Network Management

12K

Solutions

29

Articles & Videos

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

I have a watchguard M400 (Fireware XTM 11.10) Firewall/Router with about 14 Branch Office VPN'c coming into it. We have a new software these BOVPN's need to access. There are two application servers running the software. I would like to load balance the connections to these servers. Can someone point me in the correct direction?
0
Easy, flexible multimedia distribution & control
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

How to monitor services on your network and why?
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
How to scan a network for running services?
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools.
0
How to view most utilized nodes in your network?
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor. Top Charts is a view in which you can set several performance counters (such as PING response time, memory utilization, free disk space, and etc) and have the network monitor show you the outliers in your network.
0
NetCrunch network monitor live walk-through
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philosophy behind our unique policy-based approach, as well as to see the user interface of NetCrunch 9.3.
0
I am planning to upgrade the firmware of catalyst 2960
I checked the version I saw below

Switch#sho ver
Cisco IOS Software, C2960X Software (C2960X-UNIVERSALK9-M), Version 15.0(2a)EX5, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Mon 16-Feb-15 08:16 by prod_rel_team
ROM: Bootstrap program is C2960X boot loader
BOOTLDR: C2960X Boot Loader (C2960X-HBOOT-M) Version 15.2(3r)E1, RELEASE SOFTWARE (fc1)
Switch uptime is 46 weeks, 2 days, 1 hour, 0 minutes
System returned to ROM by power-on
System restarted at 07:50:33 UTC Fri Jul 22 2016
System image file is "flash:/c2960x-universalk9-mz.150-2a.EX5/c2960x-universalk9-mz.150-2a.EX5.bin"

I downloaded below files and I have TFTP server ready to upload the files.
c2960x-universalk9-mz.152-5b.E.bin
c2960x-universalk9-tar.152-5b.E.tar

How to upgrade to 152.5?
Your help is appreciated
0
How to see a live map of your network in NetCrunch network monitor
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to find this feature.
0
What makes NetCrunch network monitoring system unique?
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special.

  • It's completely agentless, but does let you create an agent, if you desire.
  • It offers powerful scalability on a single machine and requires only 4GB of RAM and 4 cores, which can be on a VM.
  • It's rule-based: it has monitoring packs, which are sets of rules for alerts. These can be applied by policy to any number grouping of nodes. This makes monitoring larger networks a breeze.
  • It has a pending alerts view, which shows you all the current problems that you have in your network instead of making you dig through the event log.
  • It's great at presenting live data. Your data can be shown on dashboards, live widgets or on custom views. On top of that, it's optimised for a multi-screen NOC room setting.
  • It supports all major operating systems and SNMP. There's also an extension protocol, that lets you write your own scripts and fit data in.
  • It comes with an embedded database so there's no requirement for additional administration or licensing.
  • There's no limit on a size or length of time to keep your performance data.
  • It runs on Windows and is very stable. Some of our clients are running version 5, which is over 7 years old!
  • It has simple, node-based licensing - just count the number of nodes you have. There's no limit on the number of elements, counters or sensors.
0
Network monitoring: why having a policy is the best policy?
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
Hi,

My apologies if I'm unable to put the question right, I am a beginner and would not understand why Im not able to log into the redundant device. These are Cisco WS-6509-E running the WS-SUP720-3B

I am trying to do an IOS upgrade on 2 devices

Device A

Device B (Redundant to Device A)

These are Access level switches and Im using SecureCRT to log into the devices. I am successfully able to log in the Device A and back up the configs. However when trying to log in to Device B - it gives me the below error

ssh: connect to host xx.xxx.z.15 port 22: Connection refused

IP of device A is xx.xxx.z.14.

What can be done in this case? Thanks in Advance !
0
Salesforce Has Never Been Easier
Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

Network monitoring: why having a policy is the best policy?
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this video is NetCrunch network monitor, available at adremsoft.com.
0
I have many large folders on the server that I believe no one is using. I would like to set up logging over the next six months to verify no one is accessing them. Then I can safely archive the folders.

