ACTE Student Workbook r4.1
ACTE Student Workbook r4.1
Technical Training
Classroom Setup ................ 2 Student Workbook
Module 2: Introducing In-
Line Platforms ..................... 5 This student workbook describes the classroom exercises for the
ACTE technical training course.
Module 3: Introducing The workbook opens with a description of the classroom setup. The
NetXplorer ........................... 6 remainder of the workbook consists of step-by-step exercises to be
completed during the training course under the guidance of the
Module 4: Monitoring and course instructor. Each module number refers to the particular
Reporting ........................... 10 module in the ACTE course when you will perform each set of
exercises. The exercises contained in each module are divided into a
Module 5: Condition series of tasks. Enjoy the training!
Catalogs ............................. 13
Confidentiality Notice
Document Version: 4.1 This document contains Proprietary Trade Secrets of Allot Communications LTD and
its receipt or possession does not convey any right to reproduce, disclose its contents
Date: March-12 or to manufacture, use or sell anything that it may describe.
Allot reserves the right to make changes, add, remove or change the schedule of any
element of this document.
ACTE Student Workbook
Classroom Setup
The training lab has the following configuration. Each group of students has a laptop. All Groups
share the same NetEnforcer. All traffic generated by the groups passes via the NetEnforcer.
There is an additional machine on which the NetXplorer server is installed.
2
ACTE Student Workbook
TCPReplay/
IXIA traffic
generator
NE2
Mgm
NATed IP switch
Laptop
Internet
Laptop
NX1
Training Room
NTP Server
3
ACTE Student Workbook
IP Addresses
Please fill out the table below with the appropriate IP address given to you by the instructor.
Highlight your own group IP.
Site IP
NetXplorer
NetEnforcer
Group 1
Group 2
Group 3
Group 4
Subnet Mask
Default Gateway
DNS 1
DNS 2
Instructor’s Laptop
Table 1: IP Addresses
User Name and Password for the NetXplorer
Please ask the instructor for your NetXplorer user name and password.
User Name:_______________
Password: ________________
4
ACTE Student Workbook
5
ACTE Student Workbook
Figure 3: NetExplorer
3. Click Install java JRE First, and follow the installation instructions.
4. When java installation completes click “Launch NetXplorer” to install the GUI.
5. Follow the installation instructions. When installation is complete the following screen
should be displayed:
6
ACTE Student Workbook
6. Ask your instructor for the NetXplorer User Name and Password, and enter them in the
relevant fields. Click “Log On”. The NetXplorer user interface should appear.
Exercise 3.2: Adding NetEnforcer or Service Gateway to
NetXplorer
Objectives
By the end of this exercise you will be able to:
Add a NetEnforcer or Service Gateway to your NetXplorer server
Task 3.2.1
In the NetXplorer navigation pane select Network tab.
1. Right-click on the root of the network tree and select New NetEnforcer from the popup
menu.
2. The NetEnforcer Properties – New dialog is displayed.
3. In the designated fields enter:
A Name for the NetEnforcer, for example GroupN NE, where N is your group
number
The Password of the NetEnforcer (the default Password is allot)
The IP address of the NetEnforcer (see table 1)
Click Save
You will be prompt with the following message:
7
ACTE Student Workbook
Task 3.3.1
1. In the network tree, select and right-click the NetEnforcer and select Configuration from
the popup menu. The Configuration window for the selected NetEnforcer is displayed.
2. Navigate using the tabs and fill out the following table:
NetEnforcer Detail My NetEnforcer
Is the NE/SG currently active or in bypass
mode?
Is Allot APU enabled on the NE/SG?
When is the key due to expire?
What is the Platform Type? What is the
Device Type?
What is the installed software version?
What is the box number?
What is the QoS bandwidth capacity?
[Not relevant for Service Gateway]
Is Real-Time reporting available?
What are the NIC speed settings for these links?
Internal 0
External 0
Management
[Service Gateway links name are different]
What is the NE/SGs Network Mask?
What is the IP of the NTP server?
8
ACTE Student Workbook
9
ACTE Student Workbook
10
ACTE Student Workbook
Tasks 4.2.1
Answer the following questions and in each case, explain how you got to the answer.
4.2.1. Of all the NetEnforcers or Service Gateways in the training classroom, which one has
the most traffic currently flowing through it? How much bandwidth is flowing through?
NE/SG Name: ________________________
How Much Bandwidth? ________________________
Graph used: ________________________
Settings: ________________________
4.2.2. Is there currently more inbound or outbound traffic running through the network? Was
there any stage in the last 10 minutes when this was not the case? (If so, at what time?)
