Upload
glenn-fluehr
View
232
Download
0
Embed Size (px)
DESCRIPTION
Network Management using CISCO
Citation preview
Running head: Phase 1 Individual Project 1
Target Organization Selection
Glenn Fluehr
Introduction to Network Management
Wednesday, April 26, 2023
Phase 1 Individual Project 2
ContentsTarget Organization Selection..............................................................................................4
Week 1: Identifying the Network.....................................................................................4
Week 2: Diagramming the Network................................................................................6
Cisco ONE Enterprise......................................................................................................6
Example 1 – Cisco Network Access................................................................................7
APIC EM described.........................................................................................................7
Example 2 – Cisco Control Layer, Application Layer and Element Layer.....................8
Week 3: Network Models..............................................................................................10
Cisco IOS Software explained.......................................................................................10
IOS XE and IOS XR described.....................................................................................10
Cisco’s Nexus – The wonder of the world.....................................................................11
Diagram for the Nexus 1000V.......................................................................................12
Load Balancing on a Cisco IOS.....................................................................................13
Load Balancing described..............................................................................................14
IP switching by Cisco IOS.............................................................................................15
Diagram of CEF.............................................................................................................16
Week 4: Protocols and Agents.......................................................................................16
Cisco CallManager and how it works............................................................................16
Cisco’s PSTN explained................................................................................................17
Phase 1 Individual Project 3
IP and RFC791 described..............................................................................................17
ISO diagram for Cisco...................................................................................................18
IP accounting.................................................................................................................19
Looking at a Cisco NetFlow..........................................................................................19
Cisco’s NetFlow explained............................................................................................20
Week 5: Network Security.............................................................................................21
Approving Network Security Changes..........................................................................21
Secured Network Diagram............................................................................................22
Monitoring Security of Your Network...........................................................................23
Restoration of a networked diagram..............................................................................25
Cisco Network Security Restoration.............................................................................25
Risk Management and Lean Six Sigma.........................................................................27
What is the Disaster Recovery System?........................................................................27
Week 5: Network Management.....................................................................................28
Recovery point of a network for Cisco..........................................................................28
References..........................................................................................................................30
Phase 1 Individual Project 4
Target Organization Selection
Introduction to this paper, I will be describing a company called Cisco and how they
work their network system at large. Since they will not indulge exactly what their system looks,
acts, and runs like, I will be doing some deep research from employees I know personally to help
me get the information I am looking for here in this paper. References will be from the email I
will be getting and sharing with you all here. Cisco is one of the top 5 corporations that has the
most secure system worldwide. Next to US Government that Cisco helped build, Cisco is a
perfect example of a “Network System” at its best.
Week 1: Identifying the Network
Cisco has a vast variety of avenues it offers others that specializes in new products and
networking and the internet. All parts of Cisco the networking side they make switches. Using
the internet they make the routers. The switches are used to direct traffic on a LAN, routers direct
traffic between LANS or in WANS. Here is where Cisco is strong in and offers their customers
great and powerful mean to help them get their jobs done right the first time. There are currently
over 74,000+ employees currently working full and part time. The headquarters are located at
170 West Tasman Dr., San Jose, CA 95134 USA (408) 526-4000 (800) 553-NETS (800) 553-
6387 according the website of Cisco.
Since it is Cisco, they use their own equipment to run the network at hand. The many
towers, switches, cable, and other items they use are important for them to keep a clean and vital
network as they are one of the worldwide companies other businesses and governments depend
on for security, connections, and overall performance. They must keep a tight and functional
Phase 1 Individual Project 5
network as they prove to others that their system is the best. I could list their products and
services they offer, I even tried to contact them to see if they would allow me the information I
needed to show how their network works, but all they could do was show how others they made
to work instead. They have about half of their staff in the IT department and about 20% of them
work on the high end, secured areas of their network that this allows for less security breaches
and creating false data on their networks all over the world.
Networks are an essential part of business, education, government, and home
communications. Many residential, business, and mobile IP networking trends are being driven
largely by a combination of video, social networking, and advanced collaboration applications,
termed "visual networking. “The Cisco Visual Networking Index (VNI) is our ongoing effort to
forecast and analyze the growth and use of IP networks worldwide. There is so much to share
with you all I have to pick and choose what they are going to be, so I pick this one since I have
seen in work real life. With the help of IBM both of these companies keep our networks working
strong and efficient. As long as there is a demand for the net both IBM and Cisco will be there to
help us all out.
