Auditing the LAN with Network Discovery
|
|
|
- Cecil Banks
- 10 years ago
- Views:
Transcription
1 Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and Measurement. Auditing the LAN can be achieved by conducting a Network Discovery. The Network Discovery process learns which devices are attached to the network and provides valuable information such as Internet Protocol (IP) addresses, Media Access Controller (MAC) addresses, virtual LAN (VLAN) configuration, and device configuration information. Typical uses for Network Discovery include: identifying the types of devices that are attached to the network (routers, switches, workstations, hosts, printers, and others) assisting with on-site troubleshooting (for example, data center or remote office) by verifying that a new server or host is actually online, without the need for an enterprise Network Operations Center (NOC) system management tool verifying the devices that are attached to the network are supposed to be attached to the network (for example, detect wireless access ports or personal computers [PCs]) detecting device anomalies such as high switch port collisions and Frame Check Sequence (FCS) on site and without the need for an enterprise NOC system management tool identifying specific switch and router interfaces with high utilization before utilizing active taps or configuring mirror ports. WAN JDSU T-BERD/MTS-4000 with ESAM Figure 1: JDSU T-BERD /MTS-4000 (with ESAM) connected to a normal switch port Network Discovery does not require the special port monitoring access mode. As Figure 1 shows, the JDSU Enterprise Services Application Module (ESAM) can connect to standard office wall jacks or switch ports to conduct Network Discovery tests. Network Discovery relies on a sophisticated combination of passive and active techniques that allows the ESAM to accurately detect and identify hosts on and off of the local subnet. WEBSITE:
2 Application Note: Auditing the LAN with Network Discovery 2 Network Discovery Workflow This application note demonstrates use cases for LAN network discovery and provides examples using the JDSU ESAM for the T-BERD/MTS As Section 1 references, Network Discovery does not require special monitoring access and the ESAM connects just as any other host to normal office LAN ports, switch ports, and others. It is common to enter a data center or other central networking location to gain basic insight into the network, such as which subnet is present and are the expected switches and routers present. Figure 2 illustrates a basic network diagram of a small and medium business (SMB) office location. Firewall Internet Router Router Mail Server Web Server Layer 2 Switch Layer 2 Switch Wireless Access Point Printers PDA Cell phone Laptops Phones Figure 2: Typical SMB Office Network For a Network Discovery audit, technicians can connect the JDSU ESAM to a spare office LAN wall jack or spare interface on one of the switches. Figure 3 shows the summary results screen received after the ESAM conducts network discovery.
3 Application Note: Auditing the LAN with Network Discovery 3 Figure 3: Network Discovery Result The devices are logically layered based on the Cisco network reference model: Access, Distribution, and Core. Although this reference model is Cisco-based, the IT community widely uses and understands it. The following subsections describe a recommended workflow after obtaining the network discovery results but are not intended to imply that this workflow is static. Depending upon the diagnostic question that must be answered, users will likely navigate directly to a problem device or host. Basic Interpretation of Network Discovery Results The first question to answer after a network discovery might be: are these the devices that should be on the network? Based upon the discovery results shown in Figure 3, these were the devices detected: 9 servers 92 hosts (or workstations) 5 printers 2 switches 4 routers. Scanning the workstations, it is easy to determine the overall summary of connected hosts by clicking on the Hosts icon as shown in Figure 4. This table summarizes Workstation IP addresses, Windows host names, and other information.
4 Application Note: Auditing the LAN with Network Discovery 4 Figure 4: Drilling into Hosts from the Discovery Summary Screen As Section 1 mentioned, the network discovery process is sometimes used to determine if devices are present on the network that should not be. Based on this case, the network manager realizes that the number of routers should have equaled 3 and needs to investigate the presence of the fourth router. Clicking the Router icon on the ESAM user interface provides a list of Routers along with their source MAC addresses as Figure 5 shows. Figure 5: Drilling into Routers from the Discovery Summary Screen The detailed Routers table shows three Cisco devices (expected) and an unexpected Cisco-Linksys device. The unauthorized Linksys device is a wireless access point that is installed on an enterprise network, which is a fairly common occurrence. All network devices have a 6-byte Ethernet MAC address in the form of 00:22:BE:EA:FC:00. The first three bytes are referred to as the Organization Unique Identifier (OUI) that identifies the company that manufactured the network device. In this case, 00:22:BEs and the 00:00:0C OUIs belong to Cisco Systems, but the 00:1D:7E OUI belongs to Cisco-Linksys, which is the wireless company within Cisco. The IEEE maintains a list of OUIs and their associated companies. The link to look up OUIs is
5 Application Note: Auditing the LAN with Network Discovery 5 Detailed Interpretation of Specific Devices Beyond the basic network device survey, it is important to know which links are consuming excessive bandwidth or which links exhibit excessive errors, such as FCS errors, collisions, and other errors. Obtaining this detailed device information requires enabling Simple Network Management Protocol (SNMP) access on the device and allowing the ESAM access to the SNMP community string (a text string that acts as a password). Figure 6 shows the examination of an SNMP enabled edge switch. Figure 6: Interface Summary of an SNMP Enabled Switch SNMP is widely used to manage LAN networks. Devices that support SNMP store various configuration and performance information in a Managed Information Base (MIB) that can be queried via an SNMP client or management console. The SNMP client can query an SNMP agent (device) to obtain MIB information such as vendor name, software version, hardware specifications, and performance statistics such as CPU utilization, network port errors, and utilization to name a few. Access to the SNMP functionality is controlled via an SNMP community string that is used to authenticate messages sent between the SNMP manager and the SNMP agent. Most IT administrators have access to the SNMP community read string, which permits SNMP management tools to poll the SNMP agents and retrieve the SNMP MIB information. The JDSU ESAM supports SNMP version v1, v2c, or v3.
