Thursday, February 28, 2013
WAN design
Circuit Switching - the circuit comes up for the duration. Phone and ISDN
leased lines - dedicated to you by the service provider TDM T1
Packet and Cell - Frame and ATM
Hub and spoke to the HQ. However if the router at HQ fails all are affected.
Full mesh - expensive to maintain. N(N-1)/2
Partial Mesh - flexible to where you want it.
VPN over public networks is limited to a Best effort as you cannot control the traffic in the ISP
Access VPN for users- You can also use a NAC to connect to first which will then set up the VPN
The NAC is a public facing device Portal where you http to it and then type a user password.
Intranet VPN - this is from site to site. Using public or WAN.
Extranet VPN is for business partners so they can access the DMZ
Enterprise VPN is when you set it up.
IPSEC is one VPN usually from firewall to firewall.
It can use ESP to encrypt the data or AH which only encrypts the headers (not secure for data)
HMAC codes in it will protect from man in the middle attacks and replay.
You can also use PKI certificates for an added layer.
Cisco Easy VPN - you set up a server which is the head. Then the remote configuration is easy.
the remote devices are ISRs.
GRE - works for encapsulation all protocols. Does not have any security.
you must add IPSEC tunnel to it in order to have security.
DMVPN - dynamic VPN
NHRP next hop resolution protocol which will point to the HQ.
mGRE Multipoint GRE supports multipoint tunnels.
IP multicast , routing , dynamic spokes all QoS
Each remote site is connected using a GRE tunnel to the HQ.
For redundancy you will need two heads.
DPD dead peer detection can be used to verify tunnel is alive (keepalive)
VTI virtual tunnel interface
Can run routing , does not need GRE or mGRE.
L2tpv3
can run frame relay and ppp ethernet
Service provider VPN.
Can run MetroEthernet
VPLS is a VPN over MPLS
it allows you to run Layer 2 from one location to the next.
Useful for Storage redundancy for example.
MPLS
Uses Labels instead of routing and can run over a variety of media.
Uses VRF
Layer 3 MPLS Tight SLA and QoS.
VPNs are flexible and cost effective.
Dial Backup used for ISDN so it will ring a floating route.
Secondary WAN link - backup or load sharing.
Shadow PVC - used in frame relay.
IPSEC VPN backup tunnel can be used in case the ISP MAN fails.
Load balancing.
Cna be per packet. usually 56kbps or below.
Per flow or destination is better. also called fast switching.
Decision influence.
High Availability - backup power, backup devices, backup WAN
Growth
Expenses -
Complexity - Metro is easier.
Cost to implement -
Network Segmentation to separate traffic.
Voice and Video QoS.
Private WAN - Frame relay and ATM . You own lease the circuit
ISP WAN - basically the internet
SP MPLS/IP VPN - they are good
Private WAN with MPLS - jeez hiring some CCIE's to maintain it is expensive.
considerations
Port Density
Port Type
Modular
throughput
REdundancy / Supervisor or power
Future growth
Software
Bandwidth
Security
ISR can do wan video , voice, security
800 ISR remote user
1800 ISR branch
7200 - 10000 medium routing
7600 high end routing
12000 CSR - service provider grade.
29xx 35xx 37xx are access switches.
45xx chassis
65xx high end chassis.
Router - WAN
Switch LAN
Security appliance at the branch
AP wireless for mobility
CUCM for voice
IP phones and desktops
Small office 50 users 1 TIER
medium office 50-100 2 tier
Large 100 + 3 tier
ISR G2 is better
Small can use an ISR with ports or one switch.
Medium branch redundant routers.
Switches with Stacking.
Large Branch
Dual links
Dual routers
Dual ASA
Dual switches with stacking.
ISR 800 for teleworker.
WAN technologies
WAN
Requirements are
SLA
bandwidth
latency
loss
Cost
utilization.
Goals and policies
Applications and growth
budget
ISDN
BRI - 128kbps
PRI is 1.54 Mbps like a T1.
DSL mainly Async DSL
Cable Cable Modem Termination System CMTS
Wireless
Bridge is point ot point
LAN is 150 - 300 Mbps max
MObile GSM , GPRS ,, UMTS 3G , LTE
FrameRelay.
PVC permanent
SVC switched just for the duration.
Sonet Circuit baed.
OC 1 51
OC 3 155
OC 12
OC 48
MPLS
Goal is to use labels instead of routing tables.
CE--> PE--> P __> p --> PE--> CE
Dark Fiber is Point to Point
DWDM runs on the SONET and increases the ability to split ligh Lambdas.
CIR Commited infra
Burst above
Same PPDIOO
Prepare
plan Desgin
implement operate
optimize.
Voice 250 ms
Video can afford to lose some pakcets voice CAN'T
Private Dark Fiber
Leased TDM sonet
Shared MPLS framerelay.
Fixed cost equipment and setup
recurring are the monthly charges.
QoS
classify it based on protocol or a matching ACL.
Classification orr coloring.
Congestion management
Link Efficiecy for low speed to reduce latency and jitter
traffic shaping use ingress and egress flows.
Classification.
Identify and mark. = classification
NBAR can use layer 7 to recognize applications and then label them with a priority.
CAR commited access rate. -- Basically match a traffic and then apply a priority
Congestion management
FIFO first in first out
PQ priority queiuing sets up 4 levels.
however LEVEL High must be emptied before any of the other three are allowed.
So if you have too much traffic at level High , the other traffic will suffer badly.
Custom Queuing 16 Queues, you can set up the queue limit.
so when it is full. The other queus get serviced.
WFQ - this is for interfaces below 2.0 Mbps .
it creates two queues - high bandwidth. low bandwidth.
low gets service first.
Class Based Weighted Fair Queiuing.
SAme as WFQ but you can use access list and it is modular.
LLQ
Low Latency Queuing.
Basically class based weighted fair queuing + PQ.
So voice EF gets serviced first + there is a limit on it.
Traffic Shaping.
Slowing down traffic so the utilization is high but consistent.
helps to curb bursts into longer flows.
Policing.
Dropping traffic that passes a limit.
'Link Efficiency.
LFI link fragmentation and interleaving - breaks up large packet flows and puts small voip in between
MLP multilink PPP bonds links like 2*T1
RTP real time transport. Compress the RTP header from 40 bytes to 2-5 Bytes.
Window Size.
Extend the Window size to allow more data in before you have to send an acknowledge.
Wednesday, February 27, 2013
Wireless LAN
802.11 1mbps 2mbps dsss
FHSS frequency hop will hop from 1 to 2 so doubles the bandwidth.
802.11b 11mbps uses 11 channels
802.11a 54 Mbps 13 channels on UNII not compatible with 802.11b
802.11g 54 Mbps ISM compatible with 802.11b
802.11N can run on both 600 mbps MIMO multiple in multiple out and OFDM to send the data.
