Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Chapter Roadmap
Applying Maintenance Maintenance Processes and
Methodologies
Procedures
Maintenance Models Network Task Identification
and Methodologies Network Maintenance
Determining
Planning
Procedures and Tools
Scheduling maintenance
for Maintenance
Formalizing ChangeModels
Control Procedures
Establishing Network
Documentation
Procedures
Establishing Effective
Communication
Defining Standardization
Planning for Disaster
Recovery
Network Monitoring and
Performance Measurement
Network Maintenance
Tools, Applications
and Resources
Fundamental Tools,
Applications and
Resources
CLI, debug, GUI,
Backup Servers, Log
Servers, Time
Servers
Configuration and
Documentation Tools
Logging Services
Network Monitoring and
Performance
Measurement Tools
Implementing Backup
and Restore
2
Disaster Recovery Tools
Radia Perlman
Applying Maintenance
Methodologies
Maintenance Models and Methodologies
Determining Procedures and Tools for Maintenance
Models
Interrupt Driven
10
11
12
Chapter Roadmap
Applying Maintenance Maintenance Processes and
Methodologies
Procedures
Maintenance Models Network Task Identification
and Methodologies Network Maintenance
Determining
Planning
Procedures and Tools
Scheduling maintenance
for Maintenance
Formalizing ChangeModels
Control Procedures
Establishing Network
Documentation
Procedures
Establishing Effective
Communication
Defining Standardization
Planning for Disaster
Recovery
Network Monitoring and
Performance Measurement
Network Maintenance
Tools, Applications
and Resources
Fundamental Tools,
Applications and
Resources
CLI, debug, GUI,
Backup Servers, Log
Servers, Time
Servers
Configuration and
Documentation Tools
Logging Services
Network Monitoring and
Performance
Measurement Tools
Implementing Backup
and Restore
13
Disaster Recovery Tools
14
15
Scheduling Maintenance
Interrupt driven or part of maintenance cycle
Schedule guarantees that these tasks will be done regularly and will
not get lost in the busy day-to-day work schedule.
Change requests need not be handled immediately, but during the
next scheduled timeframe.
Allows you to properly prioritize tasks
Scheduled maintenance, tasks that are disruptive to the network
are scheduled during off-hours.
16
17
18
19
20
21
22
Communications is Key!
23
Standardization
24
26
27
Project?
28
Chapter Roadmap
Applying Maintenance Maintenance Processes and
Methodologies
Procedures
Maintenance Models Network Task Identification
and Methodologies Network Maintenance
Determining
Planning
Procedures and Tools
Scheduling maintenance
for Maintenance
Formalizing ChangeModels
Control Procedures
Establishing Network
Documentation
Procedures
Establishing Effective
Communication
Defining Standardization
Planning for Disaster
Recovery
Network Monitoring and
Performance Measurement
Network Maintenance
Tools, Applications
and Resources
Fundamental Tools,
Applications and
Resources
CLI, debug, GUI,
Backup Servers, Log
Servers, Time
Servers
Configuration and
Documentation Tools
Logging Services
Network Monitoring and
Performance
Measurement Tools
Implementing Backup
and Restore
29
Disaster Recovery Tools
30
Basic components of
a network
maintenance toolkit
31
Basic components of
a network
maintenance toolkit
32
Basic components of
a network
maintenance toolkit
33
Basic components of
a network
maintenance toolkit
34
Basic components of
a network
maintenance toolkit
35
Vital that the clocks of the network devices are properly set and
synchronized.
Ensures correct timestamps on logging and debug output.
Stratum 1 server: a server that is directly connected to an
authoritative time source such as a radio or atomic clock (
www.time.gov and www.worldtimeserver.com/atomic-clock ).
Statum 2 server: A server that synchronizes its clock to a stratum 1
server.
Etc.
36
37
http://oreilly.com/catalog/hardcisco/chapter/ch10.html
38
39
40
Cisco Feature Navigator: This tool allows you to quickly find the
right Cisco IOS software release for the features you want to run on
your network.
Not needed with IOS 15
http://tools.cisco.com/ITDIT/CFN/
41
42
43
Documentation tools:
Wiki: A wiki combines easy web-based access with intuitive editing
capabilities.
44
Documentation
45
Logging Services
Events on networking devices can be logged.
Various events
Various levels of severity
Events are logged to:
Console (default)
Console display
Buffer
Server
Examples
Interfaces up or down
Configuration changes
Routing protocol adjacencies
46
Logging
Services
47
Logging Services
Console
You can also adjust the logging severity level of the console.
