Friday, 29 July 2016

Network Maintence Model

Network maintenance model
1.       FCAPS:
è        It stands for fault management, configuration management, accounting management, performance management and security management.
Fault Management: Use network management software to collect information from routers and switches. Send an e-mail alert when processor utilization or bandwidth utilization exceeds a threshold of 80 percent. Respond to incoming trouble tickets from the help desk.
Configuration management: Require logging of any changes made to network hardware or software configurations. Implement a change management system to alert relevant personnel of planned network changes.
Accounting Management: Invoice IP telephony users for their long-distance and international calls. Keeping track of what is being done on the network and when it is being done.
Performance management: Monitor network performance metrics for both LAN and WAN links. Deploy appropriate quality service (QoS) solutions to make the most efficient use of relatively limited WAN bandwidth, while prioritizing mission-critical traffic.
Security Management: Deploy firewall, virtual private network and intrusion prevention system(IPS) technologies to defend against malicious traffic. Create a security policy dictating rules of acceptable network use. Use an authorization, authentication and accounting (AAA) server to validate user credential, assign appropriate user privileges and log user activity.
è       It defined by ISO.

2.       ITIL
è      IT infrastructure library defines a collection of best practice recommendation that work together to meet IT business management goals.

3.       CISCO lifecycle service
The cisco lifecycle services maintenance model defines distinct phases in the life of a cisco technology in a network. These phases are prepare, plan, design, implement, operate, and optimize. As a result, the cisco lifecycle services model is often referred as the PPDIOO model.

Thursday, 28 July 2016

Virtual Private Network (VPN) in CISCO



What is a VPN?
A Virtual Private Network is a type of a connection that connects remote user s to their central office using internet. An IPSEC VPN is virtual tunnel through your public ISP network. VPN are highly encrypted and secure connections.

how to setup a vpn on Cisco:
This article is about the VPN site to site CLI configuration on GNS3, It’s not so much the commands.
 I shall divide these configurations into few parts to make it easy to understand i.e.

1.    Define isakmp policy and transform set:
Isakam is the protocol that allow all of keys exchange to happen automatically no need to manually configure the VPN. In this step we shall define authentication type, encryption type, hash. Lifetime and define what session keys are used. 

2.      Create an ACl
Define interesting traffic using an access control list, this ACL is not for deny or permitting some IP addresses but it just says which addresses are encrypted      

3.      Set up cryto Map and assign this to interface: 
      In this step we shall tie up all piece so that we can apply to an interface

Virtualization Infrastructure By CISCO

        Cisco Launches Network Functions Virtualization infrastructure  Solution to help service providers run network  services Better and faster.

        Network Function virtualization (NFV) and software defined networking (SDN) are the popular software based approaches that service provide are using  and deploy.