6 Application Note: Auditing the LAN with Network Discovery 6 The interface summary clearly shows the number of interfaces for the switch and the operational status as well up/down. For even more detailed information, drill into a specific port as the Interface Details view in Figure 7. Figure 7: Interface Details View of an SNMP Enabled Switch In Figure 7, the reported SNMP port 18 is drilled into which corresponds to switch port FastEthernet 0/6. This detailed information of switch port FastEthernet 0/6 provides the following interface information: VLAN ID = 1 MTU = 1500 Collision count = 3171 FCS Errors = 0 From the information provided, the network troubleshooter may discover that the port is associated with the incorrect VLAN, the maximum transmission unit (MTU) size is not as expected, or may want to investigate the cause for the high collision count on this port. Figure 8 shows the Frame Stats view that provides more detailed interface usage statistics. It shows the total number of ingress and egress octets as well as discards and errored octets, which also provides valuable insight into possible congestion (discards) and FCS-error frames. Figure 8: Frame Stats View of an SNMP Enabled Switch
7 Application Note: Auditing the LAN with Network Discovery 7 Conclusion Gaining visibility into the LAN is an important first step in many LAN troubleshooting exercises. It is important to verify the presence of devices attached to the networks as well as unauthorized devices that should not be there. Network discovery accomplishes this by quickly establishing the baseline what is attached to the network and then determining what the attached devices are doing on the network. The JDSU ESAM for the T-BERD/MTS-4000 provides a workflow-based interface that walks users through the best practices approach toward solving a multitude of network problems. Figure 9 illustrates the JDSU ESAM interface and Figure 10 shows the workflow-based user interface. Figure 9: JDSU T-BERD/MTS-4000 platform with the ESAM Figure 10: Workflow Based User Interface of the ESAM
8 Application Note: Auditing the LAN with Network Discovery 8 The JDSU ESAM for the T-BERD/MTS-4000 provides comprehensive LAN testing capability with these features: Layer 1-7 protocol capture and expert analysis network connectivity network discovery a full range of physical media tests a workflow-based user interface a modular platform with many options: VoIP phone emulation optical power meter/visual fault locator fiber inspection probe with automated pass/fail Wireless fidelity (WiFi) testing OTDR modules Through its workflow-based intuitive user interface, the ESAM provides physical media tests including speed-certification of electrical Ethernet cabling, network connectivity tests, discovery, wirespeed deep-packet statistics, and wirespeed protocol capture and expert analysis using unique, in-depth JDSU J-Mentor capabilities. In addition, the ESAM is part of the modular JDSU T-BERD/MTS-4000 platform allowing additional options that include voice over IP (VoIP) emulation, WiFi testing, IP video testing, optical power meters (OPMs), visual fault locators (VFLs), digital fiber inspection probes, and Optical time domain reflectometers (OTDRs). Test connectivity can be obtained either electrically via a 10/100/1000 RJ45 Ethernet jack or via an SFP for optical Ethernet. Test & Measurement Regional Sales NORTH AMERICA TEL: FAX: LATIN AMERICA TEL: FAX: ASIA PACIFIC TEL: FAX: EMEA TEL: FAX: WEBSITE: Product specifications and descriptions in this document subject to change without notice JDS Uniphase Corporation AUDITINGLAN.an.tfs.tm.ae July 2010
Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis
Application Note Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU
Troubleshooting LANs with Network Statistics Analysis
Application Note Troubleshooting LANs with Network Statistics Analysis Introduction This application note is one in a series of local area network (LAN) troubleshooting papers from JDSU Communications
T-BERD /MTS-4000 Multiple Services Test Platform Enterprise Services Application Module (ESAM)
COMMUNICATIONS TEST & MEASUREMENT SOLUTIONS T-BERD /MTS-4000 Multiple Services Test Platform Enterprise Services Application Module (ESAM) Key Features Provides Layer 1-7 protocol capture and expert analysis
T-BERD / MTS-4000 Multiple Services Test Platform. Enterprise Solutions
T-BERD / MTS-4000 Multiple Services Test Platform Enterprise Solutions The Modular Handheld Test Platform for Enterprises Today s IT networks are more complex than ever with voice over IP, IP security
Optical Network Management System. Remote Testing, Network Monitoring, and Service Provisioning Solution for High-Quality Network Performance
Optical Network Management System Remote Testing, Network Monitoring, and Service Provisioning Solution for High-Quality Network Performance JDSU Enabling Broadband and Optical Innovation Improving the
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
SNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
ONMSi: Optical Network Monitoring System
