Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

Our firewalls are not sync'ed to public DNS so we can't create rules by URL of playstore or appstore.

Our corporate mobile devices need to have push notifications & apps install :
what's the range of IP for appstore & playstore required & the ports to permit?

I heard appstore is a Class A subnet while playstore is probably a Class B:
is it a good practice to permit firewall rules to such big subnet ranges ?
0
Learn how to optimize MySQL for your business need
LVL 3
Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Hi

Beside of Skype for business for video conferencing.

What other video conferencing solution example to recommend?

Like highfive
0
We have just deployed a Cisco Meraki wifi solution and are trying to set up our wifi networks. However the domain is setup as XX.local.
the commercial cert authorities will not  give  a trusted certificate for XX.local, so we a trying to work out how to deploy a SSL that  is trusted to make wifi for things such as BYOD work seeamlessly , We have considered self-signed but that shows as untrusted, we also need to open  up security on trusted machines to allow it. Has anybody done this or got a good idea
0
Can someone please explain 2 things with Zabbix 3.2

1.  How do agents work?  What is the difference between active and passive?  Can you have both on at same time, what is the best and if you do active agent I still need the ports open below correct?  

2.  What ports need to be open where and push or pull?
So from what I understand it uses two default ports.
10050 for Agent
10051 for Server

So the monitored host needs port 10050 open and then the agent sends back information to the Zabbix Server using port 10051?  So it goes from host 10050 to server 10051?
0
Hi,

Earlier this week we switched ISP's and started to use a new physical router with a different IP address on our lan.

At the same time we updated the default route on the Extreme switch so that it used the IP address of this new router as its gateway (therefore internet traffic goes out via this new router) .   The default route on the extreme switch is configured to use the "VR-Default" VR.

Everything has gone well with our production network, but we also have WiFi connections on a number of different  IP ranges (away from our production network).  We are unable to get an internet connection to clients on these WiFi networks.

These WiFi networks are also configured to use a different gateway (with an Ip in the range of the network) which ultimately returns them back to the the Extreme switch.  These WiFi networks/routes are also configured to use the "VR-Default" VR.

I would like to understand how I can examine the details/configuration of the 'VR-Default' VR to understand what IP address it is using to route out to the internet on.
0
Shared Printers was working fine some days ago but now i am facing problem that printers are showing as offline  and in network computers are also not showing .
0
We have two IP ranges at our office. 10.0.0.x (Static) for the internal IP phones and 192.168.101.x with  DHCP for the office PCs, etc.
The internet breakout is via the default gateway 192.168.101.254.

We run a Software based PBX that runs of a windows 10 PC. This PC has 2 NICs.
NIC1 - Static IP for the 192.168.101.x range for office network connectivity and internet.
NIC2 - Static IP for the 10.0.0.x range to connect to the phones.

How can I get the 10.0.0.x range to get internet access through the PC that have both NICs and IP ranges?
0
In an audit finding, critical PCs (used to transfer large funds n these PCs do not hv Internet
access Nor email clients in them)  were found to be pingable n could map drives to normal
PCs ( to hv internet access n drive sharing can propagate ransomwares/malware) in same
subnet.

We were told these 2 different categories of PCs she'd be logically segregated.  As we don't want
To create separate Vlans n do major network restructuring, Can we do
1. Super sub netting n use Cisco ACLs to segregate the 2 groups of PCs?  Is this ACLs
     using MAC address?
2. Create Windows firewall rules on the critical PCs
3. What else?
0
Have a environment where I want to restrict internet to all computers except of 2.
Looking for a router that instead of blocking the once I want to restrict I should be able to block all and allow the the few I want to allow (a ip range)
Not a big network no fancy router simple
it's about 25 devices all have a static ip configured on the device
0
I am trying to add a non cisco SFP between two catalysts, and am getting the error %PHY-4-SFP_NOT_SUPPORTED: The SFP in (PortNo#) is not Supported.

I have tried running the commands:

Switch(config)#service internal
Switch(config)#no errdisable detect cause gbic-invalid
Switch(config)#service unsupported-transceiver
Switch(config)#int gi0/49
Switch(config-if)#no shutdown
Switch(config-if)#do copy run start

However, the issue is still occurring. I have rebooted the switch after the above with no joy. Cable being used is a StarTech 3m SFP+ 10-Gigabit Ethernet (10Gbe) Twinax Cable. I will be upgrading the firmware to 15.2.6 while waiting for a reply.

Any help will be appreciated.

Switch Ports Model                     SW Version            SW Image            
------ ----- -----                     ----------            ----------          
*    1 50    WS-C2960X-48TS-LL         15.2(2)E6             C2960X-UNIVERSALK9-M
0
Survive A High-Traffic Event with Percona
LVL 3
Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.

Hello, so this firm has a Windows Server SBS 2011 which is mainly used for Exchange and for sharing purposes.

Lately one strange problem has emerged: you open a file from a client (the file is on the server and shared) and you get the usual warning about someone else using the file right now, the file is read-only and so on.

Mind you, I'm not talking about a particular file, this can happen with any file actually.

Problem is, the file is not being used by anyone else, we have verified this many times.
After a while, it will just "unlock" and became fully available.

