[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Network Management

13K

Solutions

15K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.

Share tech news, updates, or what's on your mind.

Sign up to Post

I am trying to connect to a NAS drive from a host server,

The NAS is domain joined.

When I connect either by hostname, or by IP I get the network error that windows cannot access…

I am able to ping it by name and IP.

Network discovery is turned on.

Server 2012
2
HTML5 and CSS3 Fundamentals
LVL 12
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

How did an ethernet port (on Switch1) with Spanning Tree Protocol enabled bring another ethernet switch (Switch2) off-line when connected to it?  Switch2 did not have spanning tree enabled.

I was setting up a new Wireless Controller (switch1) in our test lab.  The test lab has an HP ProCurve Switch(Switch2).  The Wireless Controller is essentially an Ethernet Switch with several Ethernet ports and a bit more functionality.  Apparently the new Aruba Wireless Controller (Switch1) has all of its ethernet ports automatically enabled with Spanning Tree.

When I plugged the Spanning Tree Port 0/0/0 (switch1) into another Ethernet switch port (Switch2) in about 30 seconds … Switch2 became off-line.  As a result aoof the other devices connected to Switch2 were off-line as well.  When I un-lugged the Aruba Wireless Controller (Switch1) connection from Switch2 port that Switch came back on-line.  The Aruba tech noticed that the Aruba (Switch1) port 0/0/0 was in 'Blocking' STP mode when it connected to the Switch2 so the Aruba Tech disabled the Spanning Tree Protocol for that interface port and then the problem went away.  

I wish to understand how STP works and why did that switch port with STP enabled brought the other switch off-line.  I have reviewed some material on-line: https://en.wikipedia.org/wiki/Spanning_Tree_Protocol   But I still have questions that I wish to clarify.

Question1:  Am I to understand for STP to work correctly that every other switch on the network …
0
Hey Experts.  Looking to upgrade the Cisco software of several 2960x switches.  Current version is 15.0(2)ex4 and after downloading the newer version 15.2,4e6 but wasn't sure if I can go from where I am to the newer version without any steps in between.  Would appreciate advisement on this.  Thanks Experts.
0
One of the monthly IT Security metrics in my previous place is
to show  # of 'High' DDoS alerts for the month (leaving out the
Med & Low ones), extracted from Arbor Peakflow of cleanpipe.

Attached is how one such extraction looks like: basically we'll
count the # of 'High' alerts.

In new place, question was raised how this data can be useful
as IT Security metric.

My guess is Audit wants to see a trend (of 6-12 months) of the
# of 'High' alerts for DDoS: if it's always about the same, no
alarm but, say for a particular month, it triples, it's a concern?

Anyone has any clue how this data (or any other Peakflows'
data) could be useful for presentation to serve as IT Security
metrics?

Anyone has any Application DDoS security metrics that could
be useful as IT Security metrics?
DDoS.jpg
1
Hi,

I may have a stupid question but, I have ip address for proxies and I want to find open ports for it. Can you help me find online tools for this?

Thank you!

misskittens
0
Basically it is not a technical problem ,, i just want to know further about experts exchange ,, as i am on 7 days free trial ... my question is what is annual subscription for it ,,, and if i go for annual subscription ,, what benefits i will have from experts exchange ,. i mean i can enroll any class from such subscription or after subscription i have to pay separately for whatever course I am enrolling for .

Looking forward to your favorable reply
0
With Solar Winds NPM v12.1 I want to get an alert via email if the following snmp
trap is received:

snmpTrapOID = PAN-TRAPS:p​anROUTINGR​outedBGPPe​erEnterEst​ablishedTr​ap

I don't see a specific direct means in Orion for creating an alert from a trap. But
perhaps this could be done with a custom SQL query? Any insight appreciated.
0
Interface Multilink Vs Interface Virtual Template on Cisco Routers

I would like to know the difference between using the commands :
Interface Multilink Vs Interface Virtual Template

it looks like they achieve the same thing.

Any idea ?

Thank you
0
I was doing major upgrades over the weekend of Cisco switches. I needed to run a series of show commands via terminal console. The connection was USB adapter brand ATEN I think to Cisco blue console cable. Many time my Win 10 Dell 7490 laptop would crash BSOD. More likely a putty problem or USB SERIAL adapter driver problem? Any recommendations for a solid professional grade serial connection for my Win 10 laptop or ideas for a fix?
0
Hi guys

As we have multiple offices at our work place, we constantly have users leaving and new ones beginning. We want to keep a floor map of PC names, their locations along with the users.

This is so that when we want to do things like apply updates and they fail to a PC, we can allocate where they physically are and access that machine or even request the user to do the necessary from their end.

Does anybody use any applications to manage this?

Thank you
Yash
0
Microsoft Azure 2017
LVL 12
Microsoft Azure 2017

Azure has a changed a lot since it was originally introduce by adding new services and features. Do you know everything you need to about Azure? This course will teach you about the Azure App Service, monitoring and application insights, DevOps, and Team Services.

What are some free proxies out there that could do blacklisting (& possibly greylisting)
as well as auto-block by know malicious sources (eg: get updates from SpamHaus,
AlienVault, bad Reputation sites & known sources of malwares).

Ideally the free proxies could also stop users from downloading executables or
a specified file types.  No plan to go for commercial ones like Bluecoat.
0
in practice, where in the network (for shaping WAN/Internet traffic)  is best to connect packetshaper  in terms of security  and in terms of best network design?

Betw WAN router n external firewall, at DMZ external facing firewall or ?
0
What are the steps to lookup the SonicWALL VPN domain name?

This "domain name" can be different than the Active Directory domain name and needs to be entered within the SonicWALL NetExtender VPN connector. Where within the SonicWALL configuration settings can I look up the "domain name"?

SonicWALL NetExtender
1
We would like to monitor when a server, switch, router, and firewall goes down. We have a remote site that's "unattended", however, we would like to keep an eye when a device mentioned before goes down?

Do you have a suggestion that we can consider? Thanks so much.

Regards,
0
Consider the below scenario

userPC---- firewall --- Destination-server
                         10.1.1.1


I have installed some software on the server, the service  of that software is using port # 301.

1) Scenario...
      Firewall defined
      server#  service UP
        userPC# telnet 10.1.1.1 301  --> user get reply

2)Scenario...
      Firewall defined
      server# service DOWN

is there any command/3rdparty-tools available to just varify, pockets from userPC able to reach on the server through port#301

==
This I asked just to segregate if there any issue, problem from firewall side (or) destination server side.
0
I need to tool like threadfix to tracking vulnerability in complex environments
0
Dear Experts

We are solution implementer like crm application and even server hosting for those companies who require us to host and maintain servers. Recently few of clients are mentioning about soc2 compliance. Can you please help me understand with respect to solution implementation point of view what does soc2 compliance means and how does it help our business, thanks in advance.
0
Hi guys

Do you have a checklist that you go through for your network infrastructure on a daily basis that you are able to upload at all? We have one, but I was just keen to see what others are using and perhaps add the things (if relevant) to or list?

We do checks for fileserver space, VPN tunnels, backups, alerts for Vmware and Firewalls.

Thanks for helping
Yashy
0
I need to factory default a Calyptix AE800.  I took over this network from an IT company who will not share the login information.  I can't find any information on line, and there is no reset button on it.  Anyone who can help would be appreciated!  Thanks!
0
Introduction to R
LVL 12
Introduction to R

R is considered the predominant language for data scientist and statisticians. Learn how to use R for your own data science projects.

There is an IP address in South Korea that has been probing my router for weeks now.  I have them blocked, but I would like to report them to some entity/agency that can get it shut down.  They will hit a single UDP port once a second for 20 seconds.  Then there will be a pause of 2 to 5 minutes and they will try again on a different port number.  What is the best way to handle this?
0
We would like to introduce 802.1x on our Cisco switches. The environment consists of various devices (printers, phones, scanners etc) which may or may not be 802.1x aware. I know that we can use MBAC to get them to authenticate using MAC addresses, however I'm wondering what needs to be done for the users desktops and laptops.

The users devices are all Windows 10. Does the operating system have the relevant configuration/controls/software already built-in or do you need specific supplicant software installed to get it to work? I'm speculating we could install a RADIUS server on an existing Windows server (2012) to provide the AAA aspect? Are there any good articles that describe how to set it all up?
0
Hi guys, non-technical question here.
 Does anyone have any format or an example for the new hire justification.  Instead of asking management "hey can I hire someone to help me, I am working 12 hrs per day"
Maybe someone has previous example or a set format showing the following things or similar:

1) Justify why you need help.
2) Explain your current situation, hours and work load
3) Tell how a new hire/resource will benefit the company, for example, improved revenue by 5%, completion of projects 25% faster, improved customer satisfaction rating, etc.
4) Justify the cost and how the proceeds will offset that person.
5) Show the long term strategy of this person and how this person fits into the organization
6) Show your new role on you being the manager and how this will free up your time for more strategic goals
7) Finally, show how this new hire aligns with company strategy and direction and how your department will be able to meet or exceed those goals.

Appreciate any help/advice.
0
Dear Office 365 Experts,
I would like to find out what articles/videos you'd like to share for the best practice/required network connectivity for Office 365. Our network folks do not have any background and or vision as to where to go or what to do, so anyone that could shed some info, would be greatly appreciated. I know we should/can involve an MS resource but just wanted to prep/use some background info in parallel that they can work on/read about.

Thanks!
0
Anyone here have experience implementing and managing a good parental control app on their child's iOS device(s)?

I'd prefer one that does not utilize a VPN (too easy to disable) and does not require the client to be on wifi. It should function on both LTE and WiFi. I don't care if the product is overly complex. I just want a reliable tool to be able to monitor usage, disable Internet access on the fly, potentially set time limits at the app-level and make sure the entire app can't be easily skirted by my kid.

There are so many different products on the market, there are hundreds of unhelpful review sites and the actual app-store 'user reviews' are full of negative comments made by people who have minimal technical experience. It's made the process of narrowing down the selection, extremely cumbersome.

I'd like to hear your personal experience with specific apps and what the shortcomings were that you ran up against. I expect I'll have to make concessions as far as functionality goes, so I'm hoping to hear about potential dealbreakers.
0
We have a scheduled power outage in the small remote office.  Mostly network gear.  Few switches and firewalls.  No servers.
I know the UPS wouldn't be able to hold that long.  
What's should be the advised steps?   Shutdown the equipment prior to the outage and have someone onsite to startup after?  
How other folks doing it?  
Thanks in advance
0

Network Management

13K

Solutions

15K

Contributors

Network Management involves issues that are independent of specific hardware or software, including email policies, upgrade planning, backup scheduling and working with managed service providers for Desktop-As-A-Service (DaaS), Software-As-A-Service (SaaS) and the like through the use of tools, coupled with manufacturer standards, best practice guidelines, policies and procedures plus all other relevant documentation. Network management also includes monitoring, alerting and reporting, management reporting, planning for device or service updates, the backup of configurations, the setting of key performance indicators and measures (KPIs/KPMs), associated service level agreements and problem records as part of the IT Service Management (ITSM) framework.