We help IT Professionals succeed at work.

Network Management

13K

Solutions

15K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

how to disable lacp on port (f.x) 21 on procurve 2810 from command line
0
Dears,

i would like to know , if a client mentions that he needs us to provide NOC services , does he mean that

1. Design NOC for the client
2. NOC as a service for the client

if either for 1 or 2 , what all components are considered like tools etc

any links for me to refer to

Regards
Sid
0
From a security/management perspective, how do you handle devices that have not connected to your network/domain in a set period of time, and therefore would be behind on AV updates OS updates App updates etc, posing somewhat of a security risk? Are they simply allowed to reconnect at will, e.g. 3-6 months after their last connection, or do you do anything in AD or elsewhere in your network management process to deny them access to the network, and how do you go about updating them before they can reconnect, e.g. an 'offline' process? Or is it acceptable to let them reconnect and allow the update servers apply the updates in due course.
0
I'm planning on deploying a set of Domain Controllers over 3 sites very soon - replacing a medium-sized peer-to-peer network (well, some would call it "large").
In doing this, I'm looking forward to getting past some of the difficulties that I've had with network management.
Not having used some of the tools in a domain setting before, I'm wondering about a few things and could use Experts perspectives and experience.

Background:
We've been using ManageEngine Eventlog Analyzer for Security Event and Incident Management.  The biggest issue has been getting the workstations to respond to the monitor.  We started out trying to keep things centralized and use WMI but that was just too hard to keep all the computers "connected".  So, we've resorted to the use of Agents on the workstations.  But, even then, some refuse to play nice and we don't get any event data as in "Access Denied".

We've also been using GFI Languard for internal network vulnerability scanning and remediation (e.g. softare update management).  And, we've had similar problems here so use almost 100% Agents now.  This one doesn't seem to have the same connection problems.

Now, believe me, I've researched and asked and tried things but feel that some WMI enablements are just "too hard" - even though I don't give up easily, I remain hammering away at some tough cases.  I've generated my own checklist for setting up effective WMI and still don't have a magic formula for success.  Doesn't that seem …
0
Hi,

We intend to order Cisco ISE to our company. Really, I have no idea what type of license we need and I hope some can help me. Number of devices that are connect to network (PC, Laptop, network printer, network scanner, Mobile phone,...etc) are 800 wired connection and 600 wireless connection (Laptop and mobile).

What type of Cisco Identity Services Engine Appliances is needed?
What Type of License needed?

Can anyone help me? Also, Do anyone know the approximate quota for this? We intend to buy the subscription for 5 years.

Thanks
0
The client is setting up a mesh system in a large house (Bed and Breakfast), and needs to select which one to use.  They have run Cat6 to 3 spots on each of 4 floors.

They are aware of:  
Linksys Velop
TP-Link Deco M9 plus Mesh
Netgear Orbi High-Performance AC3000

I have used Eero, which I'm happy with, and would like to recommend that.

Is Eero equal if not better than the others?

Is there another brand that I should be using?

Thanks
0
Have Enterasys switches.  Using Netsight Alarms Manager I have turned on alerts to send a email when a link goes down and when a link goes up.  The problem is that it only gives the interfaces number.  After using port alias I thought I would see the name of the port instead of just the interfaces number but I still see only the interfaces number.  Where am I going wrong.  How can I get the alarm manger to send the port alias information.
0
I'm currently looking for a system that has the ability to validate whether a device is 'company owned' based on a MAC address.  If the MAC address is not a company owned device, network services would be denied to the device.  

In our network, we use Cisco ASA devices.  From what I can tell, this is not a feature that could be implemented in the ASA itself, however I was wondering if there was a way to implement this somehow in the ASA?

My questions are these:

1.  Is there an off-the-shelf solution for this? and
2.  Is there any way to implement this type of control in an ASA?
0
We have a FLIR DVR home security system in a home with AT&T UVerse with one of their own modems.

We have set up port forwarding and installed the FLIR app on the phone, which works flawlessly.  It is set to access the system to the public/WAN IP address.