ISM uses 900 2.4 and 5.5 only 2.4 is used for 802.11b g n
UNI uses 5.0 ghz and is for 802.11a and 802.11n
1 6 11 do not overlap.
SSID is used, this is similar to a VLAN to segment the networks.
CSMA /CA collision avoidance.
WEP is insecure
WPA allows you to add security 802.1x and AES
MAC adresses can be spoofed.
EAP-FASt Flexible authentication can be used for the connection.
VPN IPSEC can be used to segment the traffic to the HQ.
802.1x uses EAP and Radius to verify your access.
LEAP uses a radius and 802.1x
Cisco
IDS and firewall to control the traffic.
Cisco UWN unified wireless network.
Client devices laptop
accesspoints cisco AP
Network unification like QoS IPS RF management all of this is done by the controllers.
network management can be done using the WCS server
Mobility services like guest , Voice , threat detect.
benefits.
reduce TCO
enhance visibility
manage the RF (cleanAir)
Security Controller
Unify the wire and wired-less
enhance collaboration.
LWAPP is what the APs use in order to connect to the controller.
AP to WLC
Layer 2 LWAPP controller must be on the same subnet Ethertype 0xbbbb
Layer 3 LWAPP controller can be on a different subnet. 12222 12223
12222 data 12223 control
CAPWAP is the newer one.
Uses AES to secure the com
MTU discovery
Control 5246
data 5247 so the opposite
Split MAC - Lwapp
the AP does
Beacon 802.11
802.11 control
802.11e queue and piroritization
802.11i encryption
The Controller does.
802.11i security
802.11 mac management
802.11e reserve resources.
Local MAC - CAPWAP
802.11 MAC management so the AP does this instead of the controller.
Controller can also proxy.
AP modes
Local Mode - the usual
Hybrid - it will reside across the WAN H-REAP
Monitor - cycle every 60 and do not participate. Used for IDS. Location based.
Rogue Detector - sits on the Trunk and checks if there is a rogue device
Sniffer mode- captures packets and sends them to a Sniffer Airopeak.
Rogue detector gets a list of MACs they hear from other devices.
If that MAC is on the WLC then the rogue detector will let you know.
Bridge mode is for MESH
Connection Lwapp.
Send Lwapp Discovery.
1. local subnet
2. Get WLC from other AP
3. previously stored WLC address.
4. DHCP option 43
5. DNS CISCO_LWAPP_CONTROLLER.local.domain.
WLC will answer
AP gets list of WLCs
Selects AP
1. Previously configured.
2. Master
3. most available.
AP to WLC join
Capwap
does capwap
no response 60 seconds does LWAPP
no response start again.
First
Second
Tertiary
Master
most available.
Supplicant is the client.
WLC is the authenticator
Radius is the Authenticating server.
To WLC is capwap
from WLC to Radius is EAP extensible authentication protocol.
EAP- TLS public key.
EAP - TTLS certificate only on the server.
PEAP - Cisco + mschap.
LEAP - Cisco plus the CCX extensions.
EAP-FAST build a tls tunnel
WLAN is an SSID
Interface maps the VLAN to the SSID
port is a port.
A port goes to the switch
you can use many ports and etherchannel them.
Management interface. - Used for L2 Lwapp. Connection to radius. In-band management
Service port - used for out of band management. Statically configured.
AP manager - L3 discovery static
Dynamic interface - is to map the VLAN to WLAn
Virtual interface - DHCP relay , mobility
So port 2 is a physical port.
You configure it as the SERVICE port. It is for out-of band management.
Ports 8 can be aggregated LAGed and will go to a switch.
Sorry, best I can do.
Service Port. is a totally separate port for out of band servicing.
Management port is the in band and old Layer 2 LWAPP.
AP manager is for Layer 3 LWAPP.
Dynamic ones are for each VLAN WLAN they will change dynamically.
Virtual is to connect to another WLC and transfer mobility. So you can ROAM from room to room or building.
2100 25
ISR 25.
So far easy.
3750 Switch with contorller built in 50
4400 100
6500 WLC module 300
5500 500
Intracontroller
ie the same controller.
So no chaneg except you moved IPs.
Inter controller Layer 2.
From one controller to the next
Just moves the MAC from WLC1 to WLC2 database.
A mobility message updates the controller.
Inter controller Layer 3.
From one IP subnet to another.
WLC 2 Creates a shortcut. An ANCHOR and tunnels the data back to WLC1.
Mobility group will create the anchor and tunnel.
Up to 24 WLC s
UDP 16666 unencrypted
UDP 16667 encrypted.
Minimize intercontroller roaming.
less than 10 ms
Layer 2 is better
Detrministic redundancy
Primary secondary tertiary.
Dynamic
Easy and load balance.
N+1 one controller is backup
N+N same number of controllers as the ones you have deployed.
N +N + 1 same number of controllers as you have + tertiary as spare.
Limit to 20 users
7 voWLAN
RRM radio resource management
Adjust RSSI
balance the clients
RF group is a group of WLC that sync their RRM
80 signal will elect a master to set up the strenght
Neighbor messages
EoIP for guests
All the guest traffic goes to one WLC. an anchor WLC.
Mesh
RAP is Root
MAP is not connected to the wire
Four hops max of 8
throughput drops every hop by 50%
20 MAP per RAP max of 30
1100 internal 3500i internal
1200 3500E external
branch
300 ms or less
use H-REAP for WAN
LOCAL mac
allows you to work even if the WAN is down.
REAP
extends lwapp timers.
Layer 2 security limit
H-REAP
Allows NAT
Datacenter design
So unified computing will be the UCS line.
Unified Fabric will be the NEXUS line. Fcoe MDS for Fibre and CNA converged adapters
Virtualization is the Vmware/Windows/Citrix Nexus 1000V sits on a vmware Vlan Vsan
Virtualized Servers on the UCS
Virtual resources.
FC or FCoE or iSCSI
Vlan or VSAN Vsan is for Fibre.
and virtualized storage and network. You can have context on firewalls, VSS or VDC
Forces that impact are
Power
Rack Space
Cooling
Management
Security
ILO can help manage servers remotely, you connect to ILO and manage it as if you are there.
Space
Load on the floor
power cooling
cabling - blade servers reduce cabling
HVAC heating ventilation and cooling.
Architecture.
Floor load
Space
Power cooling
cabling
Environmental are
Humidity
temperature.
physical
Access to site
Fire supression
Security alarms
Capacity
space for employees
Compliance
PCI SOX Sarbannes oxley. HIPAA
Power
Cooling is the most.
Servers
Network
Converting from 220 to 110
lights
1 Watt = 3 BTU
Access
provides ports
Allows for nic teaming and etherchannel
Allows for layer 3
mix oversubscription.
Distribution.
SSL and IPS
use modules in the 6500
GLBP security
place the ROOTs if you must use STP.
Core
Layer 3
Multicast
Low latency switching
Distributed forwarding using daughter cards.
