1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
§Network Configuration files should contain all relevant information about any devices including:
•Type of device, model designation
•IOS image name
•Device network hostname
•Location of the device
•If modular, include module/slot info
End-system configuration files
__ __ __ focus on the hardware and software used on end-system devices such as servers, network management consoles, and user workstations
Network topology diagrams
__ __ __ keep track of the location, function, and status of devices on the network.
•Physical topology
•Logical topology
There are two types of topology diagrams:
Physical Topology
__ __ network diagrams show the physical layout of the devices connected to the network and typically include:
•Device type
•Model and manufacturer
•Operating System version
•Cable type and identifier
•Cable specification
•Connector type
•Cabling endpoints
Logical network topology
__ __ __ diagrams illustrate how devices are logically connected to the network
Symbols
are used to represent network elements, such as routers, servers, hosts, VPN concentrators, and security devices.
network monitoring
The purpose of __ __ is to watch network performance in comparison to a predetermined baseline.
network performance baseline
•Is used to establish normal network or system performance
•Requires collecting performance data from the ports and devices that are essential to operation
•Allows the network administrator to determine the difference between abnormal behavior and proper network performance
Ping, traceroute, and telnet
___ , __ , and __ are useful commands to document.
Sophisticated network management software
____ is typically used to baseline large and complex networks.
Stage 1. Gather symptoms
Stage 2. Isolate the problem
Stage 3. Implement corrective action
General Troubleshooting Procedures
Stage 1. Gather symptoms
•Gather and document symptoms from the network, end systems, and users.
•The network administrator determines which network components have been affected and how the functionality of the network has changed in comparison to the baseline.
•Symptoms may come from the network management system, console messages, and user complaints.
•Ask questions and investigate the issue in order to localize the problem to a smaller range of possibilities.
Stage 2. Isolate the problem
•Isolating is the process of eliminating variables until a single problem, or a set of related problems has been identified as the cause.
•The network administrator should examine the problems at the logical layer of the network so that the most likely cause can be detected.
Stage 3. Implement corrective action
•After identifying the cause of the problem, the network administrator works to correct the problem by implementing, testing, and documenting possible solutions.
•Can the solution be implemented immediately, or does it need to be postponed?
•The severity of the problem should be weighed against the impact of the solution.
Step 1. Gather Information
Step 2. Determine ownership
Step 3. Narrow the scope
Step 4. Gather symptoms from suspect devices
Step 5. Document symptoms
Five Steps to gathering Information