However, we have one problem.  When you try to access the app from inside the network (where the FLIR DVR is located) it does not work.  However, when you turn off the WiFi on the phone and allow it to use the mobile network, it works.

I am sure I am missing some fundamental network principle here on why it is not working (and any thoughts on how to resolve it)?
0
Hi guys

I've been tasked with being able to secure the network perimeter at various sites. One of the vulnerabilities I am seeing is that at the main offices, I could easily plug a device to a port and get an IP address assigned to me. Now, of course I can't access things on the domain without having credentials.

But one of the things I thought of was to perhaps lock down all ports on  network switches so that they are inactive (other than those already active for current staff) and only turned active when we know who wants to plug into the network and when? So that we can track it on some sort of sheet or portal?

We're talking each site consisting of around 250 people and there being over 5 to 7 sites.

How would you manage it?

Thanks for helping
Yash
0
I’m on a LAN and the server room is about 200 metres from my network port.

I use a Igel to connect to network.  Is there any way I can speed it up from  server to pan socket as thing so slow as it’s a distance away and runs Along side electric sockets.

I have a gigabyte Poe injector? Does that mean anything
0
hi experts,

Slightly complex situation here. I'm leading an infrastructure team. At the same time, we've got a service delivery manager who handles all of the change management, incidents etc and is running a rather strict ITIL methodology. We've also got the web team who have now been told that any changes, requests must be put through the service delivery team and that they have to adhere to the ITIL customs.

Now, the web team work with an Agile methodology. So they're pushing back and saying this does not work for them. Trying to see if there is a way to come up with something to get these guys to work together. I've just learned that Agile is not a set of processes but instead a set of values and principles. Which is completely the opposite to what ITIL is.

Have you ever dealt with such a scenario? Do you have any practical advice as to how to best tackle this?

Thanks for helping
Yash
0
How can I change from a wireless to a wired connection to my HP Officejet Pro 8210?   I have tried uninstalling then reinstalling the printer.   I ma running Windows 7 Professional X64.   The printer works wirelessly,  but I want to use the ethernet connection.   When I try to do this, the device does not appear in the list of devices.
0
hi guys

The environment I'm working in has around 150+ servers. Our team have to apply patches and keep these servers updated on a regular basis which they haven't done as yet. Now, the issue we have is that these servers are not just owned by the infrastructure and security teams, as that would be easy to manage. But the business analysts, business intelligence and applications teams own a good percentage of these too.

I need to put strategies in place so that my team, infrastructure&security, ensures that when these updates are applied that the impact is minimised and that we don't suddenly have updates which affect the applications sitting on those servers and firefighting errors.

One of my ideas was to ensure that there is a testing environment. But if I did, would I then liaise with the development teams to replicate everything that is on the production environment onto their testing too and regularly? So that when they make changes to development, they do the same onto testing?

What is the approach you have found works best?

Thanks for helping
Yash
0
how to create lacp on 2 port (sag 23 and 24) on procurve 2810 from command line
0
hi peeps,

I'm working on getting some starter forms (or procedures) and leaver forms (or procedures) rolling for out I.T department. I guess the most important thing is to get procedures and processes in place and content will follow.

We don't have anything like it and I want to standardise something across the business. From what they will need in terms of applications, to hardware (like laptops/phones) to credentials they need set up for them.

We do have various service desk systems along with O365 and Sharepoint that we could use to enforce such a thing.

Do you have anything in place that you have created or what you deem as being an excellent way of keeping track of things? Would you create forms on things like Sharepiont? Does your HR department have anything similar that they use?

Any ideas would be great.

Thanks for helping
Yash
0
hi guys

I'm currently trying to put a plan together to senior management for a strategy for their infrastructure and security. I have only just been hired for the project. My role is to provide leadership for the infrastructure and security teams.  I know exactly what I need to do, but my issue is that I'm trying to put this into a structured plan to follow in steps, but articulating this properly has been a bit of a challenge. The purpose of the plan is to liaise with important stakeholders to understand the vision/mission of the business goals in order for I.T to better support them.

