Section 3: Network Operations Flashcards
What is the difference between physical and logical diagrams, and what are related documentation types?
Physical Diagrams: Show the physical setup (e.g., cables, racks).
Logical Diagrams: Represent data flow and logical connections (e.g., VLANs, subnets).
Related types:
Rack Diagrams: Equipment placement in racks.
Cable Maps: Physical connections between devices.
Network Diagrams:
Include:
* Layer 1: Physical layout of cables and ports.
* Layer 2: VLANs, switches, and MAC address mapping.
* Layer 3: IP addressing and routing between subnets.
What is included in an asset inventory?
Hardware: Devices like servers and routers.
Software: Applications and OS.
**Licensing: **Usage rights for software.
Warranty Support: Expiry dates and service coverage.
What are key tools for managing IP and service expectations?
IP Address Management (IPAM): Tracks and allocates IP addresses to avoid conflicts.
Service-Level Agreement (SLA): Defines expected service performance (e.g., uptime, response time).
What is a wireless survey/heat map, and why is it useful?
- Visual representation of Wi-Fi signal strength and coverage.
- Helps identify weak zones and optimize access point placement.
What are the stages of life-cycle management for IT equipment and software?
End-of-Life (EOL): No longer sold or updated.
End-of-Support (EOS): Vendor stops providing fixes or support.
Software Management: Includes patches, OS updates, and firmware upgrades.
Decommissioning: Safe removal and disposal of outdated equipment.
How does change management work?
- Use a formal request and approval process to evaluate, track, and implement changes.
- Prevents disruptions and ensures proper documentation.
What is involved in configuration management?
- Production Configuration: Current active setup.
- Backup Configuration: Stored copy for recovery.
- Baseline/Golden Configuration: Standardized settings used as a reference.
What is SNMP, and what are its key features?
SNMP (Simple Network Management Protocol): Used to monitor and manage network devices.
Key Features:
* Traps: Notifications sent from devices to alert on issues.
* MIB (Management Information Base): Database of device information.
* Community Strings: Keys for device access.
* Authentication: Ensures secure monitoring in SNMP v3. (Username and password) (password hashes)
Versions:
* v2c: Community-based, limited security.
* v3: Adds encryption and authentication for secure communication.
What are the methods of capturing and analyzing network data?
Flow Data: High-level traffic patterns and statistics; used for anomaly detection and usage analysis.
Packet Capture: Captures detailed packet-level traffic for diagnostics and security analysis.
Port Mirroring: Duplicates traffic from one port to another for analysis, often paired with packet capture.
How are baseline metrics and log aggregation used in monitoring?
Baseline Metrics:
* Establish normal performance levels for comparison.
* Enable anomaly alerting/notification when deviations occur.
Log Aggregation:
* Centralizes device logs for analysis.
* Tools include:
* Syslog Collector: Gathers and stores logs.
* SIEM (Security Information and Event Management): Analyzes logs for security and event correlation.
What is API integration, and how does it assist in monitoring?
- Stands for Application Programming Interface
- Enables external systems to interact with network devices.
- Automates data collection and control for efficient monitoring.
What are the key types of network discovery and their uses?
- Ad hoc Discovery: On-demand scans to identify devices and connections.
- Scheduled Discovery: Regular scans to maintain up-to-date network inventories.
What are the core types of monitoring in network management?
- Traffic Analysis: Examines usage patterns, bottlenecks, and anomalies.
- Performance Monitoring: Tracks metrics like latency and throughput to ensure service quality.
- Availability Monitoring: Ensures devices and services are operational to maintain uptime SLAs.
- Configuration Monitoring: Tracks and audits device settings to prevent unauthorized changes.
What is RPO?
Recovery Point Objective
* Maximum acceptable amount of data loss during an incident.
* Determines how often backups should be taken.
What is RTO?
Recovery Time Objective
- Maximum time allowed to restore systems after an outage.
- Defines the acceptable downtime.