Network Management

12K

Solutions

29

Articles & Videos

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

I am planning to upgrade the firmware of catalyst 2960
I checked the version I saw below

Switch#sho ver
Cisco IOS Software, C2960X Software (C2960X-UNIVERSALK9-M), Version 15.0(2a)EX5, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Mon 16-Feb-15 08:16 by prod_rel_team
ROM: Bootstrap program is C2960X boot loader
BOOTLDR: C2960X Boot Loader (C2960X-HBOOT-M) Version 15.2(3r)E1, RELEASE SOFTWARE (fc1)
Switch uptime is 46 weeks, 2 days, 1 hour, 0 minutes
System returned to ROM by power-on
System restarted at 07:50:33 UTC Fri Jul 22 2016
System image file is "flash:/c2960x-universalk9-mz.150-2a.EX5/c2960x-universalk9-mz.150-2a.EX5.bin"

I downloaded below files and I have TFTP server ready to upload the files.
c2960x-universalk9-mz.152-5b.E.bin
c2960x-universalk9-tar.152-5b.E.tar

How to upgrade to 152.5?
Your help is appreciated
0
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Hi experts

I have some laptops in a school that require strict limited control and capabilities, more so than usual due to the nature of the environment

This therefore means I have to attach a very long list of GPO's to the user accounts connected to the student OU's.

I'm wondering if applying so many GPO's will slow down the logon time significantly. We are using roaming profiles , clients on windows 8.1 , server windowsill server 2012 r2 ....

If so what's the best method to reduce logon time ....

Users have reportedly very slow logon times and I think the bandwidth in some areas of the school are a contributing factor however I'm not ruling out GPO being a big part of the issue


Any suggestion, solutions, advice and guidance welcomes

Many thanks
0
Hello,
I am currently upgrading my infrastructure to cat6, but in order to make this less expensive I may need to run straight across our drop ceiling (not dirrctly on tiles) without any near ceiling supports for 50 feet. so, is it allowable to hang jhooks on drop ceiling support wires? I will have a max total of 45 cat6 cables atleast 60 feet. I've only read reports of cable regulations (cabling installation maintenance site) that date back to 1997 stating laying on tiles is out but using recommended wire supports is in for a max weight regulation. but I've also been told by a electrician that anything running electricity can not be hung, even low voltage data cable. if any body can send my to updated site for regulations or let me know straight out yes/no and why.
thx
0
I am setting up a linux server on a small network for people to access their files, each windows computer will have local login.
I will create logins on the linux server that will be for each individual on the network.
I will map each computer with the appropriate folders that belong to those users.
How can I handle it if someone else needs to use someone else's computer and would like to access their personal files?
Should I have 2 logins, one belonging to the user of that system and a guest of some sort but how can they get to their files easily without needing me to map the drive for them? I need simple because these are not very technical people.

thanks
0
Hello everyone,

I have configured our Nagios instance to monitor a Xerox printer with the Check_SNMP_Printer plugin (https://exchange.nagios.org/directory/Plugins/Hardware/Printers/SNMP-Printer-Check/details), and am receiving information fine. The issue is that it is the wrong information. It is returning the Transfer Belt info on all checks except the paper trays (screenshot1).

If I manually run the command, I get the same response (screenshot2). I have checked the script and the Universal SNMP OIDs are correct. for my printer. If I snmpwalk the OIDs listed, they return expected output.

I am a bit at a loss as to what the issue is. I can only assume something is wrong with the logic?

Any insight i can get on this is greatly appreciated!
Screenshot1.png
screenshot2.png
0
hi guys

Barring Microsoft' SCCM, I was looking for any other applications out there which offer you the ability to automate deployment of applications, and configurations, and enforce security rules?

Even if the latter one doesn't work, perhaps the deployment of applications across a network? Any advice or any good products you're using would be appreciated.

Thanks for helping
Yashy
0
Need to buy a Nas server which will be used for the following purpose.

1. Backup my local server which is like 500GB ssd. Of vm.
2. Used as a central storage by each department that way everyone in the depart can access other people file.
3, I am not sure it's wise to buy 2 nas server. because I want to get a 4k tv and be able to download movies and access via the nas server straight on the TV, but this is for personal use in the office.
 
I will appreciate you point me in the right direction.
0
Hi,

Kindly suggest how we can take my Cisco 2925  router configuration backup in my windows machine,  Can I also schedule auto backup for it.
2nd it has 3 port and how I can configure 3rd port for 2nd wan interface.

