Networking Midterm Flashcards
Network maintenance
doing whatever is required to keep the network functioning and meeting the business needs of an organization
Examples of network maintenance
Hardware/software installation and configuration
Troubleshooting problem reports (tickets)
Monitoring and tuning network performance
Planning for network expansion
Documenting the network and any changes made to the network
Ensuring compliance with legal regulations and corporate policies
Securing the network against internal and external threats
Backing up files and databases
What are the two types of Network Maintenance?
Interrupt driven
Structured:
What is Interrupt driven network maintenance?
Performing maintenance as a reaction to an input, such as helping a user after they have reported a problem, or improving network security only after an attack has occurred. Reactive
What is Structured network maintenance?
Performing maintenance as part of a predefined plan of processes and procedures. Proactive
Pros of Proactive vs Reactive network maintenance?
Reduced Network Downtime:Maximize mean time between failures (MTBF). Minimize mean time to repair (MTTR).
More cost effectiveness:Fewer major outages occur, resulting in less resources being consumed for problem resolution
Higher network security: Up-to-date prevention and detection mechanisms
can notify staff through logs and alarms. Monitoring allows you to observe network vulnerabilities and needs, and justify plans for strengthening network security.
FCAPS stands for?
(fault management, configuration management, accounting management, performance management, security management)– is a network maintenance model defined by the ISO
ITIL
IT Infrastructure Library) – defines a collection of best practice recommendations that work together to meet the IT business management goals
Cisco Lifecycle Services
(aka PPDIOO model) – this maintenance model defines distinct phases in the life of a Cisco Technology network (plan, prepare, design, implement, operate, and optimize)
COMMON PROCEDURES
Moves – moving users
Adds – creating new user account, provisioning them a device,
Changes – what needs to happen if network changes, update documentation, report changes, alert user.
Moves, adds, changes is also known as MAC
Replacing older/failed hardware: different specs means rebuilding things from scratch before you even go to install the new hardware.
Scheduled backups
Updating Software
Monitoring Network Performance (during an average day, to see what is different when there is an outage)
WHEN TO SCHEDULE:
Some tasks are urgent, like replacing a core router, and need to happen ASAP
Other tasks that aren’t as urgent can be scheduled to happen during the maintenance window.
Maintaining Network Documentation:
unexpected things can happen during changes, so it’s important to do it during the maintenance window so small things can be fixed before peak business hours.
Who is responsible for authorizing various changes? You might need to collaborate with different departments, or need clearance from a supervisor.
What tasks need to be done in the next maintenance window? There might be more that needs to be done than just regular updates. unexpected things can happen during changes, so it’s important to do it during the maintenance window so small things can be fixed before peak business hours.
Who is responsible for authorizing various changes? You might need to collaborate with different departments, or need clearance from a supervisor.
What tasks need to be done in the next maintenance window? There might be more that needs to be done than just regular updates.
WHAT MEASURABLE CRITERIA DETERMINES THE SUCCESS OR FAILURE OF A NETWORK CHANGE?
By layering changes, it might have broken other things and masked that one of the changes was the right solution. TEST AFTER EVERY CHANGE, IF THE PROBLEM PERSISTS, ALWAYS ALWAYS ALWAYS UNDO THE CHANGE YOU JUST MADE, AND TRY AGAIN. Wrong changes have potential to cause more damage. Copy configs into notepad if you need to.
SOP (standard operating procedure)
a document outlining a step-by-step guide to a task. Maintenance plans need SOP’s to make sure everyone does things the same way, no matter who is doing the procedure.
SOP’s are important for consistencies because everyone had different learning experiences, different naming conventions etc. Can bring a network down and make maintenance very difficult.
Correct documentation and what to have in it
Topology logical&physical
Listing of interconnections- Inventory of networking equipment IP address assignment Config Info Original design documents
RESTORING OPERATIONS AFTER A FAILURE:
To restore a device after a failure, DUPLICATE hardware to be able to swap in in case of a failure is important, preconfigured is nice You can also use the duplicates for a test environment for changes.
OS and application software can be pre-installed, ips can be pre-configured etc. (changes will still need to be made, but this reduces downtime/ MTTR) Backups of device configuration information, Exact hardware backups can use the same config.
MEASURING NETWORK PERFORMANCE
Proactive management
Can forecast potential issues and fix before they become a problem (ex: CPU usage is dangerously high) Assure you are meeting your SLA (service level agreement) if you are an ISP, OR as a customer, make sure your ISP is meeting their SLA.
DISASTER RECOVERY TOOLS:
Need up-to-date configuration backups (more valuable than hardware, because it’s so time consuming to recreate)
Need Client data backup
Need up-to-date software backups
Consider hardware inventories due to how long new equipment would take to arrive. Identical replacements are hard to get quickly
Config + software provisioning tools, plan to restore from backups quickly
ARCHIVE backup and restore
Archive
Path flash:/config-archive/$h-config (stored in flash, in config-archive folder, $h is hostname, R1 etc., can also be sent to storage server instead of flash)
Write-mem (automatically takes new archive if config changes)
Time-period 10080 (how often to auto backup)
Show archive
Backup and Restore:
FTP with stored username + password
FTP with specified username + password
How to Log:
Logging buffered 16348 : Stores logs to a buffer in RAM, limited to the number of bytes inputted (16348) Show log will show the buffers contents. Oldest messages are deleted to make room for new messages when full. Convenient method but not the best
Logging console warnings : which messages are sent to the console, based on the 0-7 severity levels. Warnings would show only levels of 4 to 0. logging console debug will show 0-7 (default). Logging [ip address] : Sent to a syslog server of a set IP, by default, all messages except level 7 are sent. Allows you to see logs from multiple devices at once. Downside of needing the network to be operational to receive the logs.
Logging severity levels
0 is emergencies
1 alerts
2 critical
3 error
4 warnings
5 notifications
6 informational
7 is debugging (don’t use debug all, it can kill a device by leaving no CPU for taking commands)
Troubleshooting is the process of:
Problem Report -> Problem Diagnosis -> Problem Resolution
Responding to a problem report (sometimes in the form of a trouble ticket)
Diagnosing the underlying cause of the problem
Resolving the problem
The primary goal as a troubleshooter is
to become efficient which requires structured troubleshooting