How To Understand and Configure Your Network for IntraVUE

Size: px
Start display at page:

Download "How To Understand and Configure Your Network for IntraVUE"

Transcription

1 How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of the existing network. This document is targeted at a technical person who is somewhat familiar with network terms, running programs from a DOS prompt, and who must install IntraVUE. IntraVUE is designed to monitor and collect diagnostic data for Local Area Networks (LAN) - layer 2 switches and their associated edge or end devices. IntraVUE was not designed to provide layer 3 or Wide Area Network (WAN) diagnostics but will work with them to get data from layer 2 switches and edge devices.. To properly configure IntraVUE you must understand how the network addresses of the switches relate to the edge devices and you must have the SNMP community of any managed switches/routers. This document will progress through the following steps. Understanding the terms. Please spend some time reviewing the terms as their definitions include how they are relevant to IntraVUE and your network. IntraVUE scanning requirements. Various types of networks from simple to very complex. Tools that are available to understand your network before using IntraVUE. Using IntraVUE in conjunction with tools to understand your network and properly configure IntraVUE. Configuring IntraVUE for long term monitoring and reporting. Terms Access Control List (ACL) - A set of rules configured in layer2 and 3 switches that limit what traffic can move from one interface to another or that can be communicate with the switch. ACL s are optional. If enabled, the IP of any device needed to talk to the switch must have a rule that allows that IP. Cisco uses ACL s, other switch vendors have Management Station Lists or similarly named functions that similarly limit who can talk to a switch/router. ARP - Address Resolution Protocol. ARP is the method used to find hardware when only the IP address is known. An ARP message is a broadcast message that requests receipts to tell the MAC address for the provided IP address. Typically a device only knows its own MAC and stores the MACs of devices it talks to. Some devices, like routers, store MAC addresses in large tables and provide the MAC address to other devices. Devices keep a table of MAC addresses for IP addresses known as ARP Caches. Broadcast - communications traffic that is sent to all devices in a subnet. A layer 2 switch will typically send broadcast traffic to all ports of the switch. See VLAN which is a technology invented to limit broadcast traffic to certain ports of a layer 2 switch. Community - The equivalent of a password for SNMP communications. It is case sensitive. There are read-only and read-write types. IntraVUE only uses read-only. Firewall - A special purpose router with additional rules to prevent traffic from moving between subnets, especially inside versus outside an area. 1

2 Terms (cont d) Gateway - The router any traffic will be sent to if the destination IP address is not local (in the same subnet) as the sender. If that gateway can not route the traffic, it sends the traffic to its gateway, and so on until it reaches the destination. IP Address - The (I)nternet (P)rotocol Address is the logical address of a device within a computer network. It is internally a 32-bit number, typically expresses as 4 sets (octets) of numbers between 0 and 255, separated by periods, like Routers route traffic from one subnet to another based on IP address. Layer 2 Switch - moves Ethernet packets based on the MAC address of the recipient. Connections are made using ports. If a match on a port is found the packet is sent on that port only. Layer 3 Switch - moves Ethernet packets based on IP address. The IP address is compared to the interfaces IP addresses and subnet masks. If a match is found the packet is forwarded to that interface. If not it is sent to the routers gateway. Local Devices - All other devices that are in the same subnet (based on the subnet mask and ip address) as a device. Communication to these devices is sent directly to the devices without being forwarded to the gateway, even if there is no response. MAC Address - The unique physical address of a network adapter or network interface. It is usually expressed as 6 sets of 2 hexadecimal numbers. The first 3 sets typically identify the vendor of the adapter or piece of equipment having an adapter. Switches move data by knowing what port a mac address is on. PING - A tool used to test if a particular host is reachable using an IP address. Pings use ICMP, echo request, protocol. If the sending device does not have a MAC address for the IP address in its ARP Cache, an ARP (broadcast) request will be issued before the ping. Remote Devices - All devices that are in a different subnet (based on the subnet mask and ip address) than the reference device. Communication to these devices is forwarded to the gateway if there is one, and nowhere if there is not a gateway. Router - A router is the same as a layer 3 Switch. Typical routers are not configured to do layer 2 switching, but may. Routers maintain very large tables of MAC addresses for IP addresses as a result of moving/routing traffic between subnets. Subnet - A set of Ethernet devices that share a common routing prefix, called a subnet mask. Subnets break a network into smaller parts and are connected at the edges by/through routers. Devices in the same subnet are Local to each other and traffic does not go thru a router. To determine what is local to a particular IP Address, the IP Address is mathematically combined with the subnet mask to compute a range of IP Addresses that is within that subnet. It is VERY IMPORTANT that all devices in a subnet have the same subnet mask and that subnet mask agree with their gateway. VLAN - A (V)irtual LAN is a group of devices configured to communicate as if they were in the same broadcast domain. It allows edge/end devices to be grouped together even if not connected to the same switch. VLANs make it possible to create multiple layer 3 networks on the same layer 2 switch. Broadcast traffic from a VLAN d port of a layer 2 switch will ONLY go to other ports in the same VLAN, NOT to all ports of the switch as would be done without a VLAN. IntraVUE Scanning Requirements The host computer must be able to PING all the devices to be scanned. The devices storing the mac addresses of the devices must be in the scan range and must be configured to respond to SNMP from the host. This requires at least the SNMP read only community and may require additional permissions such as an entry in an Access Control List. The switches must provide timely responses to SNMP queries. Typical response times are less than 20 milliseconds but some switches are known to take 20 seconds (20000 millisends). IntraVUE will tolerate a response as slow as 1000 milliseconds (1 second). Switch responses must conform to SNMP standards and managed switches must respond to the Bridge Mib, RFC 1493 or one of its successors. 2