By default, all messages from level 0 to 7 are logged to the console;
You can configure the severity level as an optional parameter:
loggingconsolelevel
Limits the logging of messages displayed on the console terminal to the
specified level and (numerically) lower levels more severe.
You can enter the level number or level name.
48
Logging Services
Buffer
loggingbuffered[buffersize|level]
May or may not be the default
By default, messages of all severity levels are logged to buffer.
showloggingDisplays the content of the buffer
The buffer is circular, meaning that when the buffer has reached its
maximum capacity, the oldest messages will be discarded to allow the
logging of new messages.
49
Logging Services
Server
loggingipaddresscommand
Some IOS version it is logginghost
By default, only messages of severity level 6 or lower will be logged to the
syslog server.
This can be changed by entering the logging trap level command.
50
51
Motivations for
measuring network
performance
The three main motivations for measuring network performance are as follows:
Capacity planning:
Create a baseline network traffic
Recognize trends in traffic growth
Predict when you need to upgrade links before congestion and performance
problems.
Diagnosing performance problems: difficult to troubleshoot because hard to
quantify and often intermittent in nature.
Application X is really slow lately.
What is causing the problem? Where is it occurring?
SLA compliance: Guaranteeing a level of service to others through an SLA or
certain level of service by a provider, need to have a method to measure.
52
Measuring network
performance
53
Copy command
R1# copy startup-config ftp://backup:san-fran@10.1.152.1/R1-test.cfg
Address or name of remote host [10.1.152.1]?
Destination filename [R1-test.cfg]?
Writing R1-test.cfg !
2323 bytes copied in 0.268 secs (8668 bytes/sec)
copy[/erase]sourceurldestinationurl
Copy the startup-configuration to a FTP server at 10.1.152.1
Create a file named RO1-test.cfg
username backup and password san-fran
The username and password are specified by placing the username and
password as username:password@before the server name or IP
address in the URL.
For SCP, HTTP and HTTPS you would use a similar syntax, replacing the
URL prefix ftp:// with scp://, http:// or https://
55
Copy command
R1(config)# ip ftp username backup
R1(config)# ip ftp password san-fran
R1(config)# exit
R1# copy startup-config ftp://10.1.152.1/R1-test.cfg
Address or name of remote host [10.1.152.1]?
Destination filename [R1-test.cfg]?
Writing R1-test.cfg !
2323 bytes copied in 0.304 secs (7641 bytes/sec)
56
Archive command
R1(config)# archive
R1(config-archive)# path flash:/config-archive/$h-config
R1(config-archive)# write-memory
R1(config-archive)# time-period 10080
Configuration Replace and Configuration Rollback A feature for the creation of
configuration archives, introduced in Cisco IOS Software Release 12.3(7)T.
The only mandatory parameter is the base file path.
Local or network path
Optional variables:
$h for the devices hostname in the filename
$t to include a time and date stamp in the filename
writememoryoption - Triggers an archive copy of the running configuration to
be created any time the running configuration is copied to NVRAM.
timeperiodminutesoption - Each time the time period elapses, a copy of
the running configuration will be archived.
*archiveconfig Manually saves a copy of the current running
57
configuration to the Cisco IOS configuration archive
Archive command
R1(config)# archive
R1(config-archive)# path flash:/config-archive/$h-config
R1(config-archive)# write-memory
R1(config-archive)# time-period 10080
R1# show archive
There are currently 3 archive configurations saved.
The next archive file will be named flash:/config-archive/R1config-4
Archive #
Name
0
1
flash:/config-archive/R1-config-1
flash:/config-archive/R1-config-2
Configure
Replace
configurereplacetargeturl[list][force][timeseconds][nolock]
59
R1#configureterminal
Enterconfigurationcommands,oneperline.EndwithCNTL/Z.
R1(config)#hostnameTEST
TEST(config)#^Z
TEST#configurereplaceflash:configarchive/R1config3list
Thiswillapplyallnecessaryadditionsanddeletions
toreplacethecurrentrunningconfigurationwiththe
contentsofthespecifiedconfigurationfile,whichis
assumedtobeacompleteconfiguration,notapartial
configuration.EnterYifyouaresureyouwanttoproceed.?[no]:yes
!Pass1
!ListofCommands:
nohostnameTEST
hostnameRO1
end
Totalnumberofpasses:1
RollbackDone
60