10 gigE
Scalable multicast.
key drivers for virtualization
Cost
reduce device count
Isolate users and traffic
Better performance for price ratio
higher utilization
better uptime
Virtualization network
Vlans are virtual broadcast domains on a switch.
Vsan are virtual on a storage switch like Fibre MDS
VRF virtual routing and forwarding create a virtual forwarding table (MPLS mainly)
VPN create virtual networks over the same media
vPC virtual port channel this is MLAG on the Nexus 7000 pretends to be one link
Device itself Virtualization.
VM virtual machines on the ESX
ACE context splits ACE
VSS virtual switching system on the 6500
ASA context split firewalls
VDC virtual device context. used on the NExus 7000 pretends to be separate switches entirely.
Access control at the access layer. classify the users/devices
Path Isolation like VPN or VRF logical separation over the same media
Services split using the firewall to control the network Vlan to vlan traffic. control and manage
Enterprise LAN
802.3 is the IEEE for ethernet base-T
distance is 100 meters for copper
802.3U is for 100 Mbps
Base-TX is the CAT 5
Base-T4 is for Cat 3 full duplex is not possible.
base-FX is fiber
Class 1 repeater 1 hop
Class 2 repeater can have a max of 2 hops.
gig is 802.3z 1000 Mbps
802.3ab is 1000 Mbps over copper CAT cables.
In general 100 meters for cat cables
550 for multimode
Single mode can go 10 40 or 70
SX is multimode
LX is singlemode / multimode
CX is coax like the antennas cables.
802.3ae is 10GigE
SR is multimode
LR is multi/single
er is single 40 KM
ZX is 70
10gbase-t is 100meters
Etherchannel can bundle links.
So if one fails the other ones still send data.
Links must be same speed, same duplex, same vlan or trunk
The tables in the book are antiquated.
Repeaters - dead , they repeat the signal can't have more than 5 segments 4 repeaters 3 populated.
HUbs are a single broadcast domain , single collision domain . they are dead too.
Bridge is a switch that is using software. 2 or more collision domains
Switch is a bridge that uses hardware chips to forward the data. So more ports and faster.
Each port is a collision domain . Each Vlan is a broadcast domain.
Routers remove the L2 and add their L2 . they work on layer 2
So each port is a broadcast domain and a collision domain.
repeater + hubs work on bits.
Bridge + switch work on frames
L3 switch + router work on packets
LAN design
Network characteristic is the application protocol
Infrastructure charactersitics is the L2 L3 switching routing
Environmental characteristics are the geography and distances.
Peer to peer messaging
client local 80% is local 20% goes out.
Client server farms 80% is south to north 20% is internal.
client to enterprise edge. like exchange or other public servers in the Internet Edge.
Client to server farms has the highest cost and reliability required.
Best Practices.
Access Layer
Limit Vlan to the Rack. -so you can layer 3 from the access layer.
use RSTP as it is better than STP faster times.
Set trunks to ON on no negotiate.
Prune unused vlans to minimize the traffic.
use VTP to sync the vlan database.
Use PortFast and label host ports as access ports.
Consider putting Layer 3 at the access to improve load balancing and convergence.
Use switchport host to enable portfast on ports so they go to forwarding quicker.
Use Cisco tools.
1. portfast skip learning and listening.
2. loop guard b so the port won't switch to forwarding and create a loop.
3. root guard to mark that port as one that will not allow a switch there to become root.
4. bpdu guard to disable the port if someone connects a switch.
Distribution layer
Qos Security filtering policy and redundant links.
If you use L2 then use HSRP, VRRP, GLBP
Use Layer 3 if you can to improve convergence.
Peer on links that will transit data.
Build triangles and not square.
Try to keep layer 2 vlans in the distribution instead of sending them to core.
summarize routes to offload that from the core.
use VSS to eliminate STP and HSRP
VSL is the VSS link.
Core layer
Use layer 3
Use same cost links
Use routing
use triangles.
Each building should have the addresses summarized.
Medium size is two layers 200-1000
Distribution and core are collapsed.
Small
One layer.
Server connect.
Single Link NIC
Single NIC two ports one to each switch then you bond then in an etherchannel
Two NICs going to TWO switches.
Content switches.
Datacenter 3.0
Load balancer
SSL offload
Firewall
IPS
At access layer you can always stick a QoS classification.
VLANS
ISL is cisco it tags before and after the packet.
802.1Q is Vlan it marks it inside the packet.
802.1P uses 3 bits for Priority.
Mark 802.1P as close to the source as you can.
Multicast.
To avoid flooding the hosts use.
CGMP Cisco
IGMP iEEE
CGMP the switch will query the router for the MACs of recipients.
IGMP the switch listens to messages from the hosts to the router like join or leave
CCDA models
Hierarchical models allow you to.
save cost
Make it easier to understand
Modular network growth
Improved fault isolation.
core
* fast
* highly reliable
* redundant
* fault tolerant
* Low latency
* Avoid CPU intensive and classification
* QoS using the classification done by other devices.
* limited diameter hop
Distribution
*aggregate
* filter
*route
Access
* classify QoS
* Rate limit
* arp inspection
* PoE
* Trust
In this model, the Distribution handles the RVI or IP of the Vlan and will route between vlans.
Because of STP one link is disabled from the access to the distribution.
So you are paying a load of money for a "backup link"
If you drop the Layer 3 border to the Access layer.
Then you will gain more links.
However the Layer 3 licenses cost more.
You will also be limiting the Vlans to be local to the switch.
Cisco 6500 VSS- supervisor 720-10G
can run VSS.
VSS is proprietary to Cisco and makes the switches pretend to be one switch.
Must use VSS capable Sup720 or SUP-2t.
The above was the simple model.
This is the Enterprise Architecture Model.
Let's have a look.
Basically the old model was the Core---<>--- Distribution----<>---- Access.
Since now we have a dedicated Datacenter we can also expand it to
Core----<>---- Datacenter Distribution -----<>----- datacenter access layer
For the WAN we can also create an Edge Distribution and an Enterprise Edge (access)
So in reality our network looks like 3 triangles
The smaller the network the more layers you can consolidate.
Enterprise Edge.
In this case they split Ecommerce and Internet into two modules.
The E-Commerce will have
Firewalls - obvious
IPS and IPS on switches - IPS is the new must
Web,application and database - for Ecommerce
Internet
Will have firewalls
Http servers
Ftp
DNS
WAN
Will have MPLS/Frame/VPN site to site which you can use
to connect branches or to datacenter
Remote Access VPN can use PSTN dial up
or the Internet to allow VPN access for users.
Connecting to your provider.
one router does not provide local router redundancy.
One ISP does not provide ISP redundancy.
Entyerprise WAN technologies.
MPLS multiprotocol label switching
Metro Ethernet using QinQ
Leased line
SONET , SDH
PPP
Frame Relay.
ATM
cable/DSL
Wireless
Cisco says MPLS will map the DSCP QoS marking into the relevant MPLS
Service Provider Edge.
