* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download CiscoS3C8
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Computer network wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Network tap wikipedia , lookup
Cisco S3C8 Network Management Documentation • diagrams that indicate the path of the physical wiring layout; • the type of cable; • the length of each cable; • the type of termination for the cable; physical location of each wall plate or patch panel, and; • a labeling scheme for easy • identification of each wire. Documentation • Also includes: – – – – – – Layout of MDF Layout of IDF Physical layout of rack mounts Auxiliary equipment & servers Patch panel labels Identification and configuration of all equipment in MDF and IDF Documentation • Also includes: – – – – – – – – Server and workstation configuration details Physical location User Network ID – IP address, MAC address Subnet, Topology; IRQ, SMA Software installed O/S Repair Record Documentation / Security • Soft – User rights, password, firewall support • Hard – – – – Locking MDFs and IDJs Who has access to MDF and IDF How hosts are protected Who has physical access to system • Documentation needs to be updated Data Recovery • UPS, Tape Backup, and Disk Arrays – Full, incremental, differential, copy and daily – Tape backup is cheap • Sequential Storage • Archive Bit – Allows for INCREMENTAL backup • Only backup what has changed since last backup date Disk Redundancy • Raid 0 stripes data across multiple disks, no parity • Raid 1 disk mirroring – disk duplexing – writes data to two identical partitions • Raid 2 writes across multiple disks with error checking • Raid 3 stripes data one byte at a timededicated parity drive • Raid 4 stripes one sector at a time- dedicated parity drive • Raid 5 stripes data and parity across Environmental Factors • • • • Static Contaminants – smoke, dust and dirt Heat – high temperatures Protection – Isolate transformers; use regulators and line conditions and UPS Viruses • Worm • Virus • Trojan propagates itself infects files disguised as a game, utility or application – Know where software came from – Don’t use unknown disks – Use current virus checker Network Types • Peer-to-peer – Workgroup network • Small number of workstations – W95 W98 Lantastic – 10 workstations • Client Server – Controlled by a NOS (Network Operating System • Unix – NFS security , multitasking, kernel, supports many users Network Control • • • • User rights Account numbers Passwords Access Baseline Measurements • Bandwidth used • Collisions • Broadcast traffic Scientific Method – Trouble Shooting • 1. Identify network/user problem. • 2. Gather data about network/user problem. • 3. Analyze data to come up with a possible solution to the problem. • 4. Implement solution to network to attempt correction to the system. • 5. If the problem isn't resolved, undo previous changes and modify data. • 6. Go to step 3