3 Types of Networks Networks are described in increasing order of complexity. 1. The simplest network is one in which all the edge devices and all the switches are in the same subnet. To scan this type network you only have to enter the full scan range and proper SNMP communities. If this is your network, you do not have to read the rest of this document. IntraVUE LITE was designed for this type network when the subnet mask is (Class C). In figure 1 below, each blue cloud represents a different subnet but you only need to scan devices in the big cloud, Plant Private Network. Figure 1 2. Another simple network is one in which all the edge devices are in one subnet and all the infrastructure switches are in another subnet. The IntraVUE host computer should be in the subnet of the edge devices and should be the top parent of the IntraVUE network. (In the images below imagine only ONE LAN on the right side.) In figure 2 the IntraVUE host is on the left. All the LOCAL edge devices communicate without going thru a router, but the IntraVUE host must go through a router in order to get ping and SNMP data from the switches. The router (which knows the macs of the switches) must be in the scan range of the same IntraVUE network and respond to SNMP. Figure 2 3

4 In some cases, plant personnel are not allowed to know the SNMP community of the central router. In figure 3, a NIC card has been added for each formerly remote LAN to solve this problem. Now those LANs have local addresses on the host computer and communication does NOT go through the router. The MAC addresses of all devices are in the host computers local ARP cache. Figure 3 3. Similar to network #2 this network has devices in many different subnets, not just 2 (as shown in figures 2 and 3 with all the LANs on the right). For example, one router with subnets for office, building 1, building 2, and switches. You can configure IntraVUE to have all devices in one big IntraVUE network or have a separate IntraVUE network for each LAN. If you do the later, the switches that are used in each LAN must also be in each IntraVUE network. 4. Network #3 is made more complex by configuring the layer 2 switches in the network to have VLANs. This is one of the most common plant floor network architectures. In the figure 4 there are 5 VLANs. The layer 2 switches are in the center circle, Switch VLAN. Even though they are connected by layer 2 switches, devices in one VLAN can not communicate with devices in another VLAN without going through the router. Figure 4 4

