SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Analyzing
monitoring
reports.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Baselines.
– Reports.
PACE-IT.
Page 4
Analyzing monitoring reports.
Page 5
How do you know what
constitutes good network
performance and what
indicates an issue?
This is where baseline documentation comes into play. Baseline
documentation provides a snapshot of the network when it is
running efficiently. Baselines are usually kept as a log file,
although they may also be graphical in nature.
Baselines should be established on CPU utilization and network
utilization (and any other function you deem relevant). Periodic
tests should be conducted to determine if the baseline has
changed. You can use Windows Performance Monitor to help
establish the baseline.
Analyzing monitoring reports.
Page 6
– Items to consider for baselines.
» Network device CPU utilization.
• Can help to determine when a network device is going to fail.
• Can help to determine when more network devices should be
installed in a growing network.
» Network device memory utilization.
• Can help to determine when it is time to expand the memory
of network devices.
» Bandwidth utilization.
• Can help to determine the overall health of a network.
• Can help to determine when network segmentation should
occur.
• Can help to determine if a network device is failing (creating a
storm of data).
• Can help in identifying when a security breech has occurred.
Analyzing monitoring reports.
Page 7
– Items to consider for baselines continued.
» Storage device utilization.
• Can help to determine when storage utilization has become a
bottleneck on the network.
• Can help determine when to increase the storage capacity of
the network.
» Wireless channel utilization.
• Can help to determine how saturated the wireless channels
have become; once it is determined that they are saturated, a
new wireless access point (WAP) can be installed to alleviate
the pressure.
• Can help to determine if there is unauthorized wireless access
occurring (especially if there is utilization on a channel that is
supposed to have none).
Analyzing monitoring reports.
Page 8
Analyzing monitoring reports.
Page 9
– Log management.
» Log files can accumulate data quickly and some administrators
only review them after a major problem has occurred. In most
situations, this is a case of too much information.
• Good administrators will set proper reporting levels with their
logging software.
• Good administrators will review logs and compare them
against their baseline documentation to find issues while they
are still minor.
» Logs should be kept and archived in case there is a need for
historical data; follow the organization’s data storage policy.
» One consideration is to create a running graph of important
metrics that are captured by logs.
• Graphing the data gives a quick visual reference, making it
easier to spot issues.
• Many logging applications give the administrator the option of
creating graphs.
Analyzing monitoring reports.
Page 10
– Interface link status.
» When reviewing the output from an interface report, the first line
is usually a report on the status of the link.
• Fastethernet0/0 is up, line protocol is up (all is good).
• Fastethernet0/0 is up, line protocol is down (all is not good);
the interface is administratively up, but is not able to
communicate with the other end.
• Fastethernet0/0 is down, line protocol is up (all is not good);
there may be an issue with the cable or the physical port
itself.
• Fastethernet0/0 is down, line protocol is down (all is not
good, but all is not bad); the interface has been
administratively shut down.
– Problems on an interface.
» If the link status of the interface indicates that there are no
problems (the up and up state), but something is not operating
correctly, then it is time to dig a little deeper into the interface
monitoring reports.
Analyzing monitoring reports.
Page 11
– Interface monitoring reports.
» There are many things that can happen on a network device’s
interface to cause issues.
• In most cases, it will be required to log into the device and run
the device’s report to determine the cause of any problems.
» Speed and duplex settings (the most common problem):
• If there is a speed mismatch, the devices will not connect.
• A duplex mismatch will cause intermittent issues (e.g., errors
in output or input reports or dropped packets).
» Discards and packet drops:
• If the device is discarding incoming packets, then, more than
likely, the device’s CPU is being overutilized.
• If the device is dropping outgoing packets, then there is a
bandwidth congestion issue.
» Interface resets:
• If the interface keeps resetting, the most likely cause is a
communications issue between the two end points.
Analyzing monitoring reports.
Page 12
Analyzing monitoring reports.
Baselines are used to establish what network performance should be.
Periodic tests should be conducted against the baselines to determine if
they have changed. Functions that might benefit from having a baseline
include: network device CPU utilization, network device memory utilization,
bandwidth utilization, storage utilization, and wireless channel utilization.
Topic
Baselines.
Summary
Log files can accumulate data rather quickly. Administrators can help
manage the growth through setting the proper reporting levels. Log reports
do need to be reviewed and should be archived. Graphing log data can give
a visual reference that makes it easier to spot problems. Any interface link
status other than up and up indicates that there may be an issue. Problems
can still occur on a network interface, even when link status is up and up.
Issues that can occur include: speed and duplex mismatch, discarded and
dropped packets, and interface resets.
Reports.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPace IT at Edmonds Community College
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Peter Smith
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Ian Sommerville
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million usersIan Sommerville
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&AMang Sum
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and componentsmrmwood
 