So, does anyone know how to address this problem or try to diagnose it? It never happened to me in many a year. Thanks.
0
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
0
What training sources are available so I can better learn how to use  Dell Remote Access Controller (DRAC) & OpenManage to manage and monitor Dell servers?

Are there any videos or CBT's available?
0
Hi

I have a watchguard T30. Need to configure one of the Eth ports as a vlan port. The  need to connect the Eth port to a Huawei Layer 2 switch.

How do I configure the switch to allow for vlans?

Thank
0
Hi

I'm setting up a Huawei layer 2 switch Monday morning. Haven't done one of these before. I'm familiar with HP and Cisco. Could some one assist with some cli commands.

I need a few vlans configured and a trunk port from the firewall.

Thanks
0
Has anyone used a free bandwidth monitor.  We can't afford the ones that are out there that cost.

Any help would be appreciated.
0
We have a Fortigate FG200D behind a dirty switch. We upgraded our ISP bandwidth from 50x50 to 1Gbx1Gb.
With a device plugged into the dirty switch I speed test about 850x850 consistently.

Behind the firewall my speed tests are 500x100 consistently.
I have turned disabled all web filtering, AV, IPS, etc to test, and it doesn't make a difference filtering or not. Still the same degraded speed.

Anyone know what else I can test/check for the bottle neck?
0
Recently we deploy the 8 units Cisco APs and ship with the Mobility Express .Once we connected the uplink to core switch we able to get the IP address correctly in each vlan but we found virtual controller IP up and down and the wireless network also not stable.I try to unplug the uplink using my NB connected directly to AP switch then ping the virtual controller was stable then i try to plug the uplink to core switch again the ping is up and down.

I am sure that some thing is conflicting but don't know what is the cause.Please advise


We have configure APs switch all the port as below:
APs Switch
Untaged default  vlan 1
tagged management Vlan 2
tagged Internal Vlan 3
tagged Guest  Vlan 4

Core-switch
Port 7 (uplink)
Untaged default  vlan 1
tagged management Vlan 2
tagged Internal Vlan 3
tagged Guest Vlan 4

Mobility Express Virtual Controller
Native default  vlan 1
tagged management Vlan 2
tagged Internal Vlan 3
tagged Guest  Vlan 4
0
Hi, we are in work group environment, using cisco c3925 as the router facing Internet. How can we know the Internet pages where users access? Do you know any free tool or devices? Many thanks.
0
Supports up to 4K resolution!
Supports up to 4K resolution!

The VS192 2-Port 4K DisplayPort Splitter is perfect for anyone who needs to send one source of DisplayPort high definition video to two or four DisplayPort displays. The VS192 can split and also expand DisplayPort audio/video signal on two or four DisplayPort monitors.

In Bluecoat proxy, there's about 38 categories that it blocks:
1.      Adult/Mature Content
2.      Chat (IM)/SMS
3.      Child Pornography
4.      Controlled Substances
5.      Dynamic DNS Host  
6.      Email
7.      Entertainment
8.      Extreme
9.      File Storage/Sharing    
10.      Gambling
11.      Games    
12.      Hacking    
13.      Internet Telephony    
14.      Malicious Outbound Data/Botnets
15.      Malicious Sources/Malnets
16.      Marijuana
17.      Media Sharing    
18.      Nudity
19.      Peer-to-Peer (P2P)
20.      Personal Sites
21.      Personals/Dating
22.      Phishing
23.      Piracy/Copyright Concerns
24.      Placeholders    
25.      Pornography
26.      Potentially Unwanted Software
27.      Proxy Avoidance    
28.      Remote Access Tools    
29.      Scam/Questionable/Illegal
30.      Sexual Expression  
31.      Social Networking    
32.      Software Downloads
33.      Spam
34.      Suspicious    
35.      Tobacco    
36.      Violence/Hate/Racism
37.      Weapons    
38.      Web Hosting


a) does Steganography come under any of the categories?
b) if not, can we request Bluecoat to add one or to park it under
     one of the above categories?
c) what's the industry practice to handle it?  Block it at email filtering
    device, Network IPS, proxy or ??   Googling around, shows "Traffic
    Warden" is used but if we don't want to invest in it, what can be done?
0
Hello

I have a couple of WAN connections and used by few users to access company services like : Mail,Web Applications...etc.
Both Lines have "A" Records with our ISP. if one line is down,  is it possible to redirect the users to access services through the back up line ? or can you suggest best scenario ?

Best Regards
Mahmoud
0
Dear wizards, does anyone know the impact of Cisco commands which we type on devices' performance (like resource, CPU...) Will it slow down the connection between users and Internet?

For example: if I type "ip access list extended ETC", then defines lots of policies on it, how many resource should them take from the Router?
0
Dear Team,

I have a network which consists of about 70 virtual/physical servers, 3 SAN systems, 10+ Cisco Switches, some Sonicwalls, and a few other devices. I would like a recommendation for a good software that can monitior all these devices on my network and not only tell me when something goes down but also when my hard drives fail or run out of space, high resources being used, and so on.

Thank you.
0
I want to be able to test how my web site looks from outside my firewall. And I'd like to be able to specify https:// and I'd like to be able to use IP address OR domain name. What's the best site for this? Is there one?
0
Looking for better ideas than I already am working with:

What are the industry's best methods practiced to integrate 2 or more companies into a single cohesive infrastructure?
0

Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.