Planning Maintenance for Complex Networks



Similar documents
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter , Cisco Systems, Inc. All rights reserved.

Chapter 1 Introduction to Network Maintenance Objectives

Configuring System Message Logging

Domain Name System Server Round-Robin Functionality for the Cisco AS5800

One-Step Lockdown with Cisco SDM

Lab Configure Syslog on AP

Managing Cisco ISE Backup and Restore Operations

Backing Up and Restoring Data

Configuring System Message Logging

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Document ID: Introduction

Administering Cisco ISE

Managing the System Event Log

Managing the System Event Log

HIPAA Compliance Use Case

Lab 5.5 Configuring Logging

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Managing the System Event Log

Lab Configure Basic AP Security through IOS CLI

Lab Configuring Syslog and NTP (Instructor Version)

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse

Configuring System Message Logging

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Transferring Files Using HTTP or HTTPS

Cisco ISE Command-Line Interface

Configure Cisco Emergency Responder Disaster Recovery System

Lab 5.3.9b Managing Router Configuration Files Using TFTP

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

CLI Commands and Disaster Recovery System

3.1 Connecting to a Router and Basic Configuration

Enabling Management Protocols: NTP, SNMP, and Syslog

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Enhanced Password Security - Phase I

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Lab 3.3 Configuring QoS with SDM

Managing Software and Configurations

Consolidated Packages and SubPackages Management

Enhanced Password Security - Phase I

Configuring Basic Settings

System Message Logging

Image Verification. Finding Feature Information. Restrictions for Image Verification

Logging in Cisco IOS. The minimum you should know

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

EMC Data Domain Management Center

Configurazione Rete VoIP

Connecting to the Firewall Services Module and Managing the Configuration

Cisco Prime Collaboration Deployment Administration Guide, Release 10.5(1)

IM and Presence Disaster Recovery System

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Introduction to the Junos Operating System

Cisco.Selftestengine v by.Amy.32q

Monitoring the Firewall Services Module

Simple MPLS network topology for Dynamips/Olive

Installing, Uninstalling, and Upgrading Service Monitor

Savvius Insight Initial Configuration

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

About Network Data Collector

Cisco Unified CM Disaster Recovery System

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring a Leased Line

RSA Security Analytics

Enabling Remote Access to the ACE

Release Notes for Dominion SX Firmware 3.1.6

DPS Telecom Your Partners in Network Alarm Management

NAM CLI Commands: - logout

Managing the System Event Log

Cisco Unified Communications Manager 7.x/8.x: Troubleshoot Backup Issue

Router Security Audit Logs

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

Cisco ASA. Administrators

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1)

Cisco Routers and Switches

File Transfers. Contents

Configuring System Message Logging

Configurazione Rete VoIP

Syslog Server Configuration on Wireless LAN Controllers (WLCs)


Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Configuring Logging. Information About Logging CHAPTER

Encrypted Preshared Key

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Backup and Recovery Procedures

IPSLA Y1731 On-Demand and Concurrent Operations

Configuring SSH and Telnet

Configuring the Firewall Management Interface

Quick Note 038. Upgrade Software options and/or VPN Licenses on a Digi Transport router.

Center for Internet Security Gold Standard Benchmark for Cisco IOS

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: Issue Date: 2 February 2015 Document Part Number: , Rev A.

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats

PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example

Using Debug Commands

Upgrading Software Using the Online Installer

Technical Overview CM-16 Climate Monitor. Get yours direct at:

Encrypted Preshared Key

Basic Router and Switch Instructions (Cisco Devices)

LifeSize Control Installation Guide

Configure Backup Server for Cisco Unified Communications Manager

Transcription:

Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1

Maintenance Models and Methodologies A network engineer s job description can include tasks related to: Device installation and maintenance Failure response Network performance Business procedures Security 2

Benefits of Structured Maintenance over Interrupt-driven Maintenance Proactive vs. reactive Reduced network downtime More cost effective Better alignment with business objectives Improved network security 3

Maintenance Models and Organizations IT Infrastructure Library (ITIL) ISO FCAPS Fault management Configuration management Accounting management Performance Management Security Management ITU-T - Telecommunications Management Network (TMN) Cisco Lifecycle Services Phases PPDIOO (Prepare, Plan, Design, Implement, Operate, and Optimize) 4