At the moment, I've gone and met people in the teams and asked them about how things work, the infrastructure and the security in place. But, that's not part of a structured method/plan.

For example, I am setting the plan together in phases. In the first phase, I want it to be the understanding phase. So something like 'meet with direct reports'. Then 'understand from direct reports, their roles and responsibilities by spending two hours in the first week with them'.

Then something like 'exploring vulnerabilities across all verticals to identify shortfalls affecting productivity....' (or anything similar'.



The purpose is to expand this into phases, so that I can come up with a conclusion and show senior people as to what I will do in the next X number of months.



Do you guys have any plans you created or know of any good structure that is out there which can be …
0
I am looking for  software solutions  that will allow me to Visualize Network Traffic .
The aim is to quickly pick up on network isssues .

What do you guys recommend?
0
Dear Experts, I'm testing the ARP inspection in Cisco switch 3750 and get this result when using show ip arp inspection command

Capture.PNG
Can you explain the results and suggest? Many thanks!
0
Dear Experts, I have server farm at network 192.168.55.0/24 (Exchange 2016)

I can access the servers from other network but CANNOT from some servers in the same network 55

What can be the reasons? Many thanks!
0
Dear Experts,

I've completed my basic home network setup by configuring VLAN with router and switch. I was able to make it happen with ubiquiti Edgerouter and cisco Sg200 switch. I setup the Vlan10, 20, and 30. I am able to communicate between the vlan as well. I will later setup the rules in the router to restrict the access between the vlans. The funny thing is that I've configured my router under 192.168.10.1 and my switch under 192.168.10.2. I was able to access my router via the IP but I cannot see my switch. My computer is on 192.168.10.100. The setting of the switch port that my computer connected to has this setting:
 switchport #20:
 vlan 10
switch port mode: access, untagged (excluded from other vlan)

I can set my PC's IPv4 configuration to auto which I will be assigned to one of the IP under 192.168.10.x/24 I can see other devices on the same network and have the access to internet as well. I just can't access the switch portal on IP 192.168.10.2 and I cannot ping it.

If I connect to a different switch port with a different setting like this:
switchport: #24:
vlan 1 (default vlan)
switch port mode: trunk, untagged (excluded from other vlan)

I will need to configure my PC's IP in Windows10 to IP: 192.168.10.100, submask 255.255.255.0, gateway: 192.168.10.1 then I will be able to access the switch portal at 192.168.10.2. If I don't manually configure my window's IP then I will not be assigned into an IP under 192.168.10.0/24 range.  Under this …
0
Hello,

There seems to be a lot of discards happening on an interface of my Catalyst 9300. Here are some images to validate what is happening.
Imterface-Discards.JPGOpManager-Discards.JPGSolarwinds-Discards.JPG
This port on the switch goes to a Fortigate 300E. Would I be able to identify these discarded packets with Wireshark and spanning the port like so:
monitor session 1 source interface TwoGigabitEthernet1/0/8
monitor session 1 destination interface tenGigabitEthernet 1/0/45 encapsulation replicate

 I ended up trying it with Wireshark and got this, but not sure if it's my problem.
Interface-Info.JPGWireshark.PNG
0
I need to design a topology of our network for a meeting that shows all the network servers and communication appliances.  What software can I use that is simple or free to do so?

Thanks
0
What is the best way to segment several workstations?
Simply put...I'd like to take 2-3 workstations (Secret) and set them in their own subnet (ex. 10.10.1.###) while the rest of the workstations (Agency) remain on the subnet (ex. 192.168.1.###).  
How would I grant Secret subnet access to network resources, dir shares, etc.?

Thanks in advance
0
What's the URL for logging into Cisco Business Critical Insights or finding BCI from the main Cisco site? If I good it I get a page that tells me about it. But I want the URL that actually has the inventory of our gear, the SW revisions.

https://www.cisco.com/c/en/us/services/optimization/business-critical-insights.html
0

Network Management

13K

Solutions

15K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.