Regards,
Naresh
0
ip routing,dns proxy ras aktivieren
0
I have a nexus switch that will sit behind a firewall, but during the setup configuration I am asked to configure out of band (mgmt0) management configuration (yes/no):

What shall I type "yes" or "no"?
0
Free Tool: SSL Checker
LVL 8
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Dear Experts,

The nexus switch is asking me for some configuration questions and just want to know what does it mean.

Configure Copp system profile (strict/moderate/lenient/dense): ?

What to select and what is Copp profile?

Thanks
0
Hi

Currently we have dispute with our external vendor and I in the Administrators in the office. After a one week break one of the finance team told me all the folder were gone in the network drive L.

Question how to write a powershell script to audit who have modified or deleted the files? Or how to check from the file server.

Regards
0
Hello - on a Catalyst 3850, how do I:

1) Show continuous logging feedback on my screen, so I can see when a link goes up or down?

2) Prevent from being logged out after 5 minutes?

thanks for your help
1
I have setup and ftp server with Windows server 2016, the same configuration works on 2012, but on 2016 anyone has an idea as of why, same settings on the firewall, work on 2012 but not on 2016
0
My Canon MF stopped working. I got a replacement from canon.

documents send to the printer/scanner will not print/scan

It's in a domain environment.

The printer got a new IP address in the DHCP I deleted the new IP and added a reservation with the IP address the the printer had before replacing it. and I see it changed on the printer screen.

Still cannot print/scan

On the workstations I see in the port configurations that it has the current IP address.

Please help
0
when I view a pc's arp table after I change the ip address in an ip camera's firmware, it shows up in "arp - a" as a dynamic instead of static. All the cameras show up as dynamic, even though I set them all manually to my scheme. I wonder why?
0
What kind of "services" do IT security firms provide aside from your traditional vulnerability assessments/penetration testing of applications infrastructure? I've noticed often IT security/IT audit is an additional service offered by many big audit and accounting firms now but I was just intrigued what kinds of service above and beyond pen testing/vulnerability scanning are offered by these IT security/IT control & assurance companies - if anything.
0
are there any free tools where you can do a remote scan of a windows device and it report to you on all missing security updates for all locally installed apps? I know MBSA will do it for Microsoft s/w but there is also Google, Java, Apple apps to review also.
0
I'm taking over a new network and the IP scheme is set up as 10.10.x.x/8. I want to change it to a/23. Can I do this within my DHCP and on my router without any changes to my printers and dusktop?
0
Major Incident Management Communications
Major Incident Management Communications

Major incidents and IT service outages cost companies millions. Often the solution to minimizing damage is automated communication. Find out more in our Major Incident Management Communications infographic.

Hi,
 
 I have SBS2011/DC network and like to know if there is a way to create a network policy that logs users out after so many minutes of inactivity. I know I can go around each workstation PC on the network and manually do it, but I would prefer to do it on the domain controller.

Thanks.
0
Hi guys

Those of you who have used network monitoring tools to get an idea of everything going on your network, what do you use? Have you got an idea of what Datadog is like?

Cheers
Yashy
0
My manage ask me to write a KPI that is traceable in numbers and can be measure in Target.

I am a Network and system administrator is there an example for this?
0
is it common for IT departments to offer SLA's to internal employees of the same business? I totally understand it if your selling a service to a customer, but wasn't sure if its common to have internal SLA's with the various employees and departments within the same business? If you do have internal SLA's, is this per application, or more generic? I understand most places will have SLA for resolving calls with internal employees, but wasn't sure if its common for more top level categories such as availability / performance?
0
Is there a portal for AT&T SIP trunk customers? We've asked our AT&T sales rep and Tech consultant over and over for this information but they can't seem to find it. I want to be able to forward DIDs which are part of our SIP trunks. So simple - yet so complex for the behemoth.
0
Details:
Cisco ASA 55xx firewall
Anyconnect client: 4.2

Infrastructure. Wired and Wireless

Wireless is on a separate network from LAN all together.  Often people take laptop from desk and connect to the wireless. When they return to their desk, connect to the LAN via docking station , they stay on the VPN. Any way to configure the ASA to tell the Anyconnect client either to:
1) IF on LAN, do not connect.
2) IF connected on VPN, and LAN is detected, disconnect.

Thank you.
0

Network Management

12K

Solutions

29

Articles & Videos

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.