Phase 1 Individual Project 6
Week 2: Diagramming the Network
Cisco ONE Enterprise
Cisco has a great and powerful Network they use with the internet that creates many
business opportunities. When it comes to your network you must be able to adapt to each and
every aspect of the network you will create and Cisco can help. All you need is a new
architecture to have automatically update and process all provisions and deploy all of your
networks systems and services with applications and to do this Cisco has built a “Cisco
Borderless Networks architecture. It is called the Cisco ONE Enterprise Networks Architecture
that moves the IT department through a platform that is open, programmable, and application
centric. Cisco has not only topped its own older versions of other networks but it has gone
beyond the basic software defined networks by creating larger scale approach to network
programmability. With this increase of the network agility and performance it also takes on
existing network resources to help you evolve your own network with new opportunities,
network application layers. Cisco gives people the means to have an open application ecosystem
to help improve and enhance innovation with lowering risks and making it easier to integrate.
Many ranges of applications that meet your networks needs may include a cloud system,
mobility for your many users out on the field and of course security throughout your network to
keep all data “true”.
Phase 1 Individual Project 7
Example 1 – Cisco Network Access.
Many new ideas and models Cisco has created with network analytics that is available to
all applications that offer great insight that help create new business models such as a “Control
Layer”. Cisco Application Policy Infrastructure Controller (APIC) is part of the Enterprise
Module that is the networks control layer of an open network environment.
APIC EM described
With Cisco’s APIC EM allows the ACI (Application Centric Infrastructure) to any WAN
and access edge. The ACI is a holistic architecture to centralize and automate of policy based
application profiles. This gives the IT department of an organization a quicker response time for
any network issues it may come across. The APIC EM is available to all customers and
developers that use this system to download needed items with no charge in Cisco’s “DevNet”
community.
Phase 1 Individual Project 8
Starting in 2015, Cisco will start offering the new Cisco ONE Software that will focus on
simplified purchasing models, focusing on common customer scenarios in the data center and
WAN and LAN infrastructure. For more than 20 years now, Cisco has developed great and
everlasting technology for all businesses and government with other people that can afford it. As
I have mentioned above with Cisco’s ONE software people can extract the value of this new
software that address many common business and other personal challenges in its 3 domains
(WAN, Data Centers, and Cloud Networking). With ONE on your system it allows you to cut
through the complexity of product by product based software features by decoupling the
ownership of these features in the hardware operating systems. The separation that uses the rights
are potable across many generations of hardware. It also gives the customers the ability to
acquire and deploy new virtual manner through an integrated licensing portal.
Example 2 – Cisco Control Layer, Application Layer and Element Layer
Cisco’s Control Layer supports API that include Cisco’s Open Network Environment
Platform Kit (onePK) that gives Cisco’s networks intelligence. These include an OpenFlow for a
Phase 1 Individual Project 9
standard based interoperability and a Command line interfaced (CLI) that helps users and IT to
protect the existing investments they have made on the network. They also offer what they like to
call the Network Element Layer as you see above in the Example 1 diagram. It is a
comprehensive set of devices that run through routing and switching with wired and wireless
capabilities that help the physical and virtual networks. Even large corporations and many
governments deploy Cisco’s IOS software and programmable application integrated circuits or
(ASIC) which help throughout any large networks here on the internet.
Cisco’s onePK is within its ONE or Open Network Environment software defined
networking (SDN).In Example 2, you can find these things I mention here. It is truly easy to use
for all IT and with its own toolkit for making deploying development, creation and rapid service
with many more applications it offers the network. OnePK offers new and existing networks a
more powerful and flexible control. All online and offline users have access to an all in one
development environment that simulates each and every network elements. OnePK is also
capable of integrating with other major networks and OS that include PyCharm, PyDev, Eslipse,
IDLE, NetBeans with many more that it offers its users on the network. It is also able to support
many common languages such as C, Java, and Python which gives it a powerful use for all on the
network.
Phase 1 Individual Project 10
Week 3: Network Models
Cisco IOS Software explained
Cisco has one of best worldwide IOS software network infrastructure that delivers
seamless integration and business critical services with the support of hardware platforms.
Currently working in over millions of active systems from small home offices to core systems
that support large service provider network around the world. The IOS is a type of operating
system that runs on most of Cisco’s routers and switches. Its core function enables data to
communicate between networks nodes, routing and switching as it moves throughout the system.