5 For IntraVUE to provide the most diagnostics, each VLAN of edge devices should be a separate IntraVUE network in the System Configure s Scanner Tab. Each one of the remote networks must also include the interface (IP address) of the router leading to the edge devices (as determined by TRACERT) as the top parent. In figure 4, the IntraVUe network for VLAN 1 needs to have the local computer as top parent, all the local ip addresses, the router, and the switch ips. VLANs 2, 3, and 4 each need to have the ip of the router as top parent, the ips of the VLAN, the router, and switch ips all in the scan ranges of that IntraVUE network. (The switch ips will be in all 4 IntraVUE networks.) VLANs are configured in a layer 2 switch by assigning VLAN numbers to ports of the switch. Packets arriving on a port of a switch having a VLAN(s) configured will only be sent to other ports having the same VLAN(s) configured. This limits broadcast traffic to only the ports with the same VLAN number as the originator. Figure 5 illustrates this using different colored lines for each VLAN. If the destination MAC is on a port in another VLAN, the message will be sent to the gateway and then back to the switch on the port having the same VLAN number as the destination. If a port of a switch is not configured for a VLAN, it acts as if all VLANs are configured for that port. All traffic for a device in a different VLAN (differnt colored line) must go to the router to be redirected to the switch. Figure 5 5. Implementing Rapid Spanning Tree protocol (RSTP) in the switches creates a physical ring of communication where the last switch in a series of connected switches is connected to the first switch, thus forming a ring. The last link is never active unless there is a break between any other switches in the ring. At that time, communication will start a new path and all switches will continue to be able to communicate, but using a different path. Nothing special needs to be done to handle this situation. IntraVUE will discover the new path and redraw the topology to reflect the change in the ring. 5

6 6. Hot Standby Redundant protocol (HSRP) creates a connection between a pair of routers. In this scenario 2 routers are configured so that either one can act for the other in the event the other router fails. The routers share a virtual IP address and a virtual mac address as well as having their own ip and mac. In some cases, one router will respond to the virtual IP/mac, but the other can assume in within milliseconds if necessary. In many cases, each router handles some VLANs. In figure 6, router A will handle the even VLANs and router B will handle the odd VLANs. Other devices are configured to use the virtual IP address of the routers. Additionally each upper level layer 2 switch is connected to both routers, so that if a router failure happens there is a connection to the other router using the same virtual IP address. Since the routers are connected and the upper switches are connected to each router, an alternate path is created and the mac of the routers can be seen on two possible ports of the upper level switches. This arrangement is shown in figure 6. Figure 6 Depending on different circumstances, such a VLANs, each switch above reports may report the virtual mac on either of 2 ports depending on which VLAN last communicated with a router. Additionally there is a path where the switch can see the second router through the first router. To handle this situation, we normally configure IntraVUE to EXCLUDE the ip addresses of the upper level switches. Typically no edge devices are connected to these switches and IntraVUE is a tool to manage the communication to the edge devices. Additionally we configure the ports of the lower switches going to the upper switches to be trunked. This is done in a configuration file and is explained in detail in IntraVUE help, under Handling Trunking. 7. Within any network, multiple connections between layer 2 switches may exist. There are two common reasons for this. To increase bandwidth between two switches, 2 (or more) ports of one switch are directly connected to 2 (or more) ports of another switch. The switches than pick the best port to use at any time. The upper switch will report a mac address on port A, then B, then A, and so on. The traffic that arrives at a switch having several VLANS may take different paths through sets of switches. This will cause the router and possible some of the upper level switches to be seen on different ports. The IntraVUE scanner must be configured to treat ports that can lead the same mac address as trunked ports. This is done in a configuration file and is explained in detail in IntraVUE help, under Handling Trunking. 6

7 Tools to Get Information The following tools can be used to get more information about your network. The tools should typically be run on the computer which is hosting IntraVUE. PING - a DOS command line tool. Using PING tells whether a device can be reached from the host computer. Figure 7 TRACERT - a DOS command similar to PING, but each time the request passes through a router, the router is listed. This is an important tool because it will show you the last router in the path to a device. The last entry is the target device. The last router is the second to last entry in the list and is the router which will know the MAC addresses of the devices in the target subnet. In figure 7, the router must be in the scan range in order to get the MAC of the edge device. Figure 8 7

8 SWITCHPROBE - This is a java application provided by IntraVUE. It is available on the host PC by selecting START / Programs / IntraVUE / Tools / Use Switchprobe. Figure 9 Switchprobe is useful to verify you have the proper SNMP community set for a switch because it provides feedback in about 5 seconds. It tests a combination of IP address and SNMP community and provides the results that the internal scanner will see. Figure 10 Note that you may have the right community and IP address and this tool will still fail if the switch or router being queried has implemented Access Control Lists (ACL), and the requesting IP address (the IntraVUE host) is not in the list. Double check the spelling of the community you used, make sure SNMP is enabled in the switch, make sure you can ping the switch, and check the community with network support personnel. 8

