Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

what documentation would you expect to see an IT department have in place specific to their backup/restore processes? I am trying to get a better idea of the process from a risk and compliance angle, but need to identify either some useful probing questions for the team who do backups, or request some documentation that you would expect to be in place.
0
Free Tool: IP Lookup
LVL 9
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Hello Experts,

I want to segment my wireless network traffic into Guest, student and teacher.We have sonicwall, multiple switches and Access point.

I dont want filtering on computers those are connected through ethernet. i just want to segment my wireless network and assign them to Iboss security device for content filtering .

Any suggestions???

Thanks
Nakul
0
This is using APC Smarts-up 6000 with a network management card AP9631. A shutdown agent software called PCNS - Powerchute Network Shutdown v4.2. One of the server that connected directly to this UPS is, a Citrix XenServer 6.0. This XenServer (as a host) has 5 servers, 4 being MS Windows 2008 R2 server, and 1 CentOS 6.6 server.

I heard that we may have to have a dedicated physical Windows server, installed with Citrix XenCenter mgmt, so as you have to use the xe.exe, plus a USB cable connected from this server to UPS? Does all the above VMs need to install with PCNS? Please show step-by-step how the whole thing can be setup in order to be shutting down upon power failure.


Thanks in advance.
0
this is a quick question as i've tried searching online and have not found what i'm looking for.

i seem to recall back in lync 2013 there was an option to allow the lync server to act as a helper server for the dhcp options pertaining to lpe devices. option 120, 55, 43.


i can't seem to find any article on this now in sfb server.

  1. does this option still exist?
  2. does it work in an enterprise pool?

my need for this option is we would like to utilize our core switch for the dhcp handouts. we use procurves so i don't have a tested command set for these options on these.

my plan is that this would be an elegant solution as we would only have to add helper addresses for sfb and wds without having to mangle any special options directly into the switch.
0
Hi,

Let's say I'm an ISP and I lease a 10G transport pipe to an IX (Frankfurt or Amsterdam), with the purpose of buying transit from 2 different tier 1 providers (2 resellers, probably) and peering with content providers.

What happens inside the IX?

Do I get one switch port and I have to rent rack space for my own equipment there? The peerings are physical, with cables between my switches and the peer switches?

Or I only get a VLAN and the peerings are inside the IX main router/switch? And I route the traffic from my VLAN to my peer's VLAN?

Or?

I've googled for the past days, but I'm still confused. Anyone has real world experience with this?

Thank you.
0
Dear Zealots, is there any method to observe, monitor the traffic from one (or multiple) IP address (es) to a IP address?
We are using Cisco Router 3925, Switch 3560, 3750, 2960
Many thanks in advance,
0
Hi

I have two 48 port switch. ones POE and the other isn't. is it possible to move configs from one to the other. they are both new switches. They are only web ui managed
0
Hi,



Can anyone help in identifying why once my vpn client enabled. I can  ping all other internal IPs except 192.168.4.1(interface DatabaseZone)  and 192.168.3.1. My vpn client assigned 192.168.5.100 which is in  the range ov VpHi,



Can anyone help in identifying why once my vpn client enabled. Cant ping any of internal IPs configuration like 192.168.4.1(interface DatabaseZone) . My vpn client assigned 192.168.5.100 which is in  the range of Vpnclients object-group configuration.nclients object-group configuration.

here attached output from "show vpn-sessiondb detail remote"
vpn-sesssiondb-detail.txt
0
I have a DC running Server 2008 Standard.  I am replacing it with a new server running 2016 Standard.  Can I migrate after upgrading the schema to 2016?  Do I have to go through 2012 first on a different server?  

If not, please provide a brief breakdown of the process.  The 2008 Server is 64bit.

thank you
0
how are configurations of cisco jabber clients centrally managed? Is there a way to centrally enabled/disable chat history logging for all clients, and can this feature be enabled/disabled in the client itself? we need to determine if it is enabled for anyone/everyone/and how that can be amended for all users centrally. client is currently 11.7.1.
0
[Webinar] How Hackers Steal Your Credentials
LVL 9
[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

We are baffled by a situation where two computers are unable to access a website that more than 150 other computers are accessing with a problem. These two computers are behind a common modem and router, but tracert shows the packets make it to the server. Running Wire Shark shows:
wireshark.pngOther websites on a different server (and ip) behind the same firewall are accessible from the same two computers behind the same router and modem.