Matches your Enterprise Edge module.
Enterprise Branch Office.
Usually a router and a switch.
The connection back to the Enterprise Edge can be
1. MPLS using the WAN
2. VPN to lower the cost using the INTERNET
Enterprise Data center or Cloud
Teleworker is a very small office or one person.
Usually you can use an ISR or an ASA to collapse everything into it.
Borderless pillars are.
Access layer High availability.
Workstation to Router
Server redundancy in the FARM
router redundacy within the network compenents
Link media in the access layer.
Workstation path discovery can be using.
ARP - find out the gateway
VRRP HSRP GLBP all are the same two devices create a virtual gateway.
ICMP router discovery
VSS - this is the two chassis that behave as one
Explicit - I can explicitly configure the gateway manually on the NIC>
RIP - yes you can run RIP on the Server ?? not the smartest
HSRP
VRRP is the same thing as HSRP except it is not proprietary.
GLBP is the Cisco improvement.
It allows BOTH links to stay active thereby increasing the available bandwidth.
Load Sharing
Multiple Routers up to 1024 Virtual Groups on each interface.
You an PREempt a router with a higher priority.
Authentication can be used.
Server redundancy
Use
FEC and GEC etherchannel bundles.
Use Dual NICs
Load balancing in Cisco can be changed by.
maximum-paths this will change the number of links the router will use from the default of 4.
Maximum is 6.
All links must have the same cost in order to load balance.
EIGRP can use Variance to load balance (bullshit)
Process switching load balances packet by packet.
Netflow Switching load balance by destination which is much better as the packets will not have a chance
to come out of order.
Mesh is N(N-1)/2
Full mesh
Keep broadcast at less than 20%
Make sure a Backup redundant link is not using the same last mile circuitry.
So
Workstation to Router use HSRP,VRRP, VSS
Server redundancy use daul attach NIC , FEC, GEC bundles
Route Redundancy use the load balancing and high availability of more than 4 routes
Link Redundancy use a variety of WAN.
Tuesday, February 26, 2013
CCDA exam intro
CCDA exam.
Have some free time. So I'll just pass it.
Foundation.
PPDIOO
Prepare
Plan
Design
Implement
Operate
optimize
So far so good.
The test revolves around acronyms so memorize.
Business forces that will impact your design.
ROI - Return on investment
Companies expect either savings or improved earnings due to the devices you place.
Let's cough up an example.
Let's say I have 8 switches in my rack.
To manage them I need to connect using telnet/console to the switch and give it some commands.
Let's say I need to upgrade them. Then I would need to spend 20 minutes * 8 = 160 minutes
on an upgrade.
Let's say I want to troubleshoot the switches, then I would need 8* more screens and command typing to get the issue resolved.
You can calculate the cost of IT engineer as $50 an hour and start adding it up.
now to save money in the above example. I can convince management to purchase a
Cisco 6513 chassis.
Now, I only need to upgrade one supervisor and troubleshooting becomes easier.
So I am saving money.
The ROI is calculated by measuring how long would it take to recover the investment I just made
on the chassis.
Another way to look at ROI is by looking at the benefits of an upgrade.
Let's say the users spend 5 minutes every day till the Outlook syncs and another 5 minutes
a day wasting time waiting for files to get copied.
10 minutes * $6 an hour * 600 employees = $600 dollars of wasted time staring at the screen.
Now if I upgrade them to 1000 instead of 10/100 then they will spend 5 minutes waiting.
So 5 minutes * $6 an hour * 600 employees = $300
So if I upgrade them to 1000 Mbps switches and network cards I will be saving $300.
So 20 switches * $10000 each = $200000
Now your ROI break point or the point at which you start making money on the upgrade is
$20000/$300 = 660 days
So if I invest in upgrading the switches the company within 2 years will have made back the cost
and will be making money on the investment.
A good salesperson will easily be able to demonstrate the value and not just say
we need 1 GigE switches (1000Mbps) because they are pretty or fast.
{good salespeople are hard to come by}
Regulations
Because of companies like Enron and crackers. There are new regulations in the market.
HIPAA Health Insurance Portability Accountability Act. -
You me and everybody has a record of their visit at the Doctors, well I might have an erection problem.
Now I wouldn't want it to be published on the web when you google saar that I appear as having that.
So in order to protect the confidentiality of my medical information and transactions.
HIPAA came along with guidelines, so the Dr. needs a safe system. When he connects to my insurance
he needs to have a secure VPN. When they store my data their Database needs to be secure. etc
The second example is Visa and banks. If I can hack into a computer at a retailer that does Visa transactions
I can copy the numbers and Secure codes in the back and then go shopping!!!!!
So for that you have the PCI DSS Payment Card Industry Data Security Standard.
So now my Amazon shopping is secure and I can safely swipe my card.
The third good example is Sarbannes-Oxley. This gem was passed following Enron collapsing
without anyone having seen even a hint. It talks about auditing and how you should "measure"
kpms key performance indicators in IT.
So for us it means we have to monitor the network at Amazon, because if it collapses then the
stock goes down the toilet. So now business must track and publish KPMs so their stock owners
can asses the health of the company.
All in all, when you are selling. You can throw those around in order to get the client to be MORE secure
Competitiveness
So let's say I have a warehouse with dolls. Now my competitor just built an ecommerce site.
So now he has an advantage. To match him I must build one.
Let's say he is using two internet providers so when a storm hits I am out of business and he is running
around stealing my clients.
So now I need a more powerful router.
These three are the Business Drivers according to CCDA.
Technological Drivers
At the same time there are simple Technological drivers.
Removal of Borders
Back when I started in IT if you worked for an ISP you got a free Frame relay for home.
(this was in Dial up days). So I could work from home to solve issues.
Today with the Iphones, wireless, laptops etc. People want to work from everywhere. On the road
at the airport, at home when sick, etc. So there are no more borders. You need to give them more and more
access.
To address this you will add VPNs, remote access, tunnels etc
Virtualization
Most servers in the enterprise are no longer stand alone. Companies placed them in Virtual Servers which run on top of a Hypervisor. Vmware is one example. The Hypervisor will have 50 VMs running on it.
This leads to a very high utilization rate of the resources and a lot of flexibility.
In order to address this you will probably have to upgrade the network because storage traffic takes
a lot of resources and requires low latency.
Growth Of Applications
so yeah, back when I was a kid 1 channel was all we had on TV. Then two , 20 and now you have
800 channels, streaming VOD etc. All of this requires more and more powerful servers and networks to handle it. The programs over time also become more complex.
If before I was happy word typed a letter. Now I want graphics and links and Visios embedded etc.
So more more more horsepower from the PC and the network.
So
Business drivers are usually driven by business people.
technological ones will be driven by IT asking for resources.
IT optimization can be divided into three type.
Datacenter - ie servers, infrastructure
Network - LAN and WAN
Applications - upgrade the software on them and the application.
Each one has their own people.
