Chapter2 Network Admin

download Chapter2 Network Admin

of 22

Transcript of Chapter2 Network Admin

  • 7/25/2019 Chapter2 Network Admin

    1/22

    Network Management

    Cisco Networking Academy

    Chapter 2

  • 7/25/2019 Chapter2 Network Admin

    2/22

    Documentation Cut sheet diagrams

    diagrams that indicate the path of the

    physical wiring layout; the type of cable the length of each cable

    the type of termination for the cable physical location of each wall plate or

    patch panel labeling scheme for easy identification

    of each wire.

  • 7/25/2019 Chapter2 Network Admin

    3/22

    Documentation Tools Microsoft Visio

    Physical layout (!" #ayers $ % 2&

    #ogical #ayout (!" #ayer '&

    low Charting

    MD % "D planning and layout

    Network ser)ices % applicationstructure (!" layers *+,&

    Auto disco)ery of network topologies

  • 7/25/2019 Chapter2 Network Admin

    4/22

    Visio Diagraming

    De)ices

    Topology

    Data low

    Ethernet

    Workstation #1

    Workstation #2

    Server

    aser printer

    !outer

    "nternet

  • 7/25/2019 Chapter2 Network Admin

    5/22

    MD % "D #ayouts Documentation will

    include Map of location

    physical layout of rackmounts

    auiliary e$uipment% andservers

    patch panel labels toidentify cable terminations.

    "dentification andconfiguration details of alle$uipment located in thedistribution facilityCreated with Microsoft Visio 2---

  • 7/25/2019 Chapter2 Network Admin

    6/22

    !er)er % .orkstation

    Documentation /ach computer should 0e in)entoried and

    the following attri0utes should 0e logged make and model of computer &serial number%

    purchase date and warranty information hard drives% floppy drives% '(')*'+!,- drive etwork% sound & other peripheral cards amount of !/- "!0% '-/ and ase memory address config

    physical location% user% and network identification " address -/* address Subnet 3opology in this document.

    TIPTools likemsinfo'21eeon .indows

    3 can helpyou o0tainthisinformation1

  • 7/25/2019 Chapter2 Network Admin

    7/22

    !oftware con4gurations Maintaining a list of current software

    in use is important for these reasons Applications 0eing used may a5ect the

    network performance and design "ncreases a0ility to maintain and

    trou0leshoot pro0lems Allows your organi6ation to maintain

    license compliance

  • 7/25/2019 Chapter2 Network Admin

    8/22

    Maintenance records

    /ach time you con4gure a networkde)ice you should keep a record of

    it 7pdates your in)entory

    Allows you to trou0leshoot a gi)en

    con4guration8 noting changes Allows you to track time spent on a

    particular de)ice or issue

  • 7/25/2019 Chapter2 Network Admin

    9/22

    !ecurity measures A list of user rights and9or

    permissions

    A logical topology of which networksconnect where Physical security

    #ogical (software or rule 0ased& security AC#s Packet iltering through 4rewalls

  • 7/25/2019 Chapter2 Network Admin

    10/22

    7ser policies .ho gets what8 where and when Administrator implement organi6ational

    policies regarding Access to data and resources 7sernames % Password standards

    "nformation should 0e included in

    employees (users& documentation Policies :Accepta0le 7se; statement

  • 7/25/2019 Chapter2 Network Admin

    11/22

    Network !ecurity

    Measures -ake the network as secure as possible against

    unauthori4ed access

    3his is done by establishing security policies minimum password length maimum password age uni$ue passwords !estricted time access by day and)or time

    "nforming users of the company5s networkpolicies

    Establishing physical security of data stores

  • 7/25/2019 Chapter2 Network Admin

    12/22

    Data 0ackup and reco)eryTape or ptical 0ackup media

    Allows for data reco)ery

    5 site storage

    7ninterrupti0le Power !upplies(7P!& Protects against power loss

  • 7/25/2019 Chapter2 Network Admin

    13/22

    Data 0ackups (tape and

    disk& ull 0ackup

    Copies e)ery speci4ed data source

    "ncremental Copies only data that has changed sinceany0ackup (archi)e 0it is cleared&

    Di5erential Copies only data that has changed since

    last full0ackup (archi)e 0it is notcleared&

  • 7/25/2019 Chapter2 Network Admin

    14/22

  • 7/25/2019 Chapter2 Network Admin

    15/22

    Physical % /n)ironmental

    Damage

    !tatic /lectricity

    Contaminents Dusk

    !mokeTemperature and

    =umidity

  • 7/25/2019 Chapter2 Network Admin

    16/22

    Computer Viruses Virus

    Eecutable program that 9infects9

    computer files ,ften sent over the "nternet as Email

    attachments. / :3roan

  • 7/25/2019 Chapter2 Network Admin

    17/22

    >aselining /sta0lish a 0aseline

    performance for your

    network 7sed to monitor changes

    topology or de)ice location

    TIP7se !ni5er8.indows NTNetMon or

    lukes#ANMeter toesta0lish0aselines

  • 7/25/2019 Chapter2 Network Admin

    18/22

    Peer to Peer Networking /asy to implement

    "nepensi)e

    Does not re?uire dedicated ser)er No ser)er software re?uired

    No centrali6ed administration or user

    account data0ase May 0e more di@cult to administer 7sers ha)e multiple usernames and

    passwords

  • 7/25/2019 Chapter2 Network Admin

    19/22

    Client9!er)er Networking Centrali6ed admin and user

    account data0ase

    More epensi)e than Peer to Peer Dedicated ser)er and software

    Dedicated Admin

    !ingle points of failure

  • 7/25/2019 Chapter2 Network Admin

    20/22

    Network control and

    management >ser rights are set by an administrator to

    permit or deny access to particular resource

    on a network ?roups are a logical grouping of users on the

    network.

    rofiles will allow a user or admin to

    customi4e the user interface on a computer

    and then be able to use that profile at any

    computer they connect to the network

  • 7/25/2019 Chapter2 Network Admin

    21/22

    !cienti4c Method for

    trou0leshooting "dentify network)user problem. ?ather data about

    network)user problem. /naly4e data to come up with

    a possible solution to theproblem.

    "mplement solution to network

    to attempt correction to thesystem. "f the problem isn5t resolved%

    undo previous changes andmodify data.

    ?o to step 8

  • 7/25/2019 Chapter2 Network Admin

    22/22

    The /nd