Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi, I have a problem with my website(dealclik.us) pinging and loading webpages, this website is loading properly but except for one customer it is redirecting to xyz.xyz

I have talked to hosting providers, they are not able to fix this as they could not see any problem with the website. Please help me in fixing this. I asked that particular customer to restart their router, they have a static IP, they restarted the router but the issue is not fixed, how to fix this? please help!!

Thanks in advance.
0
Online Training Solution
Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

We have difficulties getting monthly downtimes from business & applications teams.

Beside using HA/clustering where we patch one side, swing over (incurring several seconds
or minutes of downtime) & patch the other side, what are the ways people deploy patches
with no or minimal downtime?

I guess Tandem's  Non-Stop Himalaya  could achieve this but what we have here are:
a) AS400 or OS/400 R7
b) Windows 2008 R2 & 2012
c) UNIXes (Solaris, AIX, RHEL)
d) Cisco switches/routers
e) Checkpoint & Juniper firewalls


What is TrendMicro's  virtual patching & does it help minimize downtime for patching?
0
Hello,
     We use RealVNC to to monitor a couple of PCs that are at a remote location. We have never had a problem using it but since upgrading the firmware on our  Sonicwall NSA 220 the firewall now stops the connection with the following alert: IPS Prevention Alert: MISC RealVNC Authentication Bypass, SID: 5828, Priority: Medium. How can I stop the firewall from blocking these events?

Thank you
0
I have a sonicwall NSA250 and i have a 50GB fiber coming into the office. I want to partitiont he bandwidth allow Vlan1 to get 40GB and Vlan2 to get 10GB. Can this be done in sonicwall?
0
How do I go about setting the QoS recommendation, ie EF/AF4/Af3 etc for MPLS network?  What parameters should I be looking? The SP wants us to tell them what we want?
0
hi guys

I am setting up a Excel password sheet that is protected with information regarding  our domain passwords and switches etc. With the issue of ransomware etc becoming a grander problem by the day, I am now being asked to not only create these protected password sheets on the network, but also in the cloud with providers like 'LastPass'.

Would you or have you done this and feel safe to put your passwords in a vault in the cloud?

Thanks for helping
Yashy
1
Looking for a application I caN check out my network to see if there is a issue in loss of connects delays slow connection and if, which point and what application. Any recommendations but not something that should break my pocket.
0
are there any free tools which could scan a drive on a file server for potential inappropriate images, based on a nudity type calculation. I know these things exist in forensics communities but I have yet to see anything that is free. we need to do a quick scan to ensure one of our employees has not stored any inappropriate material on one of our file servers.
1
Dear zealots, I am configuring Routers and Switch to mitigate DDoS attacks, following this article: http://www.infosecwriters.com/Papers/HChau_Cisco-DoS-DDoS.pdf

However, when I enter "no ip directed-broadcast" into Router and Switch's interface mode, then it cannot be displayed when I hit "show run". Do you know why? My devices' version is 12.2 (Switch 3750/3560) and 15.1 (Router 3925)

And should I apply this command on VLAN interfaces in Switches?
1
I am planning to upgrade the firmware of catalyst 2960
I checked the version I saw below

Switch#sho ver
Cisco IOS Software, C2960X Software (C2960X-UNIVERSALK9-M), Version 15.0(2a)EX5, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Mon 16-Feb-15 08:16 by prod_rel_team
ROM: Bootstrap program is C2960X boot loader
BOOTLDR: C2960X Boot Loader (C2960X-HBOOT-M) Version 15.2(3r)E1, RELEASE SOFTWARE (fc1)
Switch uptime is 46 weeks, 2 days, 1 hour, 0 minutes
System returned to ROM by power-on
System restarted at 07:50:33 UTC Fri Jul 22 2016
System image file is "flash:/c2960x-universalk9-mz.150-2a.EX5/c2960x-universalk9-mz.150-2a.EX5.bin"

I downloaded below files and I have TFTP server ready to upload the files.
c2960x-universalk9-mz.152-5b.E.bin
c2960x-universalk9-tar.152-5b.E.tar

How to upgrade to 152.5?
Your help is appreciated
0
NEW Veeam Agent for Microsoft Windows
LVL 1
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

I have many large folders on the server that I believe no one is using. I would like to set up logging over the next six months to verify no one is accessing them. Then I can safely archive the folders.

This is running on a Windows 2012 R2server.

I am finding software to report on this that is too expensive. I'd rather use windows event logging to track this or anything less than $150.

How is this set up and how do I report on this?
0
Purchased TZ210 product code 7131 in 2013....firmware SonicOS Enhanced 5.9.1.8-11o for my EMR.

Upgraded from 50 mps to  fios 150 mps service. After speed test its not even close.  Tested at the router we are getting 150 into the Sonic 40 coming out.  Help.......

