalls
Switches
Total
16
365
716
1,097
19
Download