To try to clear up the situation....
Two computers (running POS Ready 2009) at location A are unable to display a website on server A (running Server 2003). This is true whether using the domain or the IP Address for the server.  These same two computers are able to access a website on the Server B (running Server 2003) which is behind the same firewall as Server A.
Other computers are able to display the same website on Server A from multiple other locations with no problems.
0
Hello,

I have a Sonicwall TZ 300 firewall being used as a gateway router for a network. The IP address scope is 10.1.1.1-10.1.1.255 on the X0 interface.

I would like to setup another network with the SAME IP address scope of 10.1.1.1 etc.. on the X2 interface to build and test another server which is eventually going to replace the server on the X0 interface. This second network has to be isolated from the the X0 interface so the two servers/networks can exist without seeing each other. Is this possible? How can I do this if so?

I have it working now as long as I use another IP scheme (10.0.0.1...) but I want to use the same IP scope to make it easier to transition to the new server down the line.
0
We have a linux server that downloads and uploads images for clients.

We need to know how much data is being used on average.
I have rx and tx from a sonicwall report but it shows from various IP addresses and I would have to add it all together.

I've saw I can use something called vnstat but i'd rather be able to do it without accessing the machine if possible.

What is the easiest way?
0
I have two locations with almost duplicate setups.  
Location 1:  On a network run by a PDC.  The ISP is a cable company.   The one office in this location has 3 computers all connected to the network via a Netgear 5 port switch.  But also connected to this switch is a DSL connection via a dsl modem line to a preset location..  When the users need to connect to this dsl line they just click on the shortcut created on their desktop that directs them to the preset IP address.   All other communication for everything else goes through the regular PDC/cable network.  Using DHCP and automatically sees PDC as DNS provider.  Works great.

Location 2;  On a network but run just by a router, not a PDC,  through the local Cable company.  Two computers connected via an identical 5 port Netgear switch as in the location 1.  They have the the exact same dsl line via the same dsl modem connecting to the same IP address as in location 1.  The problem is that you can only connect to one or the other in location 2.  If you want to connect to the dsl location via the dsl modem, you have to disconnect the cable from the router from cable company at the Netgear switch.   Or if you want to  use cable you need to disconnect dsl modem from switch.  Also running DHCP and DNS being provided by either the DSL or cable depending on which you are using.  

What would cause one to work and the almost identical one won't?
0
I have a watchguard M400 (Fireware XTM 11.10) Firewall/Router with about 14 Branch Office VPN'c coming into it. We have a new software these BOVPN's need to access. There are two application servers running the software. I would like to load balance the connections to these servers. Can someone point me in the correct direction?
0
Hi,

My apologies if I'm unable to put the question right, I am a beginner and would not understand why Im not able to log into the redundant device. These are Cisco WS-6509-E running the WS-SUP720-3B

I am trying to do an IOS upgrade on 2 devices

Device A

Device B (Redundant to Device A)

These are Access level switches and Im using SecureCRT to log into the devices. I am successfully able to log in the Device A and back up the configs. However when trying to log in to Device B - it gives me the below error

ssh: connect to host xx.xxx.z.15 port 22: Connection refused

IP of device A is xx.xxx.z.14.

What can be done in this case? Thanks in Advance !
0
For a large enterprise with over 120 locations nationwide across the WAN, our operations team needs to make updates to acls on Cisco ASAs and routers based on CCB approved changes.  Approved changes come in on a regular basis.  The problem is this becomes a maintenance hardship as a single change at one site, becomes a similar change at the majority of the other sites.  A single change has to be applied up to 120 times.  Looking for an automated way with a good management tool.  For now, there are no changes to the acls on the perimeter routers, changes only made to the acls on the ASAs.

