APRICOT 2006
Conference Secretariat


Congress West, PO Box 1248
West Perth WA 6872 Australia

Ph:
+61 8 9322 6906
Fax: +61 8 9322 1734
apricot@congresswest.com.au

APRICOT 2006 Program > Workshops & Tutorials > Tutorials

Juniper Advanced Routing (2 days)
Instructors: Damien Holloway (Juniper)
Level: Intermediate

- JUNOS philosophy and features,
- the Juniper router family,
- typical placement of various routers in networks.
- Introduction to JUNOS CLI and exercises
- Routing policies, filters and routing protocols - OSPF and BGP - configuration exercises
- MPLS and VPN configuration
- Demonstrating High Availability features - fast reroute, graceful restart etc.
- guidance on network design principles for high availability.
- high level overview of network security issues and techniques for DDoS mitigation and security mechanisms such as IDS, Firewalls.

[Top]

Best Practice Guidelines for Deploying MPLS (1 day)
Instructors: Monique Morrow (Cisco), Jeff Apcar (Cisco), Muhammad Sagheer (Cisco)
Level: Intermediate
Slides: download

MPLS core related technologies: Layer 2 and Layer 2 VPNs; multicast, OAM, Security, IPv6; GMPLS; interworking scenarios and future direction of MPLS technology.
The tutorial focus will be in providing practical implementation guidelines with case study example.

[Top]

Introduction to WiMax and Broadband Access technologies (1/2 day)
Instructors: Mohammad Farhad, Richard Pruss
Level: Intermediate
Slides: download

The IEEE 802.16/WiMax (Worldwide Interoperability for Microwave Access) standard defines the air interface for fixed point-to-multipoint broadband wireless access networks. It is a wireless alternative to Digital Subscriber Line (DSL). An amendment, being drafted, adds mobility support. A lot of works are also going on in many standards bodies and many edge of service provider network deployments on session and policy control. This tutorial provides a detailed introduction to WiMax and covers the ground of access privileges, resource usage control, QoS, accounting and service and application mediation. Standards status and update for Cable, DSL Forum, mobile/ 3GPP, ITU, TISPAN and some hopes for convergence. It also discusses some deployment cases to show how it looks like in practice.

[Top]

Delivering Triple Play Services Over Metro Broadband Network (1/2 day)
Instructors: Lim Wong, Richard Pruss (Cisco)
Level: Intermediate
Slides: download

Metro broadband networks are capable of delivering a variety of services to the end customers but why are so many carriers having issues offering triple play services?
This tutorial will discuss the architectural options for delivering high quality video, voice, and Internet services to the home; and how video and voice can be integrated into existing data network. What last mile technology, security and Quality of Service mechanism are needed to offer these services? Topics include:
- Triple play network architecture
- Last mile access options - PONs, xDSL, Metro Ethernet, WiMAX, Cable
- IP video essentials
- Multicast video (IPTV) network design
- Video on Demand network design
- Security and Quality of service requirements

[Top]

Security in Mobile and Wireless Networks (1/2 day)
Instructors: Ray Hunt (University of Canterbury, NZ)
Level: Intermediate
Slides: download

This tutorial will address a range of technical and performance issues central to the deployment and operation of secure Wireless LANs (IEEE802.11a, b, g) and UMTS / CDMA2000 3G networks appropriate for both the enterprise and for wireless and mobile network operators. It will examine security in the mobile network architecture including important topics such as cryptographic tools, devices and equipment, mobility, authentication and security standards, security testing and evaluation, performance and quality of service as well as a range of WLAN/3G interoperability and standards issues. It will discuss the new IEEE802.11i (WPA2) security standard including new products and performance issues and examine how this will interwork with 3G Networks. Further, it will discuss the results of performance tests on various security architectures and configurations in order to provide useful guidelines for configuration and operation in practice.
Demonstration of basic stumbling, attack and sniffing tools will also be included.

