Transcript CiscoS3C8

Cisco S3C8
Network Management
Documentation
• diagrams that indicate the path of the physical
wiring layout;
• the type of cable;
• the length of each cable;
• the type of termination for the cable; physical
location of each wall plate or patch panel, and;
• a labeling scheme for easy
• identification of each wire.
Documentation
• Also includes:
–
–
–
–
–
–
Layout of MDF
Layout of IDF
Physical layout of rack mounts
Auxiliary equipment & servers
Patch panel labels
Identification and configuration of all
equipment in MDF and IDF
Documentation
• Also includes:
–
–
–
–
–
–
–
–
Server and workstation configuration details
Physical location
User
Network ID – IP address, MAC address
Subnet, Topology; IRQ, SMA
Software installed
O/S
Repair Record
Documentation / Security
• Soft
– User rights, password, firewall support
• Hard
–
–
–
–
Locking MDFs and IDJs
Who has access to MDF and IDF
How hosts are protected
Who has physical access to system
• Documentation needs to be updated
Data Recovery
• UPS, Tape Backup, and Disk Arrays
– Full, incremental, differential, copy and daily
– Tape backup is cheap
• Sequential Storage
• Archive Bit
– Allows for INCREMENTAL backup
• Only backup what has changed since last backup
date
Disk Redundancy
• Raid 0
stripes data across multiple disks, no
parity
• Raid 1
disk mirroring – disk duplexing – writes
data to two identical partitions
• Raid 2
writes across multiple disks with error
checking
• Raid 3
stripes data one byte at a timededicated parity drive
• Raid 4
stripes one sector at a time- dedicated
parity drive
• Raid 5
stripes data and parity across
Environmental Factors
•
•
•
•
Static
Contaminants – smoke, dust and dirt
Heat – high temperatures
Protection
– Isolate transformers; use regulators and line
conditions and UPS
Viruses
• Worm
• Virus
• Trojan
propagates itself
infects files
disguised as a game, utility or
application
– Know where software came from
– Don’t use unknown disks
– Use current virus checker
Network Types
• Peer-to-peer
– Workgroup network
• Small number of workstations
– W95 W98 Lantastic
– 10 workstations
• Client Server
– Controlled by a NOS (Network Operating System
• Unix
– NFS security , multitasking, kernel, supports many
users
Network Control
•
•
•
•
User rights
Account numbers
Passwords
Access
Baseline Measurements
• Bandwidth used
• Collisions
• Broadcast traffic
Scientific Method – Trouble
Shooting
• 1. Identify network/user problem.
• 2. Gather data about network/user problem.
• 3. Analyze data to come up with a possible
solution to the problem.
• 4. Implement solution to network to attempt
correction to the system.
• 5. If the problem isn't resolved, undo previous
changes and modify data.
• 6. Go to step 3