The Configuration Management element of the FCAPS model 5

Network Maintenance Processes and Procedures A network maintenance plan includes procedures for the following tasks: Accommodating Adds, Moves, and Changes Installation and configuration of new devices Replacement of failed devices Backup of device configurations and software Troubleshooting link and device failures Software upgrading or patching Network monitoring Performance measurement and capacity planning Writing and updating documentation 6

Network Maintenance Processes and Procedures Network maintenance planning includes: Scheduling maintenance Formalizing change control procedures Establishing network documentation procedures Establishing effective communication Defining templates/procedures/conventions Planning for disaster recovery 7

Network Maintenance Tools, Applications, and Resources Console SSH Telnet TFTP FTP SCP HTTP(S) CLI mgmt Backups GUI mgmt HTTP HTTPS Telnet SSH NTP Time Syslog Logging 8

NTP Example (Selected output from the running config) service timestamps debug datetime msec localtime show-timezone service timestamps log datetime localtime show-timezone! clock timezone PST -8 clock summer-time PDT recurring 2 Sun Mar 2:00 1 Sun Nov 2:00! ntp server 10.1.220.3 9

Cisco Configuration and Documentation Tools Dynamic Configuration Tool Aids in creating hardware configurations Verifies compatibility of hardware and software selected Produces a Bill of Materials (BoM) with part numbers Cisco Feature Navigator Quickly finds Cisco IOS Software release for required features SNMP Object Navigator Translates SNMP Object Identifiers (OID) into object names Allows download of SNMP MIB files Verify supported MIBs for a Cisco IOS Software version Cisco Power Calculator Calculates power supply requirements a PoE hardware configuration Requires CCO login 10

Logging Services Logging severity levels on Cisco devices: (0) Emergencies (1) Alerts (2) Critical (3) Errors (4) Warnings (5) Notifications (6) Informational (7) Debugging Enabling logging for a lower level (from importance point of view) will enable logging for all the above levels. 11

Logging to a Server! logging buffered 16348! logging console warnings! logging 10.1.152.1! Messages are logged to a circular log buffer in RAM that is limited to 16384 Bytes. Logging messages on the console are limited to level 4 and lower. By default all messages from level 0 (emergencies) to level 7 (debugging) are logged. Messages are logged to a syslog server at IP Address 10.1.152.1. By default all messages Except level 7 are sent. 12

Network Monitoring and Performance Measurement Tools Capacity planning Diagnosing performance problems SLA compliance 13

Implementing Backup and Restore Services using FTP Copy using FTP with specified username and password R1(config)# ip ftp username backup R1(config)# ip ftp password san-fran R1(config)# exit R1# copy startup-config ftp://10.1.152.1/r1-test.cfg Address or name of remote host [10.1.152.1]? Destination filename [R1-test.cfg]? Writing R1-test.cfg! 2323 bytes copied in 0.304 secs (7641 bytes/sec) Copy using FTP with stored username and password R1# copy startup-config ftp://backup:san-fran@10.1.152.1/r1-test.cfg Address or name of remote host [10.1.152.1]? Destination filename [R1-test.cfg]? Writing R1-test.cfg! 2323 bytes copied in 0.268 secs (8668 bytes/sec) 14

Implementing Backup and Restore Services using Archive Setting up the configuration archive R1(config)# archive R1(config-archive)# path flash:/config-archive/$h-config R1(config-archive)# write-memory R1(config-archive)# time-period 10080 show archive command output R1# show archive There are currently 3 archive configurations saved. The next archive file will be named flash:/config-archive/r1-config-4 Archive # Name 0 1 flash:/config-archive/r1-config-1 2 flash:/config-archive/r1-config-2 5 flash:/config-archive/r1-config-3 <- Most Recent 15

Implementing Backup and Restore Services using configure replace R1# configure terminal Enter configuration commands, one per line. End with CNTL/Z. R1(config)# hostname TEST TEST(config)# ^Z TEST# configure replace flash:config-archive/r1-config-3 list This will apply all necessary additions and deletions to replace the current running configuration with the contents of the specified configuration file, which is assumed to be a complete configuration, not a partial configuration. Enter Y if you are sure you want to proceed.? [no]: yes!pass 1!List of Commands: no hostname TEST hostname RO1 end Total number of passes: 1 Rollback Done 16

Disaster Recovery Tools Successful disaster recovery is dependent on the existence of the following: Up to date configuration backups Up to date software backups Up to date hardware inventories Configuration and software provisioning tools 17