Inbound or Outbound? ________________________
Was this trend reversed? If so, when? ________________________
Graph used: ________________________
Settings: ________________________
4.2.3. What is the current number of live connections currently running through the network?
Live Connections: ________________________
Graph used: ________________________
Settings: ________________________
4.2.4. At what time over the last 15 minutes was the most HTTP_Browsing traffic being
generated? At this peak moment, which internal host was responsible for the largest
portion of this HTTP_Browsing traffic?
When was most HTTP_Browsing Traffic generated? ________________________
Internal Host responsible for most of it? ________________________
Graph used: ________________________
Settings: ________________________
4.2.5. Can you generate a single graph that shows you who were the most active users on
the network over the last 15 minutes and which protocols they were using?
4.2.6. What percentage of traffic in the NE/SG falls into the Web Applications VC and the
fallback VC?
Web Applications VC? ________________________
Fallback VC? ________________________
Graph used: ________________________
Settings: ________________________
11
ACTE Student Workbook
4.2.7. If you have been generating traffic for at least an hour, you will be able to answer the
following questions using the long term reporting graphs. Over the last hour, which were
the 3 most popular protocols and the 3 most active protocols on the network?
NOTE: Average Most Popular Protocols Graph is Disabled by default. The instructor will
need to enable this graph on your NE/SG in order to complete this exercise.
4.3.2. Create a PDF report that shows the 10 most active protocols on your NetEnforcer or
Service Gateway over the last day at a 1 hour resolution.
4.3.3. Create a compound report made up of these two reports, to be emailed to your trainer
at 5pm every day
12
ACTE Student Workbook
13
ACTE Student Workbook
Open graphs
1. Click the Network tab.
2. In the navigation tree, right-click your NetEnforcer or Service Gateway.
3. From the shortcut menu, select Real-Time Monitoring.
4. From the submenu, select Pipes… The Real-Time Monitoring: Pipes definition dialog
opens.
5. Click the Objects tab
6. Select the Specific Pipes radio button
7. Select the pipes that you would like to monitor from the Available Pipes list and copy
them to the Selected Pipes list
8. Click OK. The Pipe Distribution graph appears.
14
ACTE Student Workbook
Generate traffic
1. Initiate a file download. Ask your instructor as to a location of an FTP site that you can
download a large file from, or refer to exercise 4.1.1.
2. Ping both the instructor’s laptop and the instructor’s NE/SG using the command “ping -t
<IP address> -l 1000”.
3. Look at the graph.
4. Is the traffic falling to the Pipe you expect it to?
15
ACTE Student Workbook
6. Right-click, and select Insert Virtual Channel from the shortcut menu. The Virtual Channel
Properties dialog box is displayed.
Open graphs
1. Click the Network tab.
2. In the navigation tree, right-click your NetEnforcer or Service Gateway
3. From the shortcut menu, select Real-Time Monitoring.
4. From the submenu, select Virtual Channels… The Virtual Channels definition dialog
opens.
5. Choose the Objects tab. Click the Specific Virtual Channels radio button. Move the
available virtual channels over to the Selected Virtual Channels pane.
6. Click OK. The VC distribution graph opens.
7. Right click the graph and click Start Automatic Update.
16
ACTE Student Workbook
Generate traffic
1. Initiate an FTP download. Ask your instructor as to a location of an FTP site that you can
download a large file from.
2. Ping the other training PCs using the command “ping –t <IP address> -l 1000”.
3. Browse the web
Examine Graphs
1. Look at the Real-Time Monitoring VC distribution graph and fill in the following for each of
the VC that appear:
17
ACTE Student Workbook
Notice that the dialog displays a transfer rate of Kilobytes per second while the graph
displays bandwidth in Kilobits per second, giving a ratio of 1:8 between the numbers:
(120*8 = 960, which is what we can see in the graph).
Exercise 5.3: Classifying by Time
Objectives
A customer may wish to guarantee a particular service during work hours, but after work hours
the service does not need to be guaranteed
By the end of this exercise you will be able to:
Define and use Time Catalog entries to implement a time-dependent traffic policy.
Task 5.3.1: Defining Time Catalog Entry
The initial task is to create the Time catalog entries needed. Just like any other catalog entries,
time catalog entries are global. Make sure you give a unique prefix to the catalog you create to
differentiate it from the catalog entries created by your peers.
1. On the Catalogs tab, right-click Time and select New Time… from the shortcut menu.
The Time Entry Properties dialog box is displayed.
2. Give the time entry a unique name: modify the name to N WorkHours where N is your
group number.
3. Click Add. Add Time Item dialog is displayed.
18
ACTE Student Workbook
4. Select the following details; Weekly from 9.00am until 5.30pm every Monday.
5. Click OK.
6. Now continue and complete the entries for the entire working week (Monday – Friday).
The complete entry should appear as in the following figure.
NOTE: time based classification is based on the NetEnforcer/SG time. Make sure your
NetEnforcer & NetXplorer time zones are synched.