[Top]

Using EAP Authentication with RADIUS and Configuration of Linux Authentication Server (1/2 day)
Instructors: Hugh Irvine, Dhruba Raj Bhandari
Level: Intermediate

The RADIUS protocol is widely used for AAA (authentication, authorisation and accounting. EAP (extensible authentication protocol) is now extensively used for both wireless and wired networks, and there is a bewildering array of EAP flavours to choose from. This tutorial will demonstrate and explain the configuration and operation of a number of EAP versions.

The practical demonstration will involve:
- General overview of wireless authentication
- Configure Apache as an portel page server
- Mysql as an database server for user and accounting info
- Free Radius as an authentication server.

[Top]

BGP Deployment, Best Current Practices and Troubleshooting Techniques for Service Providers (1 day)
Instructors: Philip Smith (Cisco)
Level: Introductory

This tutorial introduces service providers to BGP, including iBGP, eBGP and common attributes. It will then introduce some more advanced features of BGP, and look at the various scaling techniques available, when to use BGP instead of an IGP, and examine policy options available through the use of local preference, MED and communities. This tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. Configuration techniques for modifying inbound and outbound traffic flows are covered, as are some examples on how to use BGP communities in inter-AS relationships. The tutorial finishes by covering some common multihoming security issues.

The tutorial discusses the best current practices for ISPs, including how to configure external peering sessions and how to deploy BGP across ISP backbones as well as examining common problems ISPs have when deploying BGP within their network. It looks at problems with peer establishment, missing routes, inconsistent route selection, and convergence issues. It also looks at real world examples of common errors which are made when deploying BGP, both as iBGP and eBGP, in service provider networks.

[Top]

Zebra/Quagga Routing Suite (1/2 day)
Instructors: Anura Abayaratne (MTT Network, Sri Lanka)
Level: Advanced
Slides: download

Overview:
- Installation
- Basic commands
- Starting BGP
- BGP router
- BGP network
- BGP Peer
- BGP Peer Group
- BGP Address Family
- Autonomous System
- BGP Communities Attribute
- BGP Extended Communities Attribute
- Displaying BGP Routes
- VTY shell
- Filtering

[Top]

Maximising Your IP Address Potential (1 day)
Instructors: APNIC staff
Slides: download

This tutorial consists of four different modules. Each module is self-contained so you can pick and choose which modules you are interested in. The modules are described below.

1. Infrastructure development, education and APNIC
This module will explain what APNIC is, who makes up the APNIC community, and what services and activities APNIC provides. The module will also examine APNIC's role in Internet development as well as the role of training and the future of the Internet.

2. Creating policies that work for you
This module provides an overview of APNIC policy, explains policy changes made in the past, and how you can participate in the policy development in the future. The module also provides an explanation of how to apply for IP addresses by selecting the appropriate APNIC policy for you. Finally, the module explains how to propose a new policy if current policies do not meet the needs of the Internet community.

3. Efficient address space management
This module will provide you with an overview of the Internet resource management system, how to use the functions in MyAPNIC, and how to query and update the APNIC Whois Database.

4. Managing your "old" address space
If you have IP addresses that were allocated to you in the early days of the Internet, this module should be of interest. This module will define what historical addresses are, where they come from, and what recent changes may now have an impact on the way your historical address space is registered.

[Top]

Introducing Layer3 VPNs in MPLS Networks (1/2 day)
Instructors: Ariff Premji (Juniper)
Level: Intermediate
Slides: download

Workshop for customers who do not have L3VPNs and would like to migrate to a MPLS VPN architecture. The workshop would cover the migration procedure from any non-Juniper environment to a Juniper environment. Hands-on material will be included in this tutorial.