It also offers many vast services that any administrator can use to help improve their
performance and security of all of their network traffic. They can include encryption,
authentication, and firewall and policy enforcement. The great quality of services with intelligent
routing and proxy capability. Cisco’s ISRs (Integrated Services Routers) the IOS help support all
call processing and all unified communications services.
IOS XE and IOS XR described
There are 3 variants of the operating system that include the IOS XE, IOS XR, and the
Nexus OS. These are all 3 valuable to any network depending on the demands it requires each
one takes on separate needs and functions within each network system. The IOS XE runs on
every enterprise grade Cisco ISRs and all Aggregation Services Router including the Catalyst
switches. The IOS XR runs the Cisco service provider products such as any Carrier Routing
System routers. With the Nexus OS that runs on any Cisco’s Nexus family of data center
switches. They all give each part a very important protection and ease of use once installed.
Phase 1 Individual Project 11
Cisco’s Nexus – The wonder of the world
The Cisco’s Nexus OS like the 1000V they call the NX-OS switch that rendered fully in
software for any multi-tenant services that composed of both physical and virtual networking.
Distributing virtual switch allows any network team viable access to monitor, manage and
troubleshoot any and all of the physical and virtual networks with the same Cisco commands and
tools offered. The Nexus 1000V is an IEEE 802.1Q base switching technology that is
programmable. If you did not know what an IEEE is it stands for Institute of Electrical and
Electronics Engineers) that is the world’s largest technical professional society. They promote the
development and applications of electronic technology. It is used to control the paths of any and
all applications programming interface (API) in order to communicate with all data planes. It
used physical switch, regardless of who is the manufacturer. In turn this allows any administrator
that uses any non Cisco physical network components to take full advantage of this new Nexus
00V to handle any virtual network management.
Phase 1 Individual Project 12
Diagram for the Nexus 1000V
One thing I like about the Cisco’s IOS router software is its standard functionality to
perform load balancing that is available across all router platforms. It will forward all process to
the router and it is automatically activated if the routing table has multiple paths to one
destination. This standard of routing protocols called the RIP (Routing Information Protocol) or
its cousin called RIPv2 and the EIGRP (Enhanced Interior Gateway Routing Protocol) are all
part of the configured routes and packet that are forwarding mechanisms. It will allow all routers
to use multiple paths to a single destination or “Load Balancing”.
Phase 1 Individual Project 13
Load Balancing on a Cisco IOS
Most all the time the routers must select a route from many learned paths via the same
routing process within the same administrative distance. When a router chooses the path with the
lowest distance to the destination it will calculate the difference and the need to be manipulated
in order to achieve its objective that is load balancing. If any router receives and installs multi
paths with the same administrative distance and cost to each destination then this is where load
balancing can occur. Each number of paths that is used is limited by the number of entries the
routing protocol puts in the table. By default the IOS has four entries for most IP routing
Phase 1 Individual Project 14
protocols with the exception of the BGP (Border Gateway Protocol) there is a max amount of
entries of six different path that can be configured.
Load Balancing described
Most anyone can set load balancing to work per each destination or packet. Each
destination means that the router distributes the packets based on the address. Each is given two
paths to the same network with all packets of the first destination on that network to go over the
first path of all of the packets of the second destination that goes over the second path and so on.
This process preserves the packets order with potential unequal usage of the links provided. If
one host takes on the majority of the traffic all packets use one link that leaves the bandwidth on
other links unused. Using more destination addresses gives a more equal use of links and
allowing the load balancing to work more normally. Here is where the use of IOS software to
achieve a more equal use of each link to build a route cache entry of every destination address
instead of its destination network. All the traffic for different hosts on the same destination
network can use many different paths. If you use this type of traffic control it has a bad side with
the core backbone routers that carry all the traffic. It will affect the memory and processing
requirements for maintaining the cache that will become more demanding.
A new process called per packet load balancing means that the router sends one packet
per destination over the first path and another packet to another destination over another path and
so on. The per packet load balancing guarantees equal load across all links. There is always the
potential that each packet may arrive out of order at each destination because of the differential
delay may exist within the network. But of course Cisco has its IOS software that takes on the
per packet load balancing does disable the forwarding acceleration by the route cache since the
route cache information includes the outgoing interface. This will ensure equal utilization of all
Phase 1 Individual Project 15
the links but the processor intensive task will impact the overall forwarding performance. With
Cisco’s newer switching schemes such as their Cisco Express Forwarding (CEF) that allows you
to do per packet and per destination load balancing more quickly. When you start working with
the CEF you will ask “Who does the load balancing?” and Cisco will tell you that their CEF or
routing protocol is being used. CEF does all the switching of the packets based on the routing
table which is being populated by the routing protocols. It performs all the load balancing once
the routing protocol table is calculated.