Datacenter would be Dell, IBM, HP inclined people.
Network - would be CCIE's Juniper etc.
Applications - are usually programmers and software people.
You can no longer master all three unless you are in very SMB .
Cisco has created a FrameWork.
A framework is a patch of ideas or guidelines to help you talk the same lingo to other people
in the field. Which is very important. I might be peddling eggplants and the other guy is british so he is talking about Aubergines. So in the end we fail to make Baba Ganush .
As you can see there are areas
where they will intersect.
Cisco Borderless
anywhere, anytime,anything,anyone
lot's of A's
So from anywhere you go(abroad) , at anytime you want (late), anything you want (like outlook), anyone (let's say my business partners)
It also needs to be secure (VPN) , reliable (high Availiability, clusters) , seamless (one login)
It will be made from 4 Blocks.
Policy and Control - You can apply policies anywhere, if you are at home or you just came to the office
Network Services - these are services for the network, like control or energywise
User Services - like mobility , performance (acceleration), Security (vpn)
Connection management - manage the connection security everywhere.
Collaboration
Alright we got a nice network but money is made as a team effort. I need to talk to sales, they need to
talk to shipping, shipping to fed ex.
For all of this to happen you need collaboration software.
Communication and collaboration applications - telepresence (video conferencing), Email, etc
Collaboration Services - these are services for the layer above for example PRESENCE
so I know if the user is online, then I can chat him
Infrastructure - this layer provides you with the tools for the two above.
It includes virtualization , storage, network
Datacenter
Cisco builds on the Datacenter 3.0
It's a comprehensive Cisco solution to help with this.
they basically have entered the Hardware for the Datacenter market and the networking of it.
The benefits from the
Framework
are
Functionality - they support the requirements.
Scalability - they allow room for growth
Availability - reliable and anywhere anytime.
Some more examples are.
Performance - less latency, more bandwith,
Manageability - easier to use , easier to detect faults.
Efficiency - the cost is reasonable
The architecture is roughly.
Switches/ servers (nuts and bolts)
They are all easier to control with the cisco UNIFIED fabric,network and computing. (software)
They result in better energy , workload, efficiency
and allow you to virtualize, cloud, automate and consolidate (high level)
Alright,
back to PPDIOO
Prepare
Plan
Design
Implement
operate
optimize.
Keep drilling that cycle that Cisco recommends.
The benefits of using it are.
Lowers the Total Cost of Ownership TCO by validating and planning
Increases availability by producing a sound design and validating it.
Improve the business agility by establishing business requirements and strategic technologies.
Speed access to applications - byimproving performance,availability reliability, scalability.
Actions that lower the total cost of ownership are.
identify and validate the technology - for example identify you need a chassis and test it
plan for infrastructure changes and growth - for example the chassis will be flexible on the line cards you add
Develop a sound design with business goals - a business goal can be more reliability which the
chassis will handle with Dual Supervisors.
Accelerate the implementation - less downtime due to solid implementation.
Improve the network and management - make it easier to manage.
reduce operating cost by improving the process - for example the chassis allows for easier management
Actions that increase availability are.
Asses the network - so it can withstand the traffic.
Specify the hardware and software and keep it current by updating the software (smartnet)
Produce a sound design - so it won't collapse
stage and test -- to make sure it works in your network and not just on the datasheet
Improve staff skills - so they will know what to do.
Proactively monitor the network - so you can predict growth and problems
Proactively manage the security - so you can block breaches and remediate breaks.
Actions that improve business agility
establish the business requirements.
ready the sites and the people
Integreate the technical aspect and align it with the business requirement.
expertly install
continually monitor it
Actions that accelerate the application and services
assess the network
improve the service delivery
improve availability
Manage and resolve problems and keep everything up to date.
As you can see this is a cycle.
Prepare
This phase is where you come up with the Business case.
The business case creates a justification for the expenditure of time and money.
Technologies that support the architecture you are planning will be considered.
Plan Phase.
Here you drill down and identify user needs and goals.
You will also assess the network and see if there is a GAP against best practices and documentation.
You will develop a PROJECT plan with the resources milestones and identify the resources
for the design phase.
Design Phase.
Based on the previous data you gathered and in allignment with the business goals
you will produce a detailed design.
The design will include the Visio diagrams and equipment list.
You will also make the project plan more granular.
Once the design is approved you move to implement it.
Impelentation phase.
New equipment is set up and configured.
Changes should be brought up in change meetings to minimize downtime
Each step should have.
1. description
2. Detailed implementation
3. time to implement
4. guidelines for rolling it back in case of failure.
5. changes must be tested to validate them.
Operate phase.
At this stage you operate the equipment.
Day to day work along with accumulating data for the next stage.
Optimize stage.
At this phase you use the data from operations to see if there is room for improvement.
Also you analyze any problems.
If there is room for change.
You can start the Prepare phase and place a business case for improvement or change
which will start the cycle again.
Since this is CCDA concentrate on the first three stages.
Step 1 Prepare - identify the client requirements as far as business and give a conceptual architecture.
for example : the client is complaining about latency. So conceptually we will look at Nexus 3000
Step 2 Plan - Come up with an assesment of what he has now and the weakpoints or adjustments.
come up with a project plan to move ahead.
Step 3 Design - come up with a detailed design plan and granular project plan
When you run the prepare.
Talk to business managers and to department heads and users to see WHAT they need
business wise .
You can use the
1. Identify the applications and services. -example exchange and outlook.
2. Define the organizational goals example we want outlook to be more responsive and robust
3. define organizational constraints example we have a low budget.
4. Define the technical goals example improve latency by 30%
5. Define technical constraints example the switches are eos and outdated.
You can help yourself by using a template.
now you will have all of the applications identified and the requirements of them.
So the organization wants us to improve the performance of outlook.
now you can identify organizational constraints
For example. The IT goes on holiday for a month.
We lack a high budget - so maybe we get pre-owned.
HIPAA mandates we use IPSEC security for the VPN (which slows down a VPN)
Technological goals is where you can set the deliverables , like reduce latency by %
technological constraints can be cabling issues. Sites. legacy equipment
So far so good.
This is all in the Prepare.
Characterizing the network.
Simply go and ask for any current documentation.
Then validate the documentation to see it is relevant and add more detail.
After that you can run analysis tools to gather data on traffic and protcols.
Site, lan , wan ,power, cabling, rooms
Use existing documentation
Existing tools
or buy new tools.
Cisco Works can give you hardware and software.
make it pretty granular.
Device type - model -software on it - configurations - data from tools - speeds -CPU/mem - WAN data
This can be quite extensive however it can help for building a better design.
Tools
Cisco Works - maps the network and collects the hardware and software
Netflow - gives you data on the traffic.
NBAR - analyzes the application flows.
Third party tools -
Additional tools can be used for example for wireless.
Airmagnet - can analyze interference.