[Top]

Integrated IS-IS Primer and Infrastructure Routing (1 day)
Instructors: Seo Boon Ng, Lim Fung
Level: Intermediate
Slides: download

Integrated IS-IS is an IGP that is popular with large service providers. The objectives of this tutorial is to allow attendees who have not been using ISIS, to evaluate if IS-IS is more suited in their environment. For attendees who are using IS-IS, this session would emphasis the optimal ways to deploy ISIS in ISP environment. This includes pointers on tuning IS-IS for fast convergence. The tutorial comprises hands-on and theory sections. The theory session includes designs and case studies which are specific to service provider networks. Participants should have baseline knowledge of either IS-IS/OSPF/BGP.
Introduction to IS-IS
- IS-IS Protocol Overview
- CLNS Addressing
- IS-IS Protocol Concept
- IS-IS Database concept
- Difference between IS-IS and OSPF
- IS-IS SP deployment best practise (IS-IS working with BGP)
- IS-IS MD5 authentication
- IS-IS security Using IS-IS to hide the core network

Lab session
- IS-IS case study and lab setup
- Lab on IS-IS and Routing security (Hiding the core network)
- Basic ISIS Troubleshooting technique

[Top]

Traffic Engineering in MPLS Networks (1/2 day)
Instructors: Harpreet Singh
Level: Advanced

This presentation talks about the conventional problems in IP networks, different techniques in MPLS traffic engineering and the limitations and capabilities of MPLS traffic engineering. The presentation starts with RSVP signaling, various approaches to Fast reroute, and traffic protection. The presentation also touches on the multivendor aspects of traffic engineering in Juniper and Cisco routers and the different implementation flavours

[Top]

Netflow, Flow Tools and Flow Analysis (1/2 day)
Instructors: Gaurab Upadhaya
Level: Intermediate

Netflow has been increasingly used as a tool to gather information about traffic flows in IP networks. Flow analysis has the ability to tell administrators what kind of traffic is flowing in the network based on traffic types. As has been observed in the past, netflow can be used to detect attacks and troubleshoot networks. goals - Enable participant to enable flows on their routers, collect flow data and display flow data in RRDTool generated graphs. Pre-requisites - Basic knowledge about routers, Unix based systems, and IP address and ports.

[Top]

VoIP - Asterisk and SIP Implementation, Theory, Monitoring and Traffic Engineering (1 day)
Instructors: Jonny Martin, Ruwan Silva, Habib Madani, Syed Khurram
Level: Intermediate
Slides: download, download2, download3

This tutorial aims to get a few more people up and running with their own VoIP systems and to provide additional information to those who already are up and running. Implementation of an Asterisk - the Open Source PBX - based VoIP system will be covered from the initial build through to a fully functioning system.

The theory and operation of the Session Initiation Protocol (SIP) will be covered. This will include the theory of operation and architecture of SIP and exploration of Open Source implementations with particular emphasis on Asterisk and SIP Express Router (SER).

Finally VOIP Network traffic trend analysis through SIP, SIP-T, ISUP, MGCP, Trunk protocol counters will be covered. This provides an innovative way to monitor VoIP networks and traffic flows which can help in identifying capacity, malfunction and mis-configuration issues. Industry wide the switches need to have this information available for doing trend analysis. BTS provides ways export the data to a file, which can then be pulled off the switch in pseudo-real time manner for trend analysis purposes.

[Top]

ISP Network Security - Survey of Security Threats and Attack Classification (1/2 day)
Instructors: Danny McPherson, Ray Hunt
Level: Intermediate
Slides: download, download2

Information on ISP security survey results recently published includes many things that can be done to raise the bar in ISP network, lots of open source tools and techniques. This tutorial will include an introduction to commercial tools as well.

Internet architectures are built upon a pair of protocols designed over 25 years ago and to which virtually no consideration was given to security. Although the IPv6 networking family has been designed to address this issue, the majority of existing network infrastructure is subject to substantial threats. This tutorial examines the current security risks resulting from using TCP/IP by network providers and ISPs and how these threats related to traffic carried by these providers on behalf of their customers can have such devastating effects. This tutorial classifies the type of attacks possible focusing particularly on both wireless local and wide area networks.
These threats are largely centered on IP sniffing, IP spoofing, TCP hijacking, Buffer Overflow, Blended and Distributed Denial of Service attacks. Although firewalls have been designed to provide protection for many services, it is now recognised that they can be broken and new firewall and IDS technology is necessary to complete the TCP/IP security framework.