9 Figure 11 Switchprobe is also useful for diagnosing why a switch does not respond as expected. TrunkingFiles.zip is a collection of programs that finds duplicate paths between switches for networks that are entirely Cisco. If you need these programs IntraVUE tech support will assist you in their use. Switches - The switches can provide configuration information concerning their SNMP community, supported SNMP version, hosts that can get data, and other data using either telnet and a command line interface or, sometimes, a web interface to the switch. 9

10 Initial Scanning and Discovery 1. The first step is to select a good computer in which to install IntraVUE. Windows XP and Windows Server 200X are preferred over Windows Vista. Is it in the same subnet as the edge devices. It should be for best results. (Review the big blue cloud in figure 1) Is it directly connected to a managed switch and is that switch also connected to the devices in the scan range. If any devices are in a different subnet, you should be able to PING them and do a TRACERT to find the last router leading to the devices. Install the IntraVUE software. 2. If the layer 2 switches are in a different subnet from the host computer complete a scan of only the layer 2 switches and verify their arrangement. Clear the database. Add one network in the System Config Scanner tab. Select as top parent the interface (IP address) of the router which was in the TRACERT to one of the switches. Add the full scan range of the switches. Figure Make sure the default SNMP community in the Scanner tab is set to the community of the switches. 6. Set the scanner speed to either Ultra or Fast 7. Apply and Close the System Configuration dialog. 8. There should be a hierarchy of switches showing in the IntraVUE browser. All the switches should have a green outline. There should be port numbers in the hover text of lines between switches. Using the IntraVUE export function, you can create a document that lists the switches by IP and the switches connected to them by port number. Save the database, perhaps as Switches_Only. This will serve as a good starting point for future scans. Figure 13 10

11 Complete a scan on one subnet/vlan of edge devices and the switches. Restore the Switches_Only database if it is not the current database. Go into system Configure s Scanner tab and Edit the switch network. Add the scan range of the edge devices to the same network as the switches. Say OK to the scan range, Ok to the Network, and Apply and Close System Config. Wait for all the devices to be discovered, move out of unresolved, and move to a port of a switch. Save this database with an appropriate name for the switches and devices you just scanned. Investigate any auto-inserted nodes. Verify they are ALL unmanaged switches, hubs, or switches not in the scan range. If a managed switch should be at the location of the auto inserted node, is the switch in the scan range? If the IP of the switch appears under the auto-inserted node and it does not have a green outline, the SNMP community is probably not configured correctly. Contact IntraVUE tech support for questions. Review the System Event Log. There should not be any reports of devices continuously moving between two locations. If there are, contact IntraVUE Tech Support to discuss possible trunking situations. There should not be any messages from a switch reporting a mac address was on one port and is now on another. Enable Filters in the event log and uncheck All Events and connections. You should not see any repeating moves. Then check All Events and look for things anything unusual to your understanding of the network. Figure 16 11

12 Before continuing, if you have Cisco VLANs you may configure IntraVUE to be more efficient by limiting the VLANs being monitored to only the ones being scanned. See the Help file on ivserver.properties and set force.cisco.vlans to only those being scanned. In figure 16, only VLANs 1, 501, and 502 will be queried. Separately scan any other subnets or VLANs and review them - ONE AT A TIME. This will be time consuming but if the goal is no surprises it is recommended. Repeat the following steps for each - only the edge devices of one vlan, plus the switches, plus the appropriate top parent. Restore the Switches_Only saved backup file. Use the Scanner tab to add the devices for this vlan or subnet Check the results in the same way as the first scan. Long Term Monitoring with IntraVUE Typically, you will want one IntraVUE network for each VLAN. 1. Clear the database. 2. If you are scanning devices local to the IntraVUE host computer, add a network and make the IntraVUE host the top parent. Add the scan range of the local devices. Add the scan range of switches used by the local devices. 3. For EACH other VLAN add an additional IntraVUE network. The top parent of each will be the interface of the router (as determined by TRACERT) for that VLAN. 4. As a result, for each network defined in the System Configuration Scanner Tab, there will be a line coming out of the center Scanner node. Figure 17 Review the System Event log for devices moving that are not expected to move. Most of these issues should have been dealt with as part of discovery, but it is possible something might not surface until you scan all VLANs at once. If this happens it is probably wise to call tech support and a copy of your database. IntraVUE Technical Support or help@intravue.net 12

