Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.



Similar documents
Planning Maintenance for Complex Networks

Chapter 1 Introduction to Network Maintenance Objectives

Lab Configure Syslog on AP

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Configuring System Message Logging

Domain Name System Server Round-Robin Functionality for the Cisco AS5800

One-Step Lockdown with Cisco SDM

Backing Up and Restoring Data

Managing Cisco ISE Backup and Restore Operations

Document ID: Introduction

Lab Configure Basic AP Security through IOS CLI

Configuring System Message Logging

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse

Lab Configuring Syslog and NTP (Instructor Version)

Managing the System Event Log

Administering Cisco ISE

Lab 5.5 Configuring Logging

Managing the System Event Log

Enhanced Password Security - Phase I

HIPAA Compliance Use Case

Managing the System Event Log

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Enhanced Password Security - Phase I

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Transferring Files Using HTTP or HTTPS

3.1 Connecting to a Router and Basic Configuration

About Network Data Collector

Cisco ISE Command-Line Interface

Configuring System Message Logging

Lab 5.3.9b Managing Router Configuration Files Using TFTP

Configure Cisco Emergency Responder Disaster Recovery System

Managing Software and Configurations

Cisco ASA. Administrators

Enabling Management Protocols: NTP, SNMP, and Syslog

CLI Commands and Disaster Recovery System

Configuring Basic Settings

IM and Presence Disaster Recovery System

File Transfers. Contents

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Configuring the Cisco Secure PIX Firewall with a Single Intern

Introduction to the Junos Operating System

Lab 3.3 Configuring QoS with SDM

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Cisco Unified CM Disaster Recovery System

Connecting to the Firewall Services Module and Managing the Configuration

Enabling Remote Access to the ACE

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

System Message Logging

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

Release Notes for Dominion SX Firmware 3.1.6

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example


Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1)

Cisco Unified Communications Manager 7.x/8.x: Troubleshoot Backup Issue

Encrypted Preshared Key

Consolidated Packages and SubPackages Management

Simple MPLS network topology for Dynamips/Olive

Cisco Routers and Switches

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Monitoring the Firewall Services Module

Configuring SSH and Telnet

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

EMC Data Domain Management Center

Configuring a Leased Line

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

Image Verification. Finding Feature Information. Restrictions for Image Verification

Cisco Prime Collaboration Deployment Administration Guide, Release 10.5(1)

Configuring Logging. Information About Logging CHAPTER

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Configurazione Rete VoIP

Logging in Cisco IOS. The minimum you should know

Installing, Uninstalling, and Upgrading Service Monitor

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Quick Note 038. Upgrade Software options and/or VPN Licenses on a Digi Transport router.

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: Issue Date: 2 February 2015 Document Part Number: , Rev A.

Encrypted Preshared Key

LifeSize Control Installation Guide

CiscoWorks Resource Manager Essentials 4.3

Savvius Insight Initial Configuration

Center for Internet Security Gold Standard Benchmark for Cisco IOS

Backup and Recovery Procedures

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats

Managing the System Event Log

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Configuring the Firewall Management Interface

- The PIX OS Command-Line Interface -

CiscoWorks Resource Manager Essentials 4.1

RSA Security Analytics

DPS Telecom Your Partners in Network Alarm Management

NAM CLI Commands: - logout

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

Gigabyte Content Management System Console User s Guide. Version: 0.1

Technical Overview CM-16 Climate Monitor. Get yours direct at:

Configure Backup Server for Cisco Unified Communications Manager

Transcription:

: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1

Objectives Evaluate commonly-practiced models and methodologies for network maintenance Identify the processes and procedures that are a fundamental part of any network maintenance methodology Identify, evaluate and select tools, applications and resources to support network maintenance processes 2

Maintenance Models and Methodologies A network engineer s job description can include tasks related to: Device installation and maintenance Failure response Network performance Business procedures Security 3

Benefits of Structured Maintenance over Interrupt-driven Maintenance Proactive vs. reactive Reduced network downtime More cost effective Better alignment with business objectives Improved network security 4

Maintenance Models and Organizations IT Infrastructure Library (ITIL) ISO FCAPS Fault management Configuration management Accounting i management Performance Management Security y Management ITU-T - Telecommunications Management Network (TMN) Cisco Lifecycle Services Phases PPDIOO (Prepare, Plan, Design, Implement, Operate, and Optimize) 5

The Configuration Management element of the FCAPS model 6

Network Maintenance Processes and Procedures A network maintenance plan includes procedures for the following tasks: Accommodating Adds, Moves, and Changes Installation and configuration of new devices Replacement of failed devices Backup of device configurations and software Troubleshooting link and device failures Software upgrading or patching Network monitoring Performance measurement and capacity planning Writing and updating documentation 7

Network Maintenance Processes and Procedures Network maintenance planning includes: Scheduling maintenance Formalizing change control procedures Establishing network documentation procedures Establishing effective communication Defining i templates/procedures/conventions / Planning for disaster recovery 8