ONMSi: Optical Network Monitoring System Fiber network visibility that scales for both PON and point-to-point networks Drastically reduce network downtime Improve network reliability and SLA management
Ten top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
How To Use Onmsi For Fiber Optic Network Monitoring System
ONMSi: Optical Network Monitoring System Fiber network visibility that scales for both PON and point-to-point networks Drastically reduce network downtime Improve network reliability and SLA management
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
IntraVUE Plug Scanner/Recorder Installation and Start-Up
IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details
How Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
RFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do
RFC 6349 Testing with TrueSpeed from JDSU Experience Your Network as Your Customers Do RFC 6349 is the new transmission control protocol (TCP) throughput test methodology that JDSU co-authored along with
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
JDSU Ethernet Testing
Key Benefits of Probe/Instrument Integration Unique Test Capabilities The following sections detail how various test applications benefit from the interoperability of QT-600 probes and T-BERD/MTS instruments.
Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A
Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A By Barry Constantine Introduction As network complexity grows, network provider technicians require the ability to troubleshoot
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
CNE Network Assessment
+ CNE Network Assessment Overview The purpose of the network assessment is to measure, analyze, and document network functionality and performance. Areas of assessment include: Local Area Network (wired
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
A Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application
HARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
SolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
JDSU HST-3000 RFC-2544 Ethernet Testing Guide
Page 1 of 24 JDSU HST-3000 RFC-2544 Ethernet Testing Guide Version 1.2 May 15, 2013 Page 2 of 24 Table of Contents Scope... 2 Revision History... 2 1. Overview... 3 1.1 Hardware Description... 3 2. RFC-2544
Setting up IP address distribution in a LAN
Setting up IP address distribution in a LAN Swisscom (Switzerland) Ltd Document ID Setting up IP address distribution in a LAN Version 1.5 Status Final version Date of issue 13.03.2015 2 Contents Swisscom
User Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Information Technology Mission Statement. Information Technology Goals
Ionia County Information Technology Strategic Plan 2008-2013 Table of Contents Information Technology Mission 3 Information Technology Goals 3 Current Network Overview 4-5 Information Technology Focus
Easy Smart Configuration Utility
Easy Smart Configuration Utility REV1.1.0 1910010977 CONTENTS Chapter 1 About this Guide...1 1.1 Intended Readers... 1 1.2 Conventions... 1 1.3 Overview of This Guide... 1 Chapter 2 Getting Started...4
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
JDSU Signaling Analyzer Solution for Femtocell Monitoring
COMMUNICATIONS TEST & MEASUREMENT SOLUTIONS JDSU Signaling Analyzer Solution for Femtocell Monitoring Key Features Interpret, correlate and analyze protocol messages on both sides of the femtocell gateway
JDSU s MTS/T-BERD platforms: Fully automated bi-directional OTDR data acquisition and data analysis test instruments
Application Note JDSU s MTS/T-BERD platforms: Fully automated bi-directional OTDR data acquisition and data analysis test instruments From the beginning, JDSU has understood the need for developing a test
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Quick Installation Guide For Mac users
Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
1. Hardware Installation
4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet
SOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
NetDiverse, LLC Managed Internal Broadband Service (MIBS) Service Level Agreement
NetDiverse, LLC Managed Internal Broadband Service (MIBS) Service Level Agreement Service Description: Managed Internal Broadband Service ( MIB Service, MIBS, Managed WiFi, Managed WiFi/LAN, Network as
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Remote Network Monitoring Software for Managed Services Providers
http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network
Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
Introduction to Junos Space Network Director
Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.
This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D
Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
White Paper: Troubleshooting Remote Site Networks Best Practices
White Paper: Troubleshooting Remote Site Networks Best Practices Management and remote site employees expect the same level of network service as the headquarters site. However, when IT staff are faced
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
Quick Installation Guide-For MAC users
Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