This is running on a Windows 2012 R2server.

I am finding software to report on this that is too expensive. I'd rather use windows event logging to track this or anything less than $150.

How is this set up and how do I report on this?
0
Purchased TZ210 product code 7131 in 2013....firmware SonicOS Enhanced 5.9.1.8-11o for my EMR.

Upgraded from 50 mps to  fios 150 mps service. After speed test its not even close.  Tested at the router we are getting 150 into the Sonic 40 coming out.  Help.......

Thanks Barry
0
Hi experts

I have some laptops in a school that require strict limited control and capabilities, more so than usual due to the nature of the environment

This therefore means I have to attach a very long list of GPO's to the user accounts connected to the student OU's.

I'm wondering if applying so many GPO's will slow down the logon time significantly. We are using roaming profiles , clients on windows 8.1 , server windowsill server 2012 r2 ....

If so what's the best method to reduce logon time ....

Users have reportedly very slow logon times and I think the bandwidth in some areas of the school are a contributing factor however I'm not ruling out GPO being a big part of the issue


Any suggestion, solutions, advice and guidance welcomes

Many thanks
0
For a large enterprise with over 120 locations nationwide across the WAN, our operations team needs to make updates to acls on Cisco ASAs and routers based on CCB approved changes.  Approved changes come in on a regular basis.  The problem is this becomes a maintenance hardship as a single change at one site, becomes a similar change at the majority of the other sites.  A single change has to be applied up to 120 times.  Looking for an automated way with a good management tool.  For now, there are no changes to the acls on the perimeter routers, changes only made to the acls on the ASAs.

The IP addressing scheme for all the sites are 10.10.w.x local LAN behind the firewalls, and 10.20.y.z behind the routers.  The first two octets are always the same site to site.  The third octet is the site identifier.  For example, for 10.10.27.32 the 27 represents Kansas City, for 10.10.29.32 the 29 represents St. Louis.  In both examples, the 32 represents a SQL server, and all sites use the last octet to represent a device that is identical for all the sites. So 32 last octel is always the site SQL server, last octet 45 is always the site DNS server, etc....  

When an approved firewall CR comes in for access to all the DNS servers at all the sites, the operations team inserts the acl with the address 10.10.0.45 255.255.0.255 (third octet "don't care") for each firewall at each site so that they can make the one update and push to all sites using their firewall management tool.

A…
0
Hello,
I am currently upgrading my infrastructure to cat6, but in order to make this less expensive I may need to run straight across our drop ceiling (not dirrctly on tiles) without any near ceiling supports for 50 feet. so, is it allowable to hang jhooks on drop ceiling support wires? I will have a max total of 45 cat6 cables atleast 60 feet. I've only read reports of cable regulations (cabling installation maintenance site) that date back to 1997 stating laying on tiles is out but using recommended wire supports is in for a max weight regulation. but I've also been told by a electrician that anything running electricity can not be hung, even low voltage data cable. if any body can send my to updated site for regulations or let me know straight out yes/no and why.
thx
0
Hi,

I am working on a tenable nessus audit file for ibm aix.

What i am trying to achieve is 2 compliance check on the /etc/hosts.equiv file:

1. To find all UID less that 100 and UID not equals to the default system user ids (0,1,2,3,4,5)

2. To find all GID less that 100 and GID not equals to the default system group ids (0,1,2,3,4,5)

<custom_item>
type: CMD_EXEC
description: "UID less than 100 and not system default UID"
cmd: ""
expect: ""
</custom_item>

<custom_item>
type: CMD_EXEC
description: "GID less than 100 and not system default GID"
cmd: ""
expect: ""
</custom_item>

I am really new to working with tenable and also new to aix.

Really apperciate if anyone can help me out with what i should put for the cmd and expect statement on how to make the compliance check work.