IP switching by Cisco IOS
IP switching is an internal mechanism by the Cisco IOS to forward all packets through
routers. Here in lies The Express Forwarding Depending on which of these mechanisms is to be
used so it switches the majority of packets in the overall system performance and load balancing
is affected. The CEF keeps all load balancing through the use of load share tables. All other load
balancing solutions on the Cisco routers is made on outbound interfaces. CEF helps track all
paths based on both the source and destination address of all paths given. This in turn simplify it
where you can say that the path is an IP session and each session is logically identified as a
unique source destination address pair.
Phase 1 Individual Project 16
Diagram of CEF
Week 4: Protocols and Agents
Cisco CallManager and how it works
Cisco has what they call a CallManager system that shares both voice applications and
manual attendant console functions. It helps all services that hold, forward, transfer, and other
services for each users that extend to IP phones and gateways. CallManager is a software based
application to help its capabilities in the production environments that only require upgrades of
software and server platforms that help avoid expensive hardware change costs for all users. The
CallManager and IP phones with Cisco’s gateways and applications that utilize IP network
provides a distributed virtual telephone network. The improvements in this system help the end
users call admission control to ensure that the quality of voice is clear at all time. It even has a
web based interface that configures the databases to provide for remote devices and system to be
configured. This gives the end user easy access to the administrators via HTML based online
Phase 1 Individual Project 17
help. Cisco provides several Windows services that are installed during Cisco CallManager
installation. You use Cisco CallManager Serviceability to activate and deactivate as well as start
and stop the services. After you activate the services, you can configure them by modifying the
service parameters.
Cisco’s PSTN explained
Cisco uses PSTN or a Public Switched Telephone Network that has been transformed into
an ISDN (Integrated Systems Digital Network). Here lies a basic means to implement a SS7
(Signaling System 7) in the PSTN backbone to make it possible such widespread services as we
all know as Caller ID and Dialed Number delivery, 800 Directory, Calling Card services and so
on. Prior to ISDN data connectivity over the PSTN was a basic telephone service. Being
connected over ISDN gives the users the internetworking designer increased bandwidth that
reduces call setup time and latency and lower signal and noise ratios.
IP and RFC791 described
Cisco controls many protocols but I am only going to mention a few and ones that I have
used in this paper. The IP protocol is a network layer that contains addressing information to
control the information to enable packets to be routed via IP is documented in RFC 791 and its
primary network layer protocol in an Internet protocol suite. TCP and IP is the heart of the
Internet protocols and is used vastly within the networks. “IP has two primary responsibilities:
providing connectionless, best-effort delivery of datagrams through an internetwork; and
providing fragmentation and reassembly of datagrams to support data links with different
maximum transmission unit (MTU) sizes.” Border Gateway Protocol (BGP) is a powerful and
scalable routing protocol that is the routing protocol that was employed on the Internet. The BGP
uses many routing parameters, called attributes that defines routing policies to maintain a stable
Phase 1 Individual Project 18
routing exchange with the information when the TCP connects between nodes that are first
established. When there is any changes to the routing table that are detected the BGP routers
send to other networks only those routes that have changed each BGP routers. It also updates
advertise only to optimal path to a destination network used at the time.
As I mentioned above the ISO network management model give five functional areas of
any network management. I will try to explain again this to you all that is called ISO. I hope you
all will learn more this time around.
ISO diagram for Cisco
Here is a basic diagram of an ISO network. Here shows the flow and connections of this
network. In this diagram you will see that Cisco uses a SNMP platform that directly shares the
data with a CiscoWorks200 server. Also they use a new method called Common Information
Model and Extensible Markup Language (CIM/XML) as you will see now being used on the net
as you surf around. I can define the details of the integration with other management models
such as SNMP MIB or Desktop Management Task Force Management Information Files (DMTF
Phase 1 Individual Project 19
MIF) that provide the actual model descriptions. XML represents structured data in textual form.
The goal of XML is to keep most of the descriptive power of SGML whilst removing as much of
the complexity as possible. It is similar to HTML but it used to represent structured data in a
document.