This tutorial will examine and classify the risks and threats in TCP/IP networks today addressing the limitations of firewalls as well as the use of Intrusion Detection and Prevention architectures.

[Top]

Large Scale Denial of Service Attack Mitigation (1/2 day)
Instructors: Paul Quinn, Darrel Lewis (Cisco)
Level: Intermediate
Slides: download

Denial of service attacks are a fact of life for service providers today and effective attack mitigation is key for maintaining availability and exercising control.
This session will begin with an overview and characterization of attacks. We will then review attack detection techniques before turning to the core of the tutorial: mitigation. We will cover a wide-range of network-centric tools available to operators, as well as advanced mitigation architectures. The session will conclude with some deployment guidelines and a discussion of the future of denial of service attacks.
Following this tutorial attendees will have a thorough understanding of best practices for attack mitigation and be able to determine the most effective mitigation deployment models for their network.

[Top]

Best Practice for Security Patch and Vulnerability Management (1/2 day)
Instructors: Neal Gemassmer
Level: Introductory

Organisations that invest in complex and expensive network systems could find these systems become rendered useless if something as simple as patching is not managed effectively. Hackers continue to use worms, viruses, spyware and malware to exploit known vulnerabilities on unpatched systems, resulting in costly network downtime and considerable administrative resource and expense to repair.
Moreover, as the trend continues in enterprise networking for the convergence of voice, video and data onto a single network, the implications of downtime due to a compromised network become more far-reaching. Unpatched critical applications such as telephony are now vulnerable to malicious attack, with potentially disastrous consequences for an organisation's data. This is in addition to having a negative affect on the productivity of staff.
Patching is, of course, only one element of an overall security program. However, it does make a pivotal contribution to reducing the myriad of vulnerabilities and their resulting exploits. It also helps to resolve issues arising from spyware and malware. By establishing the correct procedures and process for patch management, companies can ensure they are less likely to fall victim to network attacks.
This presentation will discuss best practices approach to patch and vulnerability management and why it's critical for businesses to adopt an effective network security program in order to best protect their networks against emerging security threats.

[Top]

IPv6 Transition and Deployment (1/2 day)
Instructors: Salman Asadullah
Level: Intermediate

IPv6 Network Design and Operation
- IPv6 Merits and Motivations
- IPv6 Addressing Planning and Assignment
- IPv6 and DNS
- IPv6 and Network Management
- IPv6 Routing Protocols

Enterprise Deployment
- Campus
- WAN
- S2S VPN
- Remote Access

Service Provider Deployment
- Core
- Access

IPv6 Services
- Multicast
- QoS
- Security
- Mobility

[Top]

APNIC: Practical introduction to IPv6 (1 day)
Instructors: Jordi Palet Martinez, Tomohiro Fujisaki (NTT), Amante Alvaran (APNIC)
Slides: download

The IPv6 tutorial will offer a practical introduction to the basics of IPv6. Participants will learn how to activate IPv6 on PCs, and be given practical instruction on:

* Installing IPv6 on different platforms (XP/W2003, Linux, BSD)
* Basic stateless/stateful configuration, including privacy setup
* Transition mechanisms
* Examples of applications
* Basic configuration of routers
* IPv6 policies and procedures

During the tutorial, attendees will also learn how to accomplish some
Basic monitoring and troubleshooting of the IPv6 network.

The tutorial is targeted at engineers and network administrators from both ISPs and SOHO/Enterprise networks. Participants should already have a basic knowledge of IPv4.

Note: Considering the hands-on approach of this tutorial, it is highly recommended that participants bring their own laptops, so they can practice the lessons learned during the tutorial. It is assumed that most participants will be using Windows XP, so most of the training will be done on this operating system. However, instructions for other operating systems will be provided as part of the tutorial materials.

[Top]