SlideShare a Scribd company logo
1 of 17
Chapter 13
Troubleshooting

Networking Concepts – Eric Vanderburg ©2005
Proactive measures


Policy
Naming conventions
 Internet use policy
 Security policy
 Privacy policy


Networking Concepts – Eric Vanderburg ©2005
Proactive Measures


Planning




Network diagrams
Documentation













Address list
Cable map
Contact list – who to contact when an event happens
Equipment list
Network history – upgrade history
Network map
Hardware configuration – routers, switches…
Server configuration
Licensing
Users

Software should be used to speed the process up

Networking Concepts – Eric Vanderburg ©2005
Network Inventory

Networking Concepts – Eric Vanderburg ©2005
Machine Screen from Inventory

Networking Concepts – Eric Vanderburg ©2005
Backup
Determine the files to backup
 Make a schedule
 Specify backup personnel
 Test the backups
 Record and check backup logs


Networking Concepts – Eric Vanderburg ©2005
Upgrades
Establish guidelines for upgrades
 Give users advance notice of changes
 Backup prior to each upgrade
 Upgrade during off time
 Test upgrades in a lab or with a pilot
group to resolve problems early
 Have plan to undo upgrade installation if
necessary


Networking Concepts – Eric Vanderburg ©2005
Logging


Auditing







Enable auditing on all servers
Audit administrative actions
Audit critical files and folders
Audit access to certain rights

Filter and review logs regularly



Event Viewer
Programs have their own logs too (.log, .txt)


Windows setup logs: setuterr.log, setupapi.log,
setuplog.txt

Networking Concepts – Eric Vanderburg ©2005
Utilities







Snort IDS
Ethereal Protocol analyzer
Network Monitor
Port scanners
SNMP (Simple Network Management Protocol)






MIB (Management Information Base) – place where each agent
stores its informaiton
Agents are installed on hosts – they report back to a SNMP
management program
Basic network configuration can take place through SNMP

RMON (Remote Monitoring)





Agents (probes) can be hubs, switches, or routers also (not cheap)
Has 8 different MIB types
RMON1 works at layer 1 & 2
RMON2 works at layer 3 and above

Networking Concepts – Eric Vanderburg ©2005
Customer Relations Skills


Users are customers, and the reason network
personnel have jobs






Best source of information when something goes
wrong with network
Develop special relationships with adept users

Develop guidelines about user interaction


Include how to question and respond to users,
handle irate users, and general user
communication etiquette

Networking Concepts – Eric Vanderburg ©2005
Troubleshooting structured approach



Set a priority
Collect information about the problem



When did it happen
What has changed since the time when it was
working properly





List possible causes
Test each possible to find actual
Try at least one solution for each potential
cause
 Do only one test at a time
 Document the solution
Networking Concepts – Eric Vanderburg ©2005
Tools
DVM (Digital Voltmeter) – measures the
resistance of cables to find a cable break
 TDR (Time Domain Reflectometer) –
Determines a break in the cable and specifies
where. Can also measure cable length
 Cable testers – check for correct termination,
attenuation, measures frame counts, ect..
 Oscilloscope – measures signal voltage over
time. Checks for breaks, crimps, and
attenuation problems.


Networking Concepts – Eric Vanderburg ©2005
Software Tools
Protocol Analyzer
 MSBA (Microsoft Baseline Security
Analyzer)
 Port Scanner


Networking Concepts – Eric Vanderburg ©2005
Resources









MS Technet
(www.microsoft.com/technet/default.mspx)
MS Knowledge base – look up error codes
here. (support.microsoft.com)
Novell Knowledge base (support.novell.com)
MSDN (Microsoft Developer’s Network)
Newsgroups
Forums
Periodicals

Networking Concepts – Eric Vanderburg ©2005
Troubleshooting







Check physical first
Define scope – user, group, entire network
Given problem information, develop a list of possible bad
software or hardware
Run tests on a component or application
Put a suspect component in a situation where everything else
works.