IP accounting
On the other hand, Cisco provides more help and software called IP accounting that
support and provides basic IP accounting functions. User can see information of all the packets
and data being switched through the IOS software. IP traffic is measured only on an outbound
basis. All traffic generated by the new software or terminating in the software is not included in
the accounting information given. This allows to maintain accurate accounting totals of each
check pointed databases used on the network. It has many other functions for users of the
network to utilize at any time it is on demand. The information that identifies IP traffic that fails
IP access lists. Identifying IP source addresses that violate IP access lists signals possible
attempts to breach security. Here gives the analysis of this data to keep the network secure at all
times. Each and every data that the IP accesses is configured and verified.
Looking at a Cisco NetFlow
Cisco NetFlow is a Cisco developed flow technology that allows bandwidth monitoring
of a network. NetFlow Analyzer is a software that uses Cisco NetFlow to monitor bandwidth and
runs in windows and Linux. Cisco routers/switching devices export NetFlow as UDP packets.
Cisco NetFlow is one of the flows, among other flows, that is used to monitor bandwidth in the
network. These Cisco NetFlow packets can be analyzed using NetFlow Analyzer, to monitor
bandwidth, to gather information on the top talkers, applications and many other features.
Phase 1 Individual Project 20
Network traffic analysis is one of the uses of NetFlow Analyzer. NetFlow Analyzer delivers easy
to understand reports on in-depth traffic analysis and network bandwidth monitoring.
Cisco’s NetFlow explained
Cisco’s NetFlow (network flow) is a new technology it has implemented as an input side
measurement technology that allows the capturing of the data required for the network planning,
monitoring and accounting applications. It is employed on each router interfaces for the service
providers or WAN router interfaces with Cisco’s Enterprise customers. Cisco recommends a very
carefully planned NetFlow to be deployed with the NetFlow services that activates on any
strategically located routers. Each Cisco staff works with each and every customer to determine
on which routers to be used to interface with NetFlow for each customer’s traffic flow patterns,
network topology and architecture.
Phase 1 Individual Project 21
Week 5: Network Security
Approving Network Security Changes
This is one of three ways to keep your network safe and secure. There should be an
approved security setup at all time so when things change on a network, it is brought up to the
administrator for approval. The equipment that is used to keep your network safe has also
software to keep track of any changes made. These changes can be good and bad for your
network that is why your administrator needs to be alerted before the change is made on your
network. They call this a security policy that identifies specific security requirements on any
Phase 1 Individual Project 22
technical and non-technical terms. When the administrator defines a requirement as an outside
FTP connection they will allow it to be passed through the firewall. Any outside connections
need to be more protected by the network since you really don’t know what is coming in from an
outside source. So the administrator needs to setup many policies to protect the network from
unauthorized access from the outside. That is why it is really important to created special policies
and requirements for your company using the network.
Secured Network Diagram
The network administrator must create a security team to keep track and review all
requirements created by the network configuration or any design issues that will meet those
Phase 1 Individual Project 23
requirements created by the administrator. Once the team has been created they can keep track
and able to monitor all actions on the network to keep security at its best. All security policies
will be implemented by the team at all times. So when there is a change to a network, they can
apply these polices to keep the network running smoothly. If any changes are being made, and
made by the administrator and updated by the administrator the team will follow the changes
until noted further in any near future made by the administrator keeping the network safe for any
wrong doing and transactions.
Monitoring Security of Your Network
Most important when you deal with a large network with outside means is to keep it all
LOCKED UP until the user or device can prove itself once it connects with the network. When
there is something that has been detected for a change the security monitoring system helps the
security team decide on if it is in violation and is needed to be dealt with. When the administrator
has created a “snap shot” of the network the security software can create a starting point to keep
all security in check. There are levels of security violations it creates Low, Medium, and a High
Risk violation. When the software conducts a Risk Analysis, it will identifies the level of risk
Phase 1 Individual Project 24
that is being monitored and will deal with it based on the preset policies made by the
administrator. While approving certain security changes, the software will identify specific
threats to the network. With having these parameters they can develop a clear picture of what is
needed to be monitored at all times. A Risk Analysis matrix is the firewall that considers if it is a
high risks network device in real time. Once the firewall has determined the level of risk it will
either all or disallow the device or user through to the network to be accessed.
So when you monitor the security levels Cisco recommends you to monitor low risks
equipment every week, medium risk equipment every day and high risk equipment every hour.