Commands for Cisco.
show tech-support gives you a detailed output
show process CPU - gives you a CPU reading
show version - will show you the IOS you are running.
show process memory - gives you the memory usage.
show log - will give you errors on the log
show interface - will give you stats on the interface.
show policy-map interface will show you policy maps on it.
show running-config will give you the configuration so you can assess the current network design.
show ip cache-flow
will give you the netflow output.
CNS Cisco netflow collector engine collects netflows from devices.
Checklist for best practices
Nework LAN should use switches and not hubs.
no WAN link is saturated anything above 70% is a red flag.
Response times should be less than 100ms or 2ms in the LAN.
Segments should not have more than 20% broadcast /multicast
Ethernet should not have more than 0.1 percent collisions (high utilization leads to collisions)
CPU of more than 75% for more than 5 minutes is a red flag.
output queue drops should not exceed 100 for an hour
Input queue drops should not exceed 50 for an hour
buffer missed 25 per hour
ignored should not exceed 10
QoS should be configured for VOIP or other sensitive traffic.
Steps were
Documentation
Audit of the network - cisco works
Traffic analysis - CNS analyze netflow.
Designing the network.
In order to validate the design you can use a
Prototype - which is a separate network test. (in a lab)
Pilot - a test run on a live network (for example only in the IT department)
Design from the TOP of the model down.
Application needs
then only the transport network and data link physical
Top - Down is more time consuming however more reliable.
Bottom - up relies on experience but can be prone to error.
Design Document -
This document details the business requirement + conceptual design.
The current network and gaps.
Then the design plan, configuration and testing.
1. Introduction - sometimes called the executive summary.
2. Design requirement - that are the business ones
3. existing network - add diagrams and data accumulated from the audit.
4. Design - and why it solves the requirements and addresses the current
5. Validation - data on the testing that was done. also called Proof of Concept.
6. Impelentation plan - for the Staff on how to impelement the design.
7. appendixes with all the detailed data gathered.
Before you move on you need to create a detailed implementation plan.
1. Step
2. reference to the design document
3. detailed implementation of the step.
4. detailed rollback.
5. estimated time to complete.
Q&A
list the PPDIOO
Prepare
plan
design
implement
operate
optimize
which business forces affect the design.
ROI
REgulations
business competitivenes.
efg
Which step is critical in identifying the organizational goals.
Identify customer requriements a
What needs to be obtained prior to designing the network.
Organizational goals
technical constraints
existing applications
bce
Match each PPDIOO with
i implement installation and config
ii optimize proactive management
iii design provides HA design
iv prepare Gap analysis
v operate day to day
vi plan Establish requirements.
Which borderless architecture provides mobility.
User services provide mobility
Which are three steps in the design part of the PPDIOO
b design the solution
e validate the design
a review the cost.
BCD
Match infrastructure with the description.
i identity is AAA NAC D
ii mobility is access from arremote location A
iii Storage is storage of critical data e
iv compute is improved computational resources.
v security is secure communications.
vi voice is unified messaging.
A company location is used for a test
that is a PILOT b
An isolated location is used for a test.
That is a Prototype A
NBAR netflow are
Network analysis tools B
Monitoring Cisco works and Whatsup are.
Network audit tools A
Which are technical constraints.
existing wiring A
existing bandwidth B
Which are technical goals.
Improve the LAN C
add redundancy D
Which are organizational goals.
improve customer support A
Increase competitiveness C
Reduce operational cost E
Which are organizational constraints.
BDF
What components are in the design document.
ip scheme A
implent plan B
design requirements D
selected routing E
Match each document with the description.
i. introduction goals d
ii design requriements organizational requirements c
iii existing network current diagram b
iv design new logical topology f
v proof of concept pilot e
vi implementation plan detailed steps A
vii appendix supporting information g
Network health
is based on stats from the network c
Network audit 75% for a wan link
increase the bandwidth C
What information in a network audit report.
A device list
B IOS versions
C router models
D interface speeds
E network utliziation.
Which three steps help characterize the network
BCD
Traffic analysis
audit
Collect info
Which command shows CPU
show process CPU b
What can be obtined using the traffic analyzer.
Average bit rate. e
Which commands provide information about apps protocols flows.
show ip interface b
show ip cache flow c
show ip nbar d
what is used to create the documetnation of the current network
A show commands
b audit
c audit
d existing documentation
Sequence of top down is the
application presetnation session transport network datalink phyiscal
Which are potential scopes. ???
29
dbca
30
cd
31
abcd
32
b pilot
33 which three are in the design
b design requirements
a design details
e implementation plan.
Have some free time. So I'll just pass it.
Foundation.
PPDIOO
Prepare
Plan
Design
Implement
Operate
optimize
So far so good.
The test revolves around acronyms so memorize.
Business forces that will impact your design.
ROI - Return on investment
Companies expect either savings or improved earnings due to the devices you place.
Let's cough up an example.
Let's say I have 8 switches in my rack.
To manage them I need to connect using telnet/console to the switch and give it some commands.
Let's say I need to upgrade them. Then I would need to spend 20 minutes * 8 = 160 minutes
on an upgrade.
Let's say I want to troubleshoot the switches, then I would need 8* more screens and command typing to get the issue resolved.
You can calculate the cost of IT engineer as $50 an hour and start adding it up.
now to save money in the above example. I can convince management to purchase a
Cisco 6513 chassis.
Now, I only need to upgrade one supervisor and troubleshooting becomes easier.
So I am saving money.
The ROI is calculated by measuring how long would it take to recover the investment I just made
on the chassis.
Another way to look at ROI is by looking at the benefits of an upgrade.
Let's say the users spend 5 minutes every day till the Outlook syncs and another 5 minutes
a day wasting time waiting for files to get copied.
10 minutes * $6 an hour * 600 employees = $600 dollars of wasted time staring at the screen.
Now if I upgrade them to 1000 instead of 10/100 then they will spend 5 minutes waiting.
So 5 minutes * $6 an hour * 600 employees = $300
So if I upgrade them to 1000 Mbps switches and network cards I will be saving $300.
So 20 switches * $10000 each = $200000
Now your ROI break point or the point at which you start making money on the upgrade is
$20000/$300 = 660 days
So if I invest in upgrading the switches the company within 2 years will have made back the cost
and will be making money on the investment.
A good salesperson will easily be able to demonstrate the value and not just say
we need 1 GigE switches (1000Mbps) because they are pretty or fast.
{good salespeople are hard to come by}
Regulations
Because of companies like Enron and crackers. There are new regulations in the market.
HIPAA Health Insurance Portability Accountability Act. -
You me and everybody has a record of their visit at the Doctors, well I might have an erection problem.
Now I wouldn't want it to be published on the web when you google saar that I appear as having that.
So in order to protect the confidentiality of my medical information and transactions.
HIPAA came along with guidelines, so the Dr. needs a safe system. When he connects to my insurance
he needs to have a secure VPN. When they store my data their Database needs to be secure. etc
The second example is Visa and banks. If I can hack into a computer at a retailer that does Visa transactions
I can copy the numbers and Secure codes in the back and then go shopping!!!!!