Thanks Barry
0
Hi experts

I have some laptops in a school that require strict limited control and capabilities, more so than usual due to the nature of the environment

This therefore means I have to attach a very long list of GPO's to the user accounts connected to the student OU's.

I'm wondering if applying so many GPO's will slow down the logon time significantly. We are using roaming profiles , clients on windows 8.1 , server windowsill server 2012 r2 ....

If so what's the best method to reduce logon time ....

Users have reportedly very slow logon times and I think the bandwidth in some areas of the school are a contributing factor however I'm not ruling out GPO being a big part of the issue


Any suggestion, solutions, advice and guidance welcomes

Many thanks
0
Hello,
I am currently upgrading my infrastructure to cat6, but in order to make this less expensive I may need to run straight across our drop ceiling (not dirrctly on tiles) without any near ceiling supports for 50 feet. so, is it allowable to hang jhooks on drop ceiling support wires? I will have a max total of 45 cat6 cables atleast 60 feet. I've only read reports of cable regulations (cabling installation maintenance site) that date back to 1997 stating laying on tiles is out but using recommended wire supports is in for a max weight regulation. but I've also been told by a electrician that anything running electricity can not be hung, even low voltage data cable. if any body can send my to updated site for regulations or let me know straight out yes/no and why.
thx
0
I am setting up a linux server on a small network for people to access their files, each windows computer will have local login.
I will create logins on the linux server that will be for each individual on the network.
I will map each computer with the appropriate folders that belong to those users.
How can I handle it if someone else needs to use someone else's computer and would like to access their personal files?
Should I have 2 logins, one belonging to the user of that system and a guest of some sort but how can they get to their files easily without needing me to map the drive for them? I need simple because these are not very technical people.

thanks
0
There have been vendors accesses via Rdp & Teamviewer with internal staffs help :
staff use a broadband (Guest network & 4G) to connect their laptop to & their LAN
to the corporate network.

How can I thoroughly trace these down & block them?

Certainly they'll need sort of accounts to login, right?
0
Hi,

We are looking for recommendations for a network level internet filter.
At the moment, we are using OpenDNS or draytek content filter, but neither are particularly robust.

Our main requirement is that it be a network filter in the true sense, in that there is no need to install an agent on the end-user device or have to deploy proxy settings. The above filters work at the router level.

Another nice feature, but not as essential, would be to have granular controls, rather than one policy for all.

Does anyone have any recommendations?

Thanks!
0
Hello everyone,

I have configured our Nagios instance to monitor a Xerox printer with the Check_SNMP_Printer plugin (https://exchange.nagios.org/directory/Plugins/Hardware/Printers/SNMP-Printer-Check/details), and am receiving information fine. The issue is that it is the wrong information. It is returning the Transfer Belt info on all checks except the paper trays (screenshot1).

If I manually run the command, I get the same response (screenshot2). I have checked the script and the Universal SNMP OIDs are correct. for my printer. If I snmpwalk the OIDs listed, they return expected output.

I am a bit at a loss as to what the issue is. I can only assume something is wrong with the logic?

Any insight i can get on this is greatly appreciated!
Screenshot1.png
screenshot2.png
0
hi guys

Barring Microsoft' SCCM, I was looking for any other applications out there which offer you the ability to automate deployment of applications, and configurations, and enforce security rules?

Even if the latter one doesn't work, perhaps the deployment of applications across a network? Any advice or any good products you're using would be appreciated.

Thanks for helping
Yashy
0
Create the perfect environment for any meeting
Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Need to buy a Nas server which will be used for the following purpose.

1. Backup my local server which is like 500GB ssd. Of vm.
2. Used as a central storage by each department that way everyone in the depart can access other people file.
3, I am not sure it's wise to buy 2 nas server. because I want to get a 4k tv and be able to download movies and access via the nas server straight on the TV, but this is for personal use in the office.
 
I will appreciate you point me in the right direction.
0
Hi,

Kindly suggest how we can take my Cisco 2925  router configuration backup in my windows machine,  Can I also schedule auto backup for it.
2nd it has 3 port and how I can configure 3rd port for 2nd wan interface.

Regards,
Naresh
0
ip routing,dns proxy ras aktivieren
0
Does CISCO ASA 5505 supports network management and bandwidth management as well?
0
I have a nexus switch that will sit behind a firewall, but during the setup configuration I am asked to configure out of band (mgmt0) management configuration (yes/no):

What shall I type "yes" or "no"?
0
Dear Experts,

The nexus switch is asking me for some configuration questions and just want to know what does it mean.

Configure Copp system profile (strict/moderate/lenient/dense): ?

What to select and what is Copp profile?

Thanks
0

Network Management

12K

Solutions

14K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.