19
ACTE Student Workbook
TCP / UDP
TCP / UDP
TCP / UDP
20
ACTE Student Workbook
21
ACTE Student Workbook
22
ACTE Student Workbook
Open graphs
2. Click the Network tab.
3. In the navigation tree, right-click your NetEnforcer or Service Gateway.
4. From the shortcut menu, select Real-Time Monitoring.
5. From the submenu, select Virtual Channels… The Virtual Channels definition dialog
opens.
6. Click the Objects tab
7. In the Objects tab, select the Specific Virtual Channels radio button.
8. From the Available Virtual Channels list, select the FTP Virtual Channels (the one to
which you assigned the working hours catalog in Exercise 5.3.2 above), and click the
23
ACTE Student Workbook
1. Select Network.
2. Select your NetEnforcer or Service Gateway.
24
ACTE Student Workbook
25
ACTE Student Workbook
26
ACTE Student Workbook
1. Right Click on your device to open the Device Configuration & verify the checkbox for
“Enable HTTP User Defined Signatures” from the “Networking” Tab is checked.
2. In the “Service” catalog create a “New HTTP UDS” called GroupN (Where N represents
your group number).
6. Use the NetXplorer Real time Monitoring graphs to verify that your traffic is
classified/limited as configured.
Graph used: ________________________________________________
NOTE1: Within the websites there might be other types of files (e.g: html) and referrals to
different hosts, which do not match the configured signature. Make sure to download files
matching your signature both in terms of content type and host.
NOTE2: Links within the websites in table above sometimes trigger multiple HTTP GET
commands on a single connection. Allot analyzes the signature on the first HTTP GET command.
If you find that the traffic is not recognized by the UDS at the first attempt, close the browsing
session and try again.
27
ACTE Student Workbook
28
ACTE Student Workbook
3. On the NetXplorer server check if the following files exist under /opt/allot/netxplorer/jboss-
5.1.0.GA/server/allot/webSafe. If the files do not exist then create them:
operator_bl.url
operator_wl.url
warning.html
NOTE: The operator_bl.url and the operator_wl.url files that you create on the NX server will
appear without the “.url” suffix. Make sure that you do not add the “.url” suffix twice
to the files!
Task 7.4.2: Adding Different Hosts to the Blacklist
Assuming that there is only one NetXplorer server, each group will add one or two hosts to the
operator_bl.url file on the NetXplorer server and save it promptly so that the other groups can do
the same as well
1. On the NetXplorer server open the “operator_bl” file (using a text editor like notepad for
example) & add one or two hosts such as those shown in the example below. Each group
can choose the sites it wishes to add to the blacklist. E.g:
www.yahoo.com
www.metacafe.com
www.dailymotion.com
NOTE: On a Multi-blade chassis (Service Gateway) the file will be distributed automatically to
each Core Controller.
Task 7.4.3: Adding a Virtual Channel for WebSafe Subscribers
Students will now create a new VC with a condition to match the group number, and an action of
“Service Activation” = WebSafe.
1. Inside your group pipe create a virtual channel called WebSafe, on top of the UDS &
Web App VCs, below the FTP App Vc.
2. Set the “Service Activation” to WebSafe.
29
ACTE Student Workbook
Figure 24: Adding a VC with a condition matching your group & Action=WebSafe
3. After you add this virtual channel your group pipe should look like this:
30
ACTE Student Workbook
31
ACTE Student Workbook
What are the advantages of the policy? What are the disadvantages of the policy?
32
ACTE Student Workbook
What are the advantages of the policy? What are the disadvantages of the policy?
33
ACTE Student Workbook
What are the advantages of the policy? What are the disadvantages of the policy?
34
ACTE Student Workbook
1. From the Events/Alarms tab select Event Types configuration. The Event Types
Configuration table is displayed in the details area.
2. Using the drop down lists change the following:
Group # Event type name Change ‘Alarmable’ to Change Severity to
1 Virtual Channel Policy Change Yes Critical
2 Pipe Policy Change Yes Major
3 Line Policy Change Yes Minor
4 Catalog Entry Change Yes Critical
Task 8.1.2: Generate the Event Condition
To trigger an alarm on the event you have just defined, we will need to make a policy change.
35
ACTE Student Workbook
2. Double click an Event in the Alarms log and view its details. At what time was the event
registered?
3. In the Network tab right-click your NetEnforcer and select Events. The Events Date
Coverage dialog appears.
4. Click OK. The Events for the NetEnforcer are displayed. Is the Policy change event
there?
5. In the network tree, expand the NetEnforcer and find Group1 Pipe. Right click it and
select Events… The Events for the Pipe are displayed.
6. Open the Events table for the Virtual Channel that has changed (you will find it easily as it
will be marked with a red dot on it). In which Events table does the policy change event
appear?
36
ACTE Student Workbook
37
ACTE Student Workbook
38