So for that you have the PCI DSS Payment Card Industry Data Security Standard.
So now my Amazon shopping is secure and I can safely swipe my card.
The third good example is Sarbannes-Oxley. This gem was passed following Enron collapsing
without anyone having seen even a hint. It talks about auditing and how you should "measure"
kpms key performance indicators in IT.
So for us it means we have to monitor the network at Amazon, because if it collapses then the
stock goes down the toilet. So now business must track and publish KPMs so their stock owners
can asses the health of the company.
All in all, when you are selling. You can throw those around in order to get the client to be MORE secure
Competitiveness
So let's say I have a warehouse with dolls. Now my competitor just built an ecommerce site.
So now he has an advantage. To match him I must build one.
Let's say he is using two internet providers so when a storm hits I am out of business and he is running
around stealing my clients.
So now I need a more powerful router.
These three are the Business Drivers according to CCDA.
Technological Drivers
At the same time there are simple Technological drivers.
Removal of Borders
Back when I started in IT if you worked for an ISP you got a free Frame relay for home.
(this was in Dial up days). So I could work from home to solve issues.
Today with the Iphones, wireless, laptops etc. People want to work from everywhere. On the road
at the airport, at home when sick, etc. So there are no more borders. You need to give them more and more
access.
To address this you will add VPNs, remote access, tunnels etc
Virtualization
Most servers in the enterprise are no longer stand alone. Companies placed them in Virtual Servers which run on top of a Hypervisor. Vmware is one example. The Hypervisor will have 50 VMs running on it.
This leads to a very high utilization rate of the resources and a lot of flexibility.
In order to address this you will probably have to upgrade the network because storage traffic takes
a lot of resources and requires low latency.
Growth Of Applications
so yeah, back when I was a kid 1 channel was all we had on TV. Then two , 20 and now you have
800 channels, streaming VOD etc. All of this requires more and more powerful servers and networks to handle it. The programs over time also become more complex.
If before I was happy word typed a letter. Now I want graphics and links and Visios embedded etc.
So more more more horsepower from the PC and the network.
So
Business drivers are usually driven by business people.
technological ones will be driven by IT asking for resources.
IT optimization can be divided into three type.
Datacenter - ie servers, infrastructure
Network - LAN and WAN
Applications - upgrade the software on them and the application.
Each one has their own people.
Datacenter would be Dell, IBM, HP inclined people.
Network - would be CCIE's Juniper etc.
Applications - are usually programmers and software people.
You can no longer master all three unless you are in very SMB .
Cisco has created a FrameWork.
A framework is a patch of ideas or guidelines to help you talk the same lingo to other people
in the field. Which is very important. I might be peddling eggplants and the other guy is british so he is talking about Aubergines. So in the end we fail to make Baba Ganush .
As you can see there are areas
where they will intersect.
Cisco Borderless
anywhere, anytime,anything,anyone
lot's of A's
So from anywhere you go(abroad) , at anytime you want (late), anything you want (like outlook), anyone (let's say my business partners)
It also needs to be secure (VPN) , reliable (high Availiability, clusters) , seamless (one login)
It will be made from 4 Blocks.
Policy and Control - You can apply policies anywhere, if you are at home or you just came to the office
Network Services - these are services for the network, like control or energywise
User Services - like mobility , performance (acceleration), Security (vpn)
Connection management - manage the connection security everywhere.
Collaboration
Alright we got a nice network but money is made as a team effort. I need to talk to sales, they need to
talk to shipping, shipping to fed ex.
For all of this to happen you need collaboration software.
Communication and collaboration applications - telepresence (video conferencing), Email, etc
Collaboration Services - these are services for the layer above for example PRESENCE
so I know if the user is online, then I can chat him
Infrastructure - this layer provides you with the tools for the two above.
It includes virtualization , storage, network
Datacenter
Cisco builds on the Datacenter 3.0
It's a comprehensive Cisco solution to help with this.
they basically have entered the Hardware for the Datacenter market and the networking of it.
The benefits from the
Framework
are
Functionality - they support the requirements.
Scalability - they allow room for growth
Availability - reliable and anywhere anytime.
Some more examples are.
Performance - less latency, more bandwith,
Manageability - easier to use , easier to detect faults.
Efficiency - the cost is reasonable
The architecture is roughly.
Switches/ servers (nuts and bolts)
They are all easier to control with the cisco UNIFIED fabric,network and computing. (software)
They result in better energy , workload, efficiency
and allow you to virtualize, cloud, automate and consolidate (high level)
Alright,
back to PPDIOO
Prepare
Plan
Design
Implement
operate
optimize.
Keep drilling that cycle that Cisco recommends.
The benefits of using it are.
Lowers the Total Cost of Ownership TCO by validating and planning
Increases availability by producing a sound design and validating it.
Improve the business agility by establishing business requirements and strategic technologies.
Speed access to applications - byimproving performance,availability reliability, scalability.
Actions that lower the total cost of ownership are.
identify and validate the technology - for example identify you need a chassis and test it
plan for infrastructure changes and growth - for example the chassis will be flexible on the line cards you add
Develop a sound design with business goals - a business goal can be more reliability which the
chassis will handle with Dual Supervisors.
Accelerate the implementation - less downtime due to solid implementation.
Improve the network and management - make it easier to manage.
reduce operating cost by improving the process - for example the chassis allows for easier management
Actions that increase availability are.
Asses the network - so it can withstand the traffic.
Specify the hardware and software and keep it current by updating the software (smartnet)
Produce a sound design - so it won't collapse
stage and test -- to make sure it works in your network and not just on the datasheet
Improve staff skills - so they will know what to do.
Proactively monitor the network - so you can predict growth and problems
Proactively manage the security - so you can block breaches and remediate breaks.
Actions that improve business agility
establish the business requirements.
ready the sites and the people
Integreate the technical aspect and align it with the business requirement.
expertly install
continually monitor it
Actions that accelerate the application and services
assess the network
improve the service delivery
improve availability
Manage and resolve problems and keep everything up to date.
As you can see this is a cycle.
Prepare
This phase is where you come up with the Business case.
The business case creates a justification for the expenditure of time and money.
Technologies that support the architecture you are planning will be considered.
Plan Phase.
Here you drill down and identify user needs and goals.
You will also assess the network and see if there is a GAP against best practices and documentation.
You will develop a PROJECT plan with the resources milestones and identify the resources
for the design phase.
Design Phase.
Based on the previous data you gathered and in allignment with the business goals
you will produce a detailed design.
The design will include the Visio diagrams and equipment list.
You will also make the project plan more granular.
Once the design is approved you move to implement it.
Impelentation phase.
New equipment is set up and configured.
Changes should be brought up in change meetings to minimize downtime
Each step should have.
1. description
2. Detailed implementation
3. time to implement
4. guidelines for rolling it back in case of failure.