This will keep your network secure at the best effort from both the security team and the
administrator. All security policies address how to notify the security team of any violations. You
network that maintains the monitoring system software will be the first to detect these violations.
It should trigger a notification to the operations center, which in turn should notify the security
team, using a pager if necessary.
Phase 1 Individual Project 25
Restoration of a networked diagram
Cisco Network Security Restoration
In this diagram shows how someone would set up a restoration from a security breach.
When one restores a normal network operations is the final area of any security violation
response. When the administrator defines a security policy on how to conduct, secure, and make
back up each system policy will keep all in order and secure while you run your network. Once
Phase 1 Individual Project 26
the policy has been approved by the team, needed restoration takes place as the last resort that
include the process of obtaining all approvals before it starts?
“Once a network is in compliance, a secure change management process is needed to
maintain continuous compliance and validate that planned changes do not introduce new risk.
Secure change management incorporates risk assessment in an orchestrated, standardized
process; flags changes outside of this structure, allows administrators to reconcile flagged
changes, and troubleshoots where needed. Secure change management verifies that changes were
implemented as intended, identifies when a change has accidental consequences, and highlights
unapproved changes.”
Any security policies created show be a living document that will adapt to any and ever
changing environment. Any existing policy that is created it is a good idea to keep the network
up to date. If you check the CERT web site (https://www.fema.gov/community-emergency-
response-teams) you can have access to great tips, practices, and security improvements the help
alert your company to new and incorporated security policies. While you maintain yourself up to
date with CERT and maintaining your network security policies the comparison with the desired
security posture keep well as you go. Finally, keep in mind to practice is defined as a drill or test
of any support from your team or staff to make sure that they all have a clear understanding of
what is going on and any or all security violations going on. Monitor your network unannounced
by management can be done in conjunction with any network posture tests. Make sure you
review identifies all gaps in the procedures and training of any and all personnel so that
corrective action can be taken.
Phase 1 Individual Project 27
Risk Management and Lean Six Sigma
What is the Disaster Recovery System?
When your network is using a DRS that is invoked from a Cisco Unified
Communications Manager Administration help protect your network with data backup and
restore capabilities for any and all servers in a CUCM cluster. When you allow this to be
performed regularly scheduled will automatically be invoked to backup all data on your network.
The DRS runs cluster level backup that collects backups from other servers on a CUCM to the
central location and archives the backup data to a physical storage data bank. “DRS restores its
own settings (backup device settings and schedule settings) as part of the platform
backup/restore. DRS backs up and restores drfDevice.xml and drfSchedule.xml files. When the
server is restored with these files, you do not need to reconfigure DRS backup device and
schedule.”
Phase 1 Individual Project 28
Week 5: Network Management
Recovery point of a network for Cisco
As Cisco uses a Cloud system it takes it to a higher level of operations. While optimizing
the management of all your data on your network infrastructures with Cisco Cloud gives you a
better handle on all management solutions. Cisco Prime management products help speed up
your adoption of unified communications and the next generation video while using the cloud
Phase 1 Individual Project 29
and fixed mobile convergence and so much more offered. Cisco’s cloud management, data center
automation, OSS, and network management products provide highly effective tools for data
center operations and network operations centers. These tools can bring differentiated value to
your infrastructure and operations. Their commitment to all of the industries standards using
their software and hardware makes life so much easier to integrate into a current process,
systems and procedures that any company can come up with. The Cisco’s Cloud and system
management products can only help any organization to help get them to where they want to be
in any unparalleled time to value using the equipment, platforms and technologies they offer.
Phase 1 Individual Project 30
References
Evolve Your Network for New Opportunities. (2014, June 11). Retrieved November 27, 2015,
from http://www.cisco.com/c/en/us/solutions/enterprise-networks/architecture.html
How Does Load Balancing Work? (Cisco)
http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/5212-46.html
Cisco Active Network Abstraction Reference Guide, 3.7. (n.d.). Retrieved December 11, 2014,
from http://www.cisco.com/c/en/us/td/docs/net_mgmt/active_network_abstraction/3-7/
reference/guide/ANARefGuide37.html
Network Security Policy: Best Practices White Paper. (n.d.). Retrieved December 23, 2014, from
http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html
Disaster Recovery System Administration Guide for Release 8.5(1). (2010, November 30).
Retrieved December 23, 2014, from
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/drs/8_5_1/drsag851.html