Example: NIC is suspect. Take it out and place it in a computer that
is working properly and see if the NIC works there.
Example: Application does not work. Install on another PC and
check

Check logs
Lookup error codes

Networking Concepts – Eric Vanderburg ©2005
Troubleshooting


Install needed service packs and patches
 Types








QFE (Quick Fix Engineering) patch – first fix to a
problem
Hotfix – a QFE that has been tested for errors and
is packaged with an installer
Cumulative patch – a group of hotfixes that pertain
to a specific platform or product
Service pack – a cumulative patch that undergoes
months of intensive testing.

Networking Concepts – Eric Vanderburg ©2005
Test


Test lab or pilot program
 Test patches before applying them on the
network


SUS (Software Update Services) – creates an
alternate windows update for network clients. MS
updates can be approved first before appearing on
the list.






Must be Win2k (SP3) or Win2k3

SMS (Systems Mgmt Server) – SUS plus inventory,
application usage tracking, vulnerability checks,

Test upgrades & new software
Networking Concepts – Eric Vanderburg ©2005

More Related Content

What's hot

Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
rajrayala
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
Mohit Mehra
 

What's hot (20)

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric VanderburgNetworking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
 
Networking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric VanderburgNetworking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
Wi fi
Wi fiWi fi
Wi fi
 
Zigbee wireless control made easy
Zigbee wireless control made easyZigbee wireless control made easy
Zigbee wireless control made easy
 
Zigbee technology
Zigbee technology Zigbee technology
Zigbee technology
 
Zigbee
 Zigbee    Zigbee
Zigbee
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Wireless
WirelessWireless
Wireless
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
 
Zigbee technology2
Zigbee technology2Zigbee technology2
Zigbee technology2
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 

Similar to Networking Concepts Lesson 13 - Troubleshooting - Eric Vanderburg

802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
Savvius, Inc
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
Brandon Height
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
TEST Huddle
 
System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)
Mike Sanders
 
CIRED1259-No Smart MV-LV station without a smart approach - final
CIRED1259-No Smart MV-LV station without a smart approach - finalCIRED1259-No Smart MV-LV station without a smart approach - final
CIRED1259-No Smart MV-LV station without a smart approach - final
Elise Morskieft
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 

Similar to Networking Concepts Lesson 13 - Troubleshooting - Eric Vanderburg (20)

The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution802.11n: Platform vs. Point Solution
802.11n: Platform vs. Point Solution
 
Realise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center InfrastructureRealise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center Infrastructure
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
 
V&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple StandardsV&V Lessons Learnt under multiple Standards
V&V Lessons Learnt under multiple Standards
 
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
'Automated Reliability Testing via Hardware Interfaces' by Bryan Bakker
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testing
 
System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
 
James IT Resume
James IT ResumeJames IT Resume
James IT Resume
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
2 set-up-computer-networks
2 set-up-computer-networks2 set-up-computer-networks
2 set-up-computer-networks
 
CIRED1259-No Smart MV-LV station without a smart approach - final
CIRED1259-No Smart MV-LV station without a smart approach - finalCIRED1259-No Smart MV-LV station without a smart approach - final
CIRED1259-No Smart MV-LV station without a smart approach - final
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Swimming upstream: OPNFV Doctor project case study
Swimming upstream: OPNFV Doctor project case studySwimming upstream: OPNFV Doctor project case study
Swimming upstream: OPNFV Doctor project case study
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 

More from Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Networking Concepts Lesson 13 - Troubleshooting - Eric Vanderburg