5. changes must be tested to validate them.
Operate phase.
At this stage you operate the equipment.
Day to day work along with accumulating data for the next stage.
Optimize stage.
At this phase you use the data from operations to see if there is room for improvement.
Also you analyze any problems.
If there is room for change.
You can start the Prepare phase and place a business case for improvement or change
which will start the cycle again.
Since this is CCDA concentrate on the first three stages.
Step 1 Prepare - identify the client requirements as far as business and give a conceptual architecture.
for example : the client is complaining about latency. So conceptually we will look at Nexus 3000
Step 2 Plan - Come up with an assesment of what he has now and the weakpoints or adjustments.
come up with a project plan to move ahead.
Step 3 Design - come up with a detailed design plan and granular project plan
When you run the prepare.
Talk to business managers and to department heads and users to see WHAT they need
business wise .
You can use the
1. Identify the applications and services. -example exchange and outlook.
2. Define the organizational goals example we want outlook to be more responsive and robust
3. define organizational constraints example we have a low budget.
4. Define the technical goals example improve latency by 30%
5. Define technical constraints example the switches are eos and outdated.
You can help yourself by using a template.
now you will have all of the applications identified and the requirements of them.
So the organization wants us to improve the performance of outlook.
now you can identify organizational constraints
For example. The IT goes on holiday for a month.
We lack a high budget - so maybe we get pre-owned.
HIPAA mandates we use IPSEC security for the VPN (which slows down a VPN)
Technological goals is where you can set the deliverables , like reduce latency by %
technological constraints can be cabling issues. Sites. legacy equipment
So far so good.
This is all in the Prepare.
Characterizing the network.
Simply go and ask for any current documentation.
Then validate the documentation to see it is relevant and add more detail.
After that you can run analysis tools to gather data on traffic and protcols.
Site, lan , wan ,power, cabling, rooms
Use existing documentation
Existing tools
or buy new tools.
Cisco Works can give you hardware and software.
make it pretty granular.
Device type - model -software on it - configurations - data from tools - speeds -CPU/mem - WAN data
This can be quite extensive however it can help for building a better design.
Tools
Cisco Works - maps the network and collects the hardware and software
Netflow - gives you data on the traffic.
NBAR - analyzes the application flows.
Third party tools -
Additional tools can be used for example for wireless.
Airmagnet - can analyze interference.
Commands for Cisco.
show tech-support gives you a detailed output
show process CPU - gives you a CPU reading
show version - will show you the IOS you are running.
show process memory - gives you the memory usage.
show log - will give you errors on the log
show interface - will give you stats on the interface.
show policy-map interface will show you policy maps on it.
show running-config will give you the configuration so you can assess the current network design.
show ip cache-flow
will give you the netflow output.
CNS Cisco netflow collector engine collects netflows from devices.
Checklist for best practices
Nework LAN should use switches and not hubs.
no WAN link is saturated anything above 70% is a red flag.
Response times should be less than 100ms or 2ms in the LAN.
Segments should not have more than 20% broadcast /multicast
Ethernet should not have more than 0.1 percent collisions (high utilization leads to collisions)
CPU of more than 75% for more than 5 minutes is a red flag.
output queue drops should not exceed 100 for an hour
Input queue drops should not exceed 50 for an hour
buffer missed 25 per hour
ignored should not exceed 10
QoS should be configured for VOIP or other sensitive traffic.
Steps were
Documentation
Audit of the network - cisco works
Traffic analysis - CNS analyze netflow.
Designing the network.
In order to validate the design you can use a
Prototype - which is a separate network test. (in a lab)
Pilot - a test run on a live network (for example only in the IT department)
Design from the TOP of the model down.
Application needs
then only the transport network and data link physical
Top - Down is more time consuming however more reliable.
Bottom - up relies on experience but can be prone to error.
Design Document -
This document details the business requirement + conceptual design.
The current network and gaps.
Then the design plan, configuration and testing.
1. Introduction - sometimes called the executive summary.
2. Design requirement - that are the business ones
3. existing network - add diagrams and data accumulated from the audit.
4. Design - and why it solves the requirements and addresses the current
5. Validation - data on the testing that was done. also called Proof of Concept.
6. Impelentation plan - for the Staff on how to impelement the design.
7. appendixes with all the detailed data gathered.
Before you move on you need to create a detailed implementation plan.
1. Step
2. reference to the design document
3. detailed implementation of the step.
4. detailed rollback.
5. estimated time to complete.
Q&A
list the PPDIOO
Prepare
plan
design
implement
operate
optimize
which business forces affect the design.
ROI
REgulations
business competitivenes.
efg
Which step is critical in identifying the organizational goals.
Identify customer requriements a
What needs to be obtained prior to designing the network.
Organizational goals
technical constraints
existing applications
bce
Match each PPDIOO with
i implement installation and config
ii optimize proactive management
iii design provides HA design
iv prepare Gap analysis
v operate day to day
vi plan Establish requirements.
Which borderless architecture provides mobility.
User services provide mobility
Which are three steps in the design part of the PPDIOO
b design the solution
e validate the design
a review the cost.
BCD
Match infrastructure with the description.
i identity is AAA NAC D
ii mobility is access from arremote location A
iii Storage is storage of critical data e
iv compute is improved computational resources.
v security is secure communications.
vi voice is unified messaging.
A company location is used for a test
that is a PILOT b
An isolated location is used for a test.
That is a Prototype A
NBAR netflow are
Network analysis tools B
Monitoring Cisco works and Whatsup are.
Network audit tools A
Which are technical constraints.
existing wiring A
existing bandwidth B
Which are technical goals.
Improve the LAN C
add redundancy D
Which are organizational goals.
improve customer support A
Increase competitiveness C
Reduce operational cost E
Which are organizational constraints.
BDF
What components are in the design document.
ip scheme A
implent plan B
design requirements D
selected routing E
Match each document with the description.
i. introduction goals d
ii design requriements organizational requirements c
iii existing network current diagram b
iv design new logical topology f
v proof of concept pilot e
vi implementation plan detailed steps A
vii appendix supporting information g
Network health
is based on stats from the network c
Network audit 75% for a wan link
increase the bandwidth C
What information in a network audit report.
A device list
B IOS versions
C router models
D interface speeds
E network utliziation.
Which three steps help characterize the network
BCD
Traffic analysis
audit
Collect info
Which command shows CPU
show process CPU b
What can be obtined using the traffic analyzer.
Average bit rate. e
Which commands provide information about apps protocols flows.
show ip interface b
show ip cache flow c
show ip nbar d
what is used to create the documetnation of the current network
A show commands
b audit
c audit
d existing documentation
Sequence of top down is the
application presetnation session transport network datalink phyiscal
Which are potential scopes. ???
29
dbca
30
cd
31
abcd
32
b pilot
33 which three are in the design
b design requirements
a design details
e implementation plan.
Subscribe to:
Posts (Atom)