Question

In: Computer Science

Discuss the use of network management tools which have a relation with the DNS. (Give at...

Discuss the use of network management tools which have a relation with the DNS. (Give at least one tool which is not listed in the textbook and discuss its output)

Solutions

Expert Solution

There are several network management tools which have relation with DNS.Few among them are:

  • PRTG Network Monitor from Paessler.
  • ManageEngine OpManager.
  • WhatsUp Gold 2017
  • Nagios XI
  • Zabbix.
  • Datadog
  • ConnectWise Automate.

ZABBIX

Zabbix is an open source monitoring tool. It is popular for its easy-to-use and pleasing Web GUI that is fully configurable. Zabbix focuses on monitoring and trending functionality. This software is frequently used for monitoring servers and network hardware. One of the highlights of Zabbix is that it can predict trends in your traffic. Zabbix can forecast future behavior based on historical data.

Since it is open source, it has an active user community spread around the world and good documentation. Zabbix gives the freedom to use the open-source solution without vendor lock-ins (including all components).

Zabbix is powerful for SMB networks below 1,000 nodes. Over that, the software can get slower and its performance decreased. Another disadvantage is that it doesn’t include real-time tests and reports.

Service monitoring functionality is intended for those who want to get a high-level (business) view of monitored infrastructure. In many cases, we are not interested in low-level details, like the lack of disk space, high processor load, etc. What we are interested in is the availability of service provided by our IT department. We can also be interested in identifying weak places of IT infrastructure, SLA of various IT services, the structure of existing IT infrastructure, and other information of a higher level.

Zabbix service monitoring provides answers to all mentioned questions.

Services is a hierarchy representation of monitored data.

A very simple service structure may look like:

Service | |-Workstations | | | |-Workstation1 | | | |-Workstation2 | |-Servers

Each node of the structure has attribute status. The status is calculated and propagated to upper levels according to the selected algorithm. At the lowest level of services are triggers. The status of individual nodes is affected by the status of their triggers.

To monitor the DNS service itself on the port, you can use the following key in the data items (where SERVER is the IP address or DNS server domain):

1

net.tcp.dns[SERVER]

In order not to create a template from scratch, you can clone eg the standard “Template App SSH Service” by changing the name in it and specifying a new key, the trigger will change automatically. And also in the “Type” we select “Zabbix agent” instead of a simple check.


Related Solutions

describe the tools used for network management
describe the tools used for network management
What is the use of simple network management protocol in enterprise networks? Give examples.
What is the use of simple network management protocol in enterprise networks? Give examples.
Discuss the tools used in Network monitoring. How are different tools different in the results obtained?...
Discuss the tools used in Network monitoring. How are different tools different in the results obtained? Would you say that using a different tool would give better results? Please explain.
A small company network have multiple servers (including a web server, a log server, DNS servers,...
A small company network have multiple servers (including a web server, a log server, DNS servers, a file server for inventory information and customer orders, but no email server) , two firewalls, DMZ, and PCs. The company sales products online. a). Suppose that you are a system administrator. What types of network connections will you allow to be established with the servers in the DMZ from the Internet? b). What are the points of entry for attackers? c). How do...
comprehensively discuss the main financial management tools and techniques
comprehensively discuss the main financial management tools and techniques
Give three different techniques that an attacker can use to make a victim send DNS requests...
Give three different techniques that an attacker can use to make a victim send DNS requests to domains chosen by the attacker.
Are the theories of organizational adaption, management tools, or they are mere theories? Give an example...
Are the theories of organizational adaption, management tools, or they are mere theories? Give an example to validate your position.
Discuss the financial-crisis management tools and strategies of the US government. How have those been transformed...
Discuss the financial-crisis management tools and strategies of the US government. How have those been transformed by Dodd-Frank?
Discuss the typical control standards and tools used in farm management.
Discuss the typical control standards and tools used in farm management.
Discuss liquidity management of a bank and the tools and options to address liquidity by bank...
Discuss liquidity management of a bank and the tools and options to address liquidity by bank managers.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT