Chapter 1 - Introduction To Network Maintenance Objectives
Chapter 1 - Introduction To Network Maintenance Objectives
Maintenance
Objectives
Chapter 1
Maintenance Tasks
•Device installation and maintenance: Includes tasks such as
installing devices and software and creating and backing up
configurations and software.
Chapter 1
Structured Maintenance
•Structured network maintenance predefines and plans
much of the processes and procedures (proactive).
Chapter 1
Standards-Based Maintenance
Methodologies
•Several well-known network maintenance
methodologies have been defined by a variety of
organisations:
Chapter 1
Maintenance Procedures & Tools
•Fault management: network problems are discovered and corrected.
•Configuration management: installation, identification, and
configuration of hardware and services.
•Accounting management: optimally distribute resources among
enterprise subscribers.
•Performance management: managing the overall performance of the
enterprise network.
•Security management: Security management is responsible for
ensuring confidentiality, integrity, and availability (CIA).
•Upon selection of
a network
maintenance
model, you must
translate the
theoretical model
to practical
procedures
Chapter 1
Network Maintenance Task
Identification
All network maintenance plans need to include
procedures to perform the following tasks:
Chapter 1
Change Control
•In many companies, change control is formalised and
answers the following types of questions:
Chapter 1
Network Documentation
•Typical elements of network documentation include the
following:
1. Network drawings: Diagrams of the physical and logical
structure of the network.
2. Connection documentation: Lists of all relevant physical
connections, such as patches, connections to service
providers, and power circuits.
3. Equipment lists: Lists of all devices, part numbers, serial
numbers, installed software versions, (if applicable)
software. Licenses, warranty/service information.
4. IP address administration: Lists of the IP subnets scheme
and all IP addresses in use.
5. Configurations: A set of all current device configurations
or even an archive that contains all previous configurations.
6. Design documentation: This is a document describing the
motivation behind certain implementation choices.
Chapter 1
Effective Communication
Chapter 1
Standardisation
•One of the ways to streamline processes and make sure
that tasks are executed in a consistent manner is to
define and document procedures; this is called
standardization.
1. Replacement hardware.
2. The current software version for the device.
3. The current configuration for the device.
4. The tools to transfer the software and configuration
to the device.
5. Licenses (if applicable).
6. Knowledge of the procedures to install software,
configurations, and licenses.
Chapter 1
Cisco Log Severity Levels
Chapter 1
Configure Logging
Syslog Server
10.2.2.6
R3
Log to R3 memory:
R3(config)#logging buffered 16384
R3(config)#logging console warning
R3#sh logging
•A machine that runs NTP automatically chooses the machine with the
lowest stratum number to communicate with via NTP as the machine’s time
source.
Source(config)#ntp master 5
Source(config)#ntp source loopback 0
Source(config)#clock timezone cet -1
Fa0/1 R1 Fa0/2
10.1.50.1
•More-secure protocols such as FTP, SCP, and HTTP or HTTPS can be used as
a means of transferring configurations and software.
•To use any of these more-secure protocols, the username and password must
be provided to authenticate to the server.
•The username and password are specified by placing the username and
password as username:password@ before the server name or IP address in
the URL:
Chapter 1
Username & Password Configuration
Client FTP Server
Fa0/1 R1 Fa0/2
10.1.50.1
•The username and password can be specified in the
configuration, instead of on the command line, for the FTP, HTTP,
and HTTPS protocols:
Fa0/1 R1 Fa0/2
10.1.50.1
•The configuration archiving feature, part of the Configuration Replace
and Configuration Rollback feature can be used to create local or remote
configuration archives.
R1(config)# archive
R1(config-archive)# path flash:/config-archive/$h-config
R1(config-archive)# write-memory
R1(config-archive)# time-period 10080
•Verify the presence of the archived configuration files by
using the show archive command:
R1# show archive
There are currently 2 archive configurations saved.
The next archive file will be named flash:/config-archive/RO1-config-3
Archive # Name
1 flash:/config-archive/RO1-config-1
2 flash:/config-archive/RO1-config-2 Chapter 1
Configure Replace
•The configure replace command enables you to replace the
currently running configuration on the router with a saved
configuration without the need to reload:
R1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)# hostname TEST
TEST(config)#
TEST# configure replace flash:config-archive/RO1-config-5 list
This will apply all necessary additions and deletions to replace the current running
configuration with the contents of the specified configuration file, which is
assumed to be a complete configuration, not a partialconfiguration. Enter Y if you
are sure you want to proceed. ? [no]: yes
!Pass 1
!List of Commands:
no hostname TEST
hostname R1
end
Total number of passes: 1
Rollback Done
R1#
Chapter 1
Chapter 1 – Introduction to Network
Maintenance
Objectives
Chapter 1
Any
Questions?
Chapter 1