Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

Dear, I got this error from today morning. All the servers in this network range could not be accessed like attached screenshot.

When I tried to access these servers from the same ISP (which provide this network range to us), the servers COULD be accessed; but when I tried from other 2 ISPs, they COULD NOT be accessed.

The servers are Window Server 2012R2 Standard, have Kaspersky, Firewall but they are configured properly, nothing change (this error started from today morning)

Can you please suggest?
0
Free Tool: IP Lookup
LVL 9
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

we are doing some risk assessment work on backup processes from a risk management perspective (we have no responsibility for doing them ourselves), aside from servers, which host the critical data/files, what other devices in a network need considering in backup policies, so we can interview the department responsible to see that they are included/tested.
0
what documentation would you expect to see an IT department have in place specific to their backup/restore processes? I am trying to get a better idea of the process from a risk and compliance angle, but need to identify either some useful probing questions for the team who do backups, or request some documentation that you would expect to be in place.
0
Hello Experts,

I want to segment my wireless network traffic into Guest, student and teacher.We have sonicwall, multiple switches and Access point.

I dont want filtering on computers those are connected through ethernet. i just want to segment my wireless network and assign them to Iboss security device for content filtering .

Any suggestions???

Thanks
Nakul
0
This is using APC Smarts-up 6000 with a network management card AP9631. A shutdown agent software called PCNS - Powerchute Network Shutdown v4.2. One of the server that connected directly to this UPS is, a Citrix XenServer 6.0. This XenServer (as a host) has 5 servers, 4 being MS Windows 2008 R2 server, and 1 CentOS 6.6 server.

I heard that we may have to have a dedicated physical Windows server, installed with Citrix XenCenter mgmt, so as you have to use the xe.exe, plus a USB cable connected from this server to UPS? Does all the above VMs need to install with PCNS? Please show step-by-step how the whole thing can be setup in order to be shutting down upon power failure.


Thanks in advance.
0
this is a quick question as i've tried searching online and have not found what i'm looking for.

i seem to recall back in lync 2013 there was an option to allow the lync server to act as a helper server for the dhcp options pertaining to lpe devices. option 120, 55, 43.


i can't seem to find any article on this now in sfb server.

  1. does this option still exist?
  2. does it work in an enterprise pool?

my need for this option is we would like to utilize our core switch for the dhcp handouts. we use procurves so i don't have a tested command set for these options on these.

my plan is that this would be an elegant solution as we would only have to add helper addresses for sfb and wds without having to mangle any special options directly into the switch.
0
Hi,

Let's say I'm an ISP and I lease a 10G transport pipe to an IX (Frankfurt or Amsterdam), with the purpose of buying transit from 2 different tier 1 providers (2 resellers, probably) and peering with content providers.

What happens inside the IX?

Do I get one switch port and I have to rent rack space for my own equipment there? The peerings are physical, with cables between my switches and the peer switches?

Or I only get a VLAN and the peerings are inside the IX main router/switch? And I route the traffic from my VLAN to my peer's VLAN?

Or?

I've googled for the past days, but I'm still confused. Anyone has real world experience with this?

Thank you.
0
Dear Zealots, is there any method to observe, monitor the traffic from one (or multiple) IP address (es) to a IP address?
We are using Cisco Router 3925, Switch 3560, 3750, 2960
Many thanks in advance,
0
Hi

I have two 48 port switch. ones POE and the other isn't. is it possible to move configs from one to the other. they are both new switches. They are only web ui managed
0
We have fluctuating internet speeds. This is a new server install and workstations are all windows 7. AV is installed and all PCs are clean. DNS forwarders set up to ISP DNS not gateway.
Providers have run line checks and reported this:

Packet loss has occurred over the last week as a result of latency being experienced.
On checking the router we can see that the service is being overutilised on the upload and not the download, the only information we can see is that this is SSL traffic which doesn't give us much definitive info as to what type of data is being sent.  this can often be caused by automated back-up software being run amongst other things however we'd recommend a local capture to be setup on site to ascertain what is causing this issue.

We don't have any online back. There are lots of products to capture network traffic but can anyone recommend one that it easy to use - I need to confirm if we have some rogue hardware over this small network of just 8 PCs?
0
Online Training Solution
Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Hi, I have a problem with my website(dealclik.us) pinging and loading webpages, this website is loading properly but except for one customer it is redirecting to xyz.xyz

I have talked to hosting providers, they are not able to fix this as they could not see any problem with the website. Please help me in fixing this. I asked that particular customer to restart their router, they have a static IP, they restarted the router but the issue is not fixed, how to fix this? please help!!

Thanks in advance.
0
Hi,



Can anyone help in identifying why once my vpn client enabled. I can  ping all other internal IPs except 192.168.4.1(interface DatabaseZone)  and 192.168.3.1. My vpn client assigned 192.168.5.100 which is in  the range ov VpHi,



Can anyone help in identifying why once my vpn client enabled. Cant ping any of internal IPs configuration like 192.168.4.1(interface DatabaseZone) . My vpn client assigned 192.168.5.100 which is in  the range of Vpnclients object-group configuration.nclients object-group configuration.

here attached output from "show vpn-sessiondb detail remote"
vpn-sesssiondb-detail.txt
0
We have difficulties getting monthly downtimes from business & applications teams.