IntraVUE Plug Scanner/Recorder Installation and Start-Up

IntraVUE Plug Scanner/Recorder Installation and Start-Up IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

Packet Tracer - Subnetting Scenario 1 (Instructor Version) (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold

Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold Contents CHAPTER 1 WhatsConnected Overview Welcome to WhatsConnected... 1

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

NXT Controller Manual IP Assignment in WAN Environments Application Note

NXT Controller Manual IP Assignment in WAN Environments Application Note It is difficult to perform NXT controller IP address assignment and auto-configuration when controllers are on different subnets from the local PC (the PC from which the Doors.NET client is run). This

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Lab - Using IOS CLI with Switch MAC Address Tables

Lab - Using IOS CLI with Switch MAC Address Tables Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12

More information

Chapter 7 Troubleshooting

Chapter 7 Troubleshooting Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and

More information

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1 NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs

Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs How To Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs Introduction In a large network where internal users cannot be trusted, it is nearly impossible to stop a host from

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Device Interface IP Address Subnet Mask Default Gateway

Device Interface IP Address Subnet Mask Default Gateway Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

10.3.1.9 Lab - Configure a Windows Vista Firewall

10.3.1.9 Lab - Configure a Windows Vista Firewall 5.0 10.3.1.9 Lab - Configure a Windows Vista Firewall Print and complete this lab. In this lab, you will explore the Windows Vista Firewall and configure some advanced settings. Recommended Equipment Step

More information

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation OM2012 Network Monitoring Phil Bracher Sr. Premier Field Engineer Microsoft Corporation Continuous Availability of the Management Group: Resource Pooling Config service Scale and Federation Data Access

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

SonicOS Enhanced 5.7.0.2 Release Notes

SonicOS Enhanced 5.7.0.2 Release Notes SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies: Using Discovery 1/3 Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Brocade to Cisco Comparisons

Brocade to Cisco Comparisons 1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B Management Software AT-S84 User s Guide For the AT-9000/24 Layer 2 Gigabit Ethernet Switch Version 1.1 613-000368 Rev. B Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication

More information

Reference to common tasks

Reference to common tasks APPENDIXA This section provides how-to information for common tasks that you need to know how to do before you can effectively work with the vcom Command Center. Creating and editing domains Working with

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,

More information

Internet Basics Thursday, November 20, 2008

Internet Basics Thursday, November 20, 2008 Internet Basics Thursday, November 20, 2008 Welcome to Internet Basics, the first section of the Basic Networking course of the online Allworx Reseller technical training. This course provides general

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

RESILIENT NETWORK DESIGN

RESILIENT NETWORK DESIGN Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus

More information

High Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

High Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks High Availability Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

LiveAction Application Note

LiveAction Application Note LiveAction Application Note Layer 2 Monitoring and Host Location Using LiveAction to monitor and identify inter-/intra-switch VLAN configurations, and locating workstations within the network infrastructure.

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Network Vision Software. Database Audit and Analysis for. Network Vision Inc. Newburyport, MA

Network Vision Software. Database Audit and Analysis for. Network Vision Inc. Newburyport, MA Network Vision Software Database Audit and Analysis for Network Vision Inc. Newburyport, MA Maintenance Technician Report ivbackup_2013_0612_1009_915.pdf This is a sample Diagnostic report from a network

More information

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Prestige 650R-31/33 Read Me First

Prestige 650R-31/33 Read Me First Prestige 650R-31/33 Read Me First Prestige Rear Panel Connections PORT DSL CONSOLE LAN 10/100M POWER Connect to a telephone jack using a telephone wire. CONNECTION Connect to a serial port (COM port) on

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Workstation ARP. Objective. Background / Preparation

Workstation ARP. Objective. Background / Preparation Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.

More information