Was ist angesagt? (20)

PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to Safety Practices (part 2)
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2Pace IT - Troubleshooting OS part 2
Pace IT - Troubleshooting OS part 2
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
System dependability
System dependabilitySystem dependability
System dependability
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
Uncovering the Myths Behind Remote Power
Uncovering the Myths Behind Remote PowerUncovering the Myths Behind Remote Power
Uncovering the Myths Behind Remote Power
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)Introduction to Critical Systems Engineering (CS 5032 2012)
Introduction to Critical Systems Engineering (CS 5032 2012)
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Designing software for a million users
Designing software for a million usersDesigning software for a million users
Designing software for a million users
 
Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1Pace IT - Troubleshooting OS part 1
Pace IT - Troubleshooting OS part 1
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 

Andere mochten auch

Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"Brian Hay
 
Trailer exhibition research
Trailer exhibition researchTrailer exhibition research
Trailer exhibition researchGabyV45
 
Trailer title and credit conventions
Trailer title and credit conventionsTrailer title and credit conventions
Trailer title and credit conventionsJojo Williams
 
Stanley-Sean_fullCV4
Stanley-Sean_fullCV4Stanley-Sean_fullCV4
Stanley-Sean_fullCV4Sean Stanley
 
Gestion de proyectos de tecnología educativa
Gestion de proyectos de tecnología educativaGestion de proyectos de tecnología educativa
Gestion de proyectos de tecnología educativaDianacristancho2012
 
대신리포트_모닝미팅_151002
대신리포트_모닝미팅_151002대신리포트_모닝미팅_151002
대신리포트_모닝미팅_151002DaishinSecurities
 
Les plantes per India i David
Les plantes per India i DavidLes plantes per India i David
Les plantes per India i Davidaprenentjunts
 
Solutionpath - HPE Discover 2015
Solutionpath - HPE Discover 2015Solutionpath - HPE Discover 2015
Solutionpath - HPE Discover 2015Gemma Wilson
 
cat 15 final outline final
cat 15 final outline finalcat 15 final outline final
cat 15 final outline finalZain Bukhari
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
Juliet_sampa_CV_ edited
Juliet_sampa_CV_ editedJuliet_sampa_CV_ edited
Juliet_sampa_CV_ editedjulietsampa
 
Les plantes per Aitana i Happy
Les plantes per Aitana i HappyLes plantes per Aitana i Happy
Les plantes per Aitana i Happyaprenentjunts
 

Andere mochten auch (13)

Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
 
Trailer exhibition research
Trailer exhibition researchTrailer exhibition research
Trailer exhibition research
 
Trailer title and credit conventions
Trailer title and credit conventionsTrailer title and credit conventions
Trailer title and credit conventions
 
Stanley-Sean_fullCV4
Stanley-Sean_fullCV4Stanley-Sean_fullCV4
Stanley-Sean_fullCV4
 
Gestion de proyectos de tecnología educativa
Gestion de proyectos de tecnología educativaGestion de proyectos de tecnología educativa
Gestion de proyectos de tecnología educativa
 
대신리포트_모닝미팅_151002
대신리포트_모닝미팅_151002대신리포트_모닝미팅_151002
대신리포트_모닝미팅_151002
 
Les plantes per India i David
Les plantes per India i DavidLes plantes per India i David
Les plantes per India i David
 
Solutionpath - HPE Discover 2015
Solutionpath - HPE Discover 2015Solutionpath - HPE Discover 2015
Solutionpath - HPE Discover 2015
 
cat 15 final outline final
cat 15 final outline finalcat 15 final outline final
cat 15 final outline final
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
Juliet_sampa_CV_ edited
Juliet_sampa_CV_ editedJuliet_sampa_CV_ edited
Juliet_sampa_CV_ edited
 
Les plantes per Aitana i Happy
Les plantes per Aitana i HappyLes plantes per Aitana i Happy
Les plantes per Aitana i Happy
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 

Ähnlich wie PACE-IT: Analyzing Monitoring Reports

Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet OutagesThousandEyes
 
IT 655 Milestone One Guidelines and Rubric Presenta.docx
 IT 655 Milestone One Guidelines and Rubric   Presenta.docx IT 655 Milestone One Guidelines and Rubric   Presenta.docx
IT 655 Milestone One Guidelines and Rubric Presenta.docxaryan532920
 

Ähnlich wie PACE-IT: Analyzing Monitoring Reports (20)

Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network IssuesPACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network Issues
 
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With UtilitiesPACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Troubleshooting Connectivity With Utilities
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006 PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
Diagnosing Internet Outages
Diagnosing Internet OutagesDiagnosing Internet Outages
Diagnosing Internet Outages
 
PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)PACE-IT: Configuring Switches (part 1)
PACE-IT: Configuring Switches (part 1)
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
IT 655 Milestone One Guidelines and Rubric Presenta.docx
 IT 655 Milestone One Guidelines and Rubric   Presenta.docx IT 655 Milestone One Guidelines and Rubric   Presenta.docx
IT 655 Milestone One Guidelines and Rubric Presenta.docx
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Kürzlich hochgeladen (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

PACE-IT: Analyzing Monitoring Reports

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Baselines. – Reports. PACE-IT.
  • 5. Page 5 How do you know what constitutes good network performance and what indicates an issue? This is where baseline documentation comes into play. Baseline documentation provides a snapshot of the network when it is running efficiently. Baselines are usually kept as a log file, although they may also be graphical in nature. Baselines should be established on CPU utilization and network utilization (and any other function you deem relevant). Periodic tests should be conducted to determine if the baseline has changed. You can use Windows Performance Monitor to help establish the baseline. Analyzing monitoring reports.
  • 6. Page 6 – Items to consider for baselines. » Network device CPU utilization. • Can help to determine when a network device is going to fail. • Can help to determine when more network devices should be installed in a growing network. » Network device memory utilization. • Can help to determine when it is time to expand the memory of network devices. » Bandwidth utilization. • Can help to determine the overall health of a network. • Can help to determine when network segmentation should occur. • Can help to determine if a network device is failing (creating a storm of data). • Can help in identifying when a security breech has occurred. Analyzing monitoring reports.
  • 7. Page 7 – Items to consider for baselines continued. » Storage device utilization. • Can help to determine when storage utilization has become a bottleneck on the network. • Can help determine when to increase the storage capacity of the network. » Wireless channel utilization. • Can help to determine how saturated the wireless channels have become; once it is determined that they are saturated, a new wireless access point (WAP) can be installed to alleviate the pressure. • Can help to determine if there is unauthorized wireless access occurring (especially if there is utilization on a channel that is supposed to have none). Analyzing monitoring reports.
  • 9. Page 9 – Log management. » Log files can accumulate data quickly and some administrators only review them after a major problem has occurred. In most situations, this is a case of too much information. • Good administrators will set proper reporting levels with their logging software. • Good administrators will review logs and compare them against their baseline documentation to find issues while they are still minor. » Logs should be kept and archived in case there is a need for historical data; follow the organization’s data storage policy. » One consideration is to create a running graph of important metrics that are captured by logs. • Graphing the data gives a quick visual reference, making it easier to spot issues. • Many logging applications give the administrator the option of creating graphs. Analyzing monitoring reports.
  • 10. Page 10 – Interface link status. » When reviewing the output from an interface report, the first line is usually a report on the status of the link. • Fastethernet0/0 is up, line protocol is up (all is good). • Fastethernet0/0 is up, line protocol is down (all is not good); the interface is administratively up, but is not able to communicate with the other end. • Fastethernet0/0 is down, line protocol is up (all is not good); there may be an issue with the cable or the physical port itself. • Fastethernet0/0 is down, line protocol is down (all is not good, but all is not bad); the interface has been administratively shut down. – Problems on an interface. » If the link status of the interface indicates that there are no problems (the up and up state), but something is not operating correctly, then it is time to dig a little deeper into the interface monitoring reports. Analyzing monitoring reports.
  • 11. Page 11 – Interface monitoring reports. » There are many things that can happen on a network device’s interface to cause issues. • In most cases, it will be required to log into the device and run the device’s report to determine the cause of any problems. » Speed and duplex settings (the most common problem): • If there is a speed mismatch, the devices will not connect. • A duplex mismatch will cause intermittent issues (e.g., errors in output or input reports or dropped packets). » Discards and packet drops: • If the device is discarding incoming packets, then, more than likely, the device’s CPU is being overutilized. • If the device is dropping outgoing packets, then there is a bandwidth congestion issue. » Interface resets: • If the interface keeps resetting, the most likely cause is a communications issue between the two end points. Analyzing monitoring reports.
  • 12. Page 12 Analyzing monitoring reports. Baselines are used to establish what network performance should be. Periodic tests should be conducted against the baselines to determine if they have changed. Functions that might benefit from having a baseline include: network device CPU utilization, network device memory utilization, bandwidth utilization, storage utilization, and wireless channel utilization. Topic Baselines. Summary Log files can accumulate data rather quickly. Administrators can help manage the growth through setting the proper reporting levels. Log reports do need to be reviewed and should be archived. Graphing log data can give a visual reference that makes it easier to spot problems. Any interface link status other than up and up indicates that there may be an issue. Problems can still occur on a network interface, even when link status is up and up. Issues that can occur include: speed and duplex mismatch, discarded and dropped packets, and interface resets. Reports.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.