Thanks really apperciate it!

Link: https://www.ibm.com/support/knowledgecenter/ssw_aix_71/com.ibm.aix.security/passwords_etc_passwd_file.htm
0
Hi im facing a problem basically we are replacing our cisco router with asr 1001 for the internet connection.

While creating the PPPOE configuration i noticed that pppoe-client is not working on the interface which im trying to configure for WAN side interface.

I appreciate if someone has experience with regards to this router. and can guide me with the full configuration for pppoe.

Thank you
0
I am setting up a linux server on a small network for people to access their files, each windows computer will have local login.
I will create logins on the linux server that will be for each individual on the network.
I will map each computer with the appropriate folders that belong to those users.
How can I handle it if someone else needs to use someone else's computer and would like to access their personal files?
Should I have 2 logins, one belonging to the user of that system and a guest of some sort but how can they get to their files easily without needing me to map the drive for them? I need simple because these are not very technical people.

thanks
0
Retailers - Is your network secure?
Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

[Webinar] Learn How to Simplify Your Server Management
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't working efficiently to help you get your work done. You need streamlined processes to help you tackle your to-do list, implement new protocols, and deploy code.

Check out this webinar to learn:
  • How the Plesk Onyx platform simplifies administration and management of virtual hosts for IT admins
  • Ways to set up, manage, and maintain websites, email accounts, and other items through a web-based interface
  • The importance of an extremely secure environment, both in the core and through third-party providers
  • How to deploy code more effectively and frequently with a fully-integrated system
0
We have an excel file that we want two computers to have access to. We want both computers to access the actual excel document, not the excel online version.

They don't necessarily have to be able to modify it at the same exact time, just access through excel.

Is there a way to do this with OneDrive? From what I can figure out, OneDrive only works with either both computers using the online version of excel, or one using online version and other the desktop version. Can both computers use the desktop version through OneDrive.

Any help is greatly appreciated!
0
I need to see the DNS resolution requests of my applications audited and if necessary modified before being sent. I suppose the easiest would be a local resolver that would review my requests before forwarding them to the resolver of my ISP? Another way would be to monitor and be able to override UDP/53 traffi (something I have no clue about). Is there an open source I could use?
Also, I would need this on all OS.
How would you do that? Or would there be a free solution that exists?
Need: support of iDNs as per RFC 5895 for the wole machine (transparent to applications), management of variants, parental control, typos correction. Etc.
Thank you!
0
There have been vendors accesses via Rdp & Teamviewer with internal staffs help :
staff use a broadband (Guest network & 4G) to connect their laptop to & their LAN
to the corporate network.

How can I thoroughly trace these down & block them?

Certainly they'll need sort of accounts to login, right?
0
Hi,

We are looking for recommendations for a network level internet filter.
At the moment, we are using OpenDNS or draytek content filter, but neither are particularly robust.

Our main requirement is that it be a network filter in the true sense, in that there is no need to install an agent on the end-user device or have to deploy proxy settings. The above filters work at the router level.

Another nice feature, but not as essential, would be to have granular controls, rather than one policy for all.

Does anyone have any recommendations?

Thanks!
0
Hello everyone,

I have configured our Nagios instance to monitor a Xerox printer with the Check_SNMP_Printer plugin (https://exchange.nagios.org/directory/Plugins/Hardware/Printers/SNMP-Printer-Check/details), and am receiving information fine. The issue is that it is the wrong information. It is returning the Transfer Belt info on all checks except the paper trays (screenshot1).

If I manually run the command, I get the same response (screenshot2). I have checked the script and the Universal SNMP OIDs are correct. for my printer. If I snmpwalk the OIDs listed, they return expected output.

I am a bit at a loss as to what the issue is. I can only assume something is wrong with the logic?

Any insight i can get on this is greatly appreciated!
Screenshot1.png
screenshot2.png
0

Network Management

12K

Solutions

29

Articles & Videos

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.