Beside using HA/clustering where we patch one side, swing over (incurring several seconds
or minutes of downtime) & patch the other side, what are the ways people deploy patches
with no or minimal downtime?

I guess Tandem's  Non-Stop Himalaya  could achieve this but what we have here are:
a) AS400 or OS/400 R7
b) Windows 2008 R2 & 2012
c) UNIXes (Solaris, AIX, RHEL)
d) Cisco switches/routers
e) Checkpoint & Juniper firewalls


What is TrendMicro's  virtual patching & does it help minimize downtime for patching?
0
Hello,
     We use RealVNC to to monitor a couple of PCs that are at a remote location. We have never had a problem using it but since upgrading the firmware on our  Sonicwall NSA 220 the firewall now stops the connection with the following alert: IPS Prevention Alert: MISC RealVNC Authentication Bypass, SID: 5828, Priority: Medium. How can I stop the firewall from blocking these events?

Thank you
0
I have a DC running Server 2008 Standard.  I am replacing it with a new server running 2016 Standard.  Can I migrate after upgrading the schema to 2016?  Do I have to go through 2012 first on a different server?  

If not, please provide a brief breakdown of the process.  The 2008 Server is 64bit.

thank you
0
I have a sonicwall NSA250 and i have a 50GB fiber coming into the office. I want to partitiont he bandwidth allow Vlan1 to get 40GB and Vlan2 to get 10GB. Can this be done in sonicwall?
0
how are configurations of cisco jabber clients centrally managed? Is there a way to centrally enabled/disable chat history logging for all clients, and can this feature be enabled/disabled in the client itself? we need to determine if it is enabled for anyone/everyone/and how that can be amended for all users centrally. client is currently 11.7.1.
0
How do I go about setting the QoS recommendation, ie EF/AF4/Af3 etc for MPLS network?  What parameters should I be looking? The SP wants us to tell them what we want?
0
hi guys

I am setting up a Excel password sheet that is protected with information regarding  our domain passwords and switches etc. With the issue of ransomware etc becoming a grander problem by the day, I am now being asked to not only create these protected password sheets on the network, but also in the cloud with providers like 'LastPass'.

Would you or have you done this and feel safe to put your passwords in a vault in the cloud?

Thanks for helping
Yashy
1
Database Solutions Engineer FAQs
LVL 2
Database Solutions Engineer FAQs

In this series, we will discuss common questions received as a database Solutions Engineer at Percona. In this role, we speak with a wide array of MySQL and MongoDB users responsible for both extremely large and complex environments to smaller single-server environments.

We are baffled by a situation where two computers are unable to access a website that more than 150 other computers are accessing with a problem. These two computers are behind a common modem and router, but tracert shows the packets make it to the server. Running Wire Shark shows:
wireshark.pngOther websites on a different server (and ip) behind the same firewall are accessible from the same two computers behind the same router and modem.

To try to clear up the situation....
Two computers (running POS Ready 2009) at location A are unable to display a website on server A (running Server 2003). This is true whether using the domain or the IP Address for the server.  These same two computers are able to access a website on the Server B (running Server 2003) which is behind the same firewall as Server A.
Other computers are able to display the same website on Server A from multiple other locations with no problems.
0
Hello,

I have a Sonicwall TZ 300 firewall being used as a gateway router for a network. The IP address scope is 10.1.1.1-10.1.1.255 on the X0 interface.

I would like to setup another network with the SAME IP address scope of 10.1.1.1 etc.. on the X2 interface to build and test another server which is eventually going to replace the server on the X0 interface. This second network has to be isolated from the the X0 interface so the two servers/networks can exist without seeing each other. Is this possible? How can I do this if so?

I have it working now as long as I use another IP scheme (10.0.0.1...) but I want to use the same IP scope to make it easier to transition to the new server down the line.
0
Looking for a application I caN check out my network to see if there is a issue in loss of connects delays slow connection and if, which point and what application. Any recommendations but not something that should break my pocket.
0
share-info--1-.PNG Sharing articles is an excellent way to facilitate discussion on topics you feel passionate about. Adding your opinion or perspective, however, creates an engaging post that encourages others involvement!
3
We have a linux server that downloads and uploads images for clients.

We need to know how much data is being used on average.
I have rx and tx from a sonicwall report but it shows from various IP addresses and I would have to add it all together.

I've saw I can use something called vnstat but i'd rather be able to do it without accessing the machine if possible.

What is the easiest way?
0
are there any free tools which could scan a drive on a file server for potential inappropriate images, based on a nudity type calculation. I know these things exist in forensics communities but I have yet to see anything that is free. we need to do a quick scan to ensure one of our employees has not stored any inappropriate material on one of our file servers.
1

Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.