The IP addressing scheme for all the sites are 10.10.w.x local LAN behind the firewalls, and 10.20.y.z behind the routers.  The first two octets are always the same site to site.  The third octet is the site identifier.  For example, for 10.10.27.32 the 27 represents Kansas City, for 10.10.29.32 the 29 represents St. Louis.  In both examples, the 32 represents a SQL server, and all sites use the last octet to represent a device that is identical for all the sites. So 32 last octel is always the site SQL server, last octet 45 is always the site DNS server, etc....  

When an approved firewall CR comes in for access to all the DNS servers at all the sites, the operations team inserts the acl with the address 10.10.0.45 255.255.0.255 (third octet "don't care") for each firewall at each site so that they can make the one update and push to all sites using their firewall management tool.

A…
0
Hi,

I am working on a tenable nessus audit file for ibm aix.

What i am trying to achieve is 2 compliance check on the /etc/hosts.equiv file:

1. To find all UID less that 100 and UID not equals to the default system user ids (0,1,2,3,4,5)

2. To find all GID less that 100 and GID not equals to the default system group ids (0,1,2,3,4,5)

<custom_item>
type: CMD_EXEC
description: "UID less than 100 and not system default UID"
cmd: ""
expect: ""
</custom_item>

<custom_item>
type: CMD_EXEC
description: "GID less than 100 and not system default GID"
cmd: ""
expect: ""
</custom_item>

I am really new to working with tenable and also new to aix.

Really apperciate if anyone can help me out with what i should put for the cmd and expect statement on how to make the compliance check work.

Thanks really apperciate it!

Link: https://www.ibm.com/support/knowledgecenter/ssw_aix_71/com.ibm.aix.security/passwords_etc_passwd_file.htm
0
Hi im facing a problem basically we are replacing our cisco router with asr 1001 for the internet connection.

While creating the PPPOE configuration i noticed that pppoe-client is not working on the interface which im trying to configure for WAN side interface.

I appreciate if someone has experience with regards to this router. and can guide me with the full configuration for pppoe.

Thank you
0
Automating Your MSP Business
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

We have an excel file that we want two computers to have access to. We want both computers to access the actual excel document, not the excel online version.

They don't necessarily have to be able to modify it at the same exact time, just access through excel.

Is there a way to do this with OneDrive? From what I can figure out, OneDrive only works with either both computers using the online version of excel, or one using online version and other the desktop version. Can both computers use the desktop version through OneDrive.

Any help is greatly appreciated!
0
I need to see the DNS resolution requests of my applications audited and if necessary modified before being sent. I suppose the easiest would be a local resolver that would review my requests before forwarding them to the resolver of my ISP? Another way would be to monitor and be able to override UDP/53 traffi (something I have no clue about). Is there an open source I could use?
Also, I would need this on all OS.
How would you do that? Or would there be a free solution that exists?
Need: support of iDNs as per RFC 5895 for the wole machine (transparent to applications), management of variants, parental control, typos correction. Etc.
Thank you!
0
Hi Sir i am connected to simple wifi network i want to know who is using how much bandwidth i mean the user connected to my wifi...
0
Hi Experts,

One of my clients asked me to generate a report of the availability of each device in cisco Prime Infrastructure 3.0, using the Device Health report I managed to generate an availability report for the wired network, however the AP availability isn´t generated on this report and I didn´t find another one that shows me the availability for my access points, can someone please tell me how can I generate the mentioned report.

Thanks in advance.
0
Hi,
As I am new to the Alcatel OmniVista 2500 network management software; I was wondering if anyone may know if the omnivista 2500 supports syslog forwarding? An example is it receives logs from network devices and forward it to an external entity such as SIEM.

Thanks.
0
I need something to monitor the health of BYOD devices on our network, it needs to be able to quickly scan new devices and check for updated AV, firewall, etc before letting them on the network.  Network Access Protection (NAP) has been discontinued. What are good replacements for NAP?  Is there a built-in monitor in Server 2012 or 2016? Can it be used on 2008 Windows servers?
0

Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.