  • 2. Proactive measures  Policy Naming conventions  Internet use policy  Security policy  Privacy policy  Networking Concepts – Eric Vanderburg ©2005
  • 3. Proactive Measures  Planning   Network diagrams Documentation            Address list Cable map Contact list – who to contact when an event happens Equipment list Network history – upgrade history Network map Hardware configuration – routers, switches… Server configuration Licensing Users Software should be used to speed the process up Networking Concepts – Eric Vanderburg ©2005
  • 4. Network Inventory Networking Concepts – Eric Vanderburg ©2005
  • 5. Machine Screen from Inventory Networking Concepts – Eric Vanderburg ©2005
  • 6. Backup Determine the files to backup  Make a schedule  Specify backup personnel  Test the backups  Record and check backup logs  Networking Concepts – Eric Vanderburg ©2005
  • 7. Upgrades Establish guidelines for upgrades  Give users advance notice of changes  Backup prior to each upgrade  Upgrade during off time  Test upgrades in a lab or with a pilot group to resolve problems early  Have plan to undo upgrade installation if necessary  Networking Concepts – Eric Vanderburg ©2005
  • 8. Logging  Auditing      Enable auditing on all servers Audit administrative actions Audit critical files and folders Audit access to certain rights Filter and review logs regularly   Event Viewer Programs have their own logs too (.log, .txt)  Windows setup logs: setuterr.log, setupapi.log, setuplog.txt Networking Concepts – Eric Vanderburg ©2005
  • 9. Utilities      Snort IDS Ethereal Protocol analyzer Network Monitor Port scanners SNMP (Simple Network Management Protocol)     MIB (Management Information Base) – place where each agent stores its informaiton Agents are installed on hosts – they report back to a SNMP management program Basic network configuration can take place through SNMP RMON (Remote Monitoring)     Agents (probes) can be hubs, switches, or routers also (not cheap) Has 8 different MIB types RMON1 works at layer 1 & 2 RMON2 works at layer 3 and above Networking Concepts – Eric Vanderburg ©2005
  • 10. Customer Relations Skills  Users are customers, and the reason network personnel have jobs    Best source of information when something goes wrong with network Develop special relationships with adept users Develop guidelines about user interaction  Include how to question and respond to users, handle irate users, and general user communication etiquette Networking Concepts – Eric Vanderburg ©2005
  • 11. Troubleshooting structured approach   Set a priority Collect information about the problem   When did it happen What has changed since the time when it was working properly    List possible causes Test each possible to find actual Try at least one solution for each potential cause  Do only one test at a time  Document the solution Networking Concepts – Eric Vanderburg ©2005
  • 12. Tools DVM (Digital Voltmeter) – measures the resistance of cables to find a cable break  TDR (Time Domain Reflectometer) – Determines a break in the cable and specifies where. Can also measure cable length  Cable testers – check for correct termination, attenuation, measures frame counts, ect..  Oscilloscope – measures signal voltage over time. Checks for breaks, crimps, and attenuation problems.  Networking Concepts – Eric Vanderburg ©2005
  • 13. Software Tools Protocol Analyzer  MSBA (Microsoft Baseline Security Analyzer)  Port Scanner  Networking Concepts – Eric Vanderburg ©2005
  • 14. Resources        MS Technet (www.microsoft.com/technet/default.mspx) MS Knowledge base – look up error codes here. (support.microsoft.com) Novell Knowledge base (support.novell.com) MSDN (Microsoft Developer’s Network) Newsgroups Forums Periodicals Networking Concepts – Eric Vanderburg ©2005
  • 15. Troubleshooting      Check physical first Define scope – user, group, entire network Given problem information, develop a list of possible bad software or hardware Run tests on a component or application Put a suspect component in a situation where everything else works.     Example: NIC is suspect. Take it out and place it in a computer that is working properly and see if the NIC works there. Example: Application does not work. Install on another PC and check Check logs Lookup error codes Networking Concepts – Eric Vanderburg ©2005
  • 16. Troubleshooting  Install needed service packs and patches  Types     QFE (Quick Fix Engineering) patch – first fix to a problem Hotfix – a QFE that has been tested for errors and is packaged with an installer Cumulative patch – a group of hotfixes that pertain to a specific platform or product Service pack – a cumulative patch that undergoes months of intensive testing. Networking Concepts – Eric Vanderburg ©2005
  • 17. Test  Test lab or pilot program  Test patches before applying them on the network  SUS (Software Update Services) – creates an alternate windows update for network clients. MS updates can be approved first before appearing on the list.    Must be Win2k (SP3) or Win2k3 SMS (Systems Mgmt Server) – SUS plus inventory, application usage tracking, vulnerability checks, Test upgrades & new software Networking Concepts – Eric Vanderburg ©2005