Network Maintenance Tools, Applications, and Resources Console SSH Telnet TFTP FTP SCP HTTP(S) CLI mgmt Backups GUI mgmt HTTP HTTPS Tl Telnet Syslog NTP SSH Time Logging 9

NTP Example (Selected output from the running config) service timestamps debug datetime msec localtime show-timezone service timestamps log datetime localtime show-timezone! clock timezone PST -8 clock summer-time PDT recurring 2 Sun Mar 2:00 1 Sun Nov 2:00! ntp server 10.1.220.3 10

Cisco Configuration and Documentation Tools Dynamic Configuration Tool Aids in creating hardware configurations Verifies compatibility of hardware and software selected Produces a Bill of Materials (BoM) with part numbers Cisco Feature Navigator Quickly finds Cisco IOS Software release for required features SNMP Object Navigator Translates SNMP Object Identifiers (OID) into object names Allows download of SNMP MIB files Verify supported MIBs for a Cisco IOS Software version Cisco Power Calculator l Calculates power supply requirements a PoE hardware configuration Requires CCO login 11

Logging Services Logging severity levels on Cisco devices: (0) Emergencies (1) Alerts (2) Critical (3) Errors (4) Warnings (5) Notifications (6) Informational (7) Debugging Enabling logging for a lower level (from importance point of view) will enable logging for all the above levels. 12

Logging to a Server! logging buffered 16348! logging console warnings! logging 10.1.152.1! Messages are logged to a circular log buffer in RAM that is limited to 16384 Bytes. Logging messages on the console are limited to level 4 and lower. By default all messages from level 0 (emergencies) to level 7 (debugging) are logged. Messages are logged to a syslog server at IP Address 10.1.152.1. By default all messages Except level 7 are sent. 13

Network Monitoring and Performance Measurement Tools Capacity planning Diagnosing performance problems SLA compliance 14

Implementing Backup and Restore Services using FTP Copy using FTP with specified username and password R1(config)# ip ftp username backup R1(config)# ip ftp password san-fran R1(config)# exit R1# copy startup-config ftp://10.1.152.1/r1-test.cfg Address or name of remote host [10.1.152.1]? 1 152 1]? Destination filename [R1-test.cfg]? Writing R1-test.cfg! 2323 bytes copied in 0.304 secs (7641 bytes/sec) Copy using FTP with stored username and password R1# copy startup-config ftp://backup:san-fran@10.1.152.1/r1-test.cfg 1 152 1/R1-test cfg Address or name of remote host [10.1.152.1]? Destination filename [R1-test.cfg]? Writing R1-test.cfg! 2323 bytes copied in 0.268 secs (8668 bytes/sec) 15

Implementing Backup and Restore Services using Archive Setting up the configuration archive R1(config)# archive R1(config-archive)# path flash:/config-archive/$h-config R1(config-archive)# write-memory R1(config-archive)# time-period 10080 show archive command output R1# show archive There are currently 3 archive configurations saved. The next archive file will be named flash:/config-archive/r1-config-4 Archive # Name 0 1 flash:/config-archive/r1-config-1 2 flash:/config-archive/r1-config-2 5 flash:/config-archive/r1-config-3 <- Most Recent 16

Implementing Backup and Restore Services using configure replace R1# configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)# hostname TEST TEST(config)# ^Z TEST# configure replace flash:config-archive/r1-config-3 list This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed.? [no]: yes!pass 1!List of Commands: no hostname TEST hostname RO1 end Total number of passes: 1 Rollback Done 17

Disaster Recovery Tools Successful disaster recovery is dependent on the existence of the following: Up to date configuration backups Up to date software backups Up to date hardware inventories Configuration and software provisioning tools 18

Summary Advantages of a structured network maintenance model over interrupt-driven include reduced network downtime and higher network security. Examples of structured network maintenance methodologies include ITIL, FCAPS, TMN and Cisco Lifecycle Services (PPDIOO). Network maintenance plans include procedures for adds/moves/changes, software upgrades and replacement of failed devices. Network maintenance planning includes maintenance scheduling, documentation development, templates/procedures/conventions definition and disaster recovery planning. Network documentation includes network drawings, connections, equipment lists, IP address administration, device configurations and design documentation. When a device fails, disaster recovery requires that replacement hardware, software, configuration files and transfer tools be available. 19

Summary Cont. The basic components of a network maintenance toolkit include CLI and GUI device management tools as well as backup, log and time servers. Cisco web-based b tools and resources: Dynamic Configuration Tool, Cisco Feature Navigator, SNMP Object Navigator and Cisco Power Calculator. Main motivations for measuring network performance are capacity planning, diagnosing performance problems and SLA compliance. TFTP, FTP, SCP, HTTP, and HTTPS can be used to transfer files between network and backup devices. FTP, SCP, HTTP, and HTTPS are more secure than TFTP as they require authentication. SCP and HTTPS are most secure because they also incorporate encryption. The configuration archiving i feature can be helpful l in creating configuration archives, either locally on a remote server (introduced with IOS Release 12.3(7)T). 20

Labs There are no labs for this chapter. 21

22