42
Running head: Phase 1 Individual Project 1 Target Organization Selection Glenn Fluehr Introduction to Network Management Wednesday, January 19, 2022

Glenn fluehr it245 ip1

Embed Size (px)

DESCRIPTION

Network Management using CISCO

Citation preview

Page 1: Glenn fluehr it245 ip1

Running head: Phase 1 Individual Project 1

Target Organization Selection

Glenn Fluehr

Introduction to Network Management

Wednesday, April 26, 2023

Page 2: Glenn fluehr it245 ip1

Phase 1 Individual Project 2

ContentsTarget Organization Selection..............................................................................................4

Week 1: Identifying the Network.....................................................................................4

Week 2: Diagramming the Network................................................................................6

Cisco ONE Enterprise......................................................................................................6

Example 1 – Cisco Network Access................................................................................7

APIC EM described.........................................................................................................7

Example 2 – Cisco Control Layer, Application Layer and Element Layer.....................8

Week 3: Network Models..............................................................................................10

Cisco IOS Software explained.......................................................................................10

IOS XE and IOS XR described.....................................................................................10

Cisco’s Nexus – The wonder of the world.....................................................................11

Diagram for the Nexus 1000V.......................................................................................12

Load Balancing on a Cisco IOS.....................................................................................13

Load Balancing described..............................................................................................14

IP switching by Cisco IOS.............................................................................................15

Diagram of CEF.............................................................................................................16

Week 4: Protocols and Agents.......................................................................................16

Cisco CallManager and how it works............................................................................16

Cisco’s PSTN explained................................................................................................17

Page 3: Glenn fluehr it245 ip1

Phase 1 Individual Project 3

IP and RFC791 described..............................................................................................17

ISO diagram for Cisco...................................................................................................18

IP accounting.................................................................................................................19

Looking at a Cisco NetFlow..........................................................................................19

Cisco’s NetFlow explained............................................................................................20

Week 5: Network Security.............................................................................................21

Approving Network Security Changes..........................................................................21

Secured Network Diagram............................................................................................22

Monitoring Security of Your Network...........................................................................23

Restoration of a networked diagram..............................................................................25

Cisco Network Security Restoration.............................................................................25

Risk Management and Lean Six Sigma.........................................................................27

What is the Disaster Recovery System?........................................................................27

Week 5: Network Management.....................................................................................28

Recovery point of a network for Cisco..........................................................................28

References..........................................................................................................................30

Page 4: Glenn fluehr it245 ip1

Phase 1 Individual Project 4

Target Organization Selection

Introduction to this paper, I will be describing a company called Cisco and how they

work their network system at large. Since they will not indulge exactly what their system looks,

acts, and runs like, I will be doing some deep research from employees I know personally to help

me get the information I am looking for here in this paper. References will be from the email I

will be getting and sharing with you all here. Cisco is one of the top 5 corporations that has the

most secure system worldwide. Next to US Government that Cisco helped build, Cisco is a

perfect example of a “Network System” at its best.

Week 1: Identifying the Network

Cisco has a vast variety of avenues it offers others that specializes in new products and

networking and the internet. All parts of Cisco the networking side they make switches. Using

the internet they make the routers. The switches are used to direct traffic on a LAN, routers direct

traffic between LANS or in WANS. Here is where Cisco is strong in and offers their customers

great and powerful mean to help them get their jobs done right the first time. There are currently

over 74,000+ employees currently working full and part time. The headquarters are located at

170 West Tasman Dr., San Jose, CA 95134 USA (408) 526-4000 (800) 553-NETS (800) 553-

6387 according the website of Cisco.

Since it is Cisco, they use their own equipment to run the network at hand. The many

towers, switches, cable, and other items they use are important for them to keep a clean and vital

network as they are one of the worldwide companies other businesses and governments depend

on for security, connections, and overall performance. They must keep a tight and functional

Page 5: Glenn fluehr it245 ip1

Phase 1 Individual Project 5

network as they prove to others that their system is the best. I could list their products and

services they offer, I even tried to contact them to see if they would allow me the information I

needed to show how their network works, but all they could do was show how others they made

to work instead. They have about half of their staff in the IT department and about 20% of them

work on the high end, secured areas of their network that this allows for less security breaches

and creating false data on their networks all over the world.

Networks are an essential part of business, education, government, and home

communications. Many residential, business, and mobile IP networking trends are being driven

largely by a combination of video, social networking, and advanced collaboration applications,

termed "visual networking. “The Cisco Visual Networking Index (VNI) is our ongoing effort to

forecast and analyze the growth and use of IP networks worldwide. There is so much to share

with you all I have to pick and choose what they are going to be, so I pick this one since I have

seen in work real life. With the help of IBM both of these companies keep our networks working

strong and efficient. As long as there is a demand for the net both IBM and Cisco will be there to

help us all out.

Page 6: Glenn fluehr it245 ip1

Phase 1 Individual Project 6

Week 2: Diagramming the Network

Cisco ONE Enterprise

Cisco has a great and powerful Network they use with the internet that creates many

business opportunities. When it comes to your network you must be able to adapt to each and

every aspect of the network you will create and Cisco can help. All you need is a new

architecture to have automatically update and process all provisions and deploy all of your

networks systems and services with applications and to do this Cisco has built a “Cisco

Borderless Networks architecture. It is called the Cisco ONE Enterprise Networks Architecture

that moves the IT department through a platform that is open, programmable, and application

centric. Cisco has not only topped its own older versions of other networks but it has gone

beyond the basic software defined networks by creating larger scale approach to network

programmability. With this increase of the network agility and performance it also takes on

existing network resources to help you evolve your own network with new opportunities,

network application layers. Cisco gives people the means to have an open application ecosystem

to help improve and enhance innovation with lowering risks and making it easier to integrate.

Many ranges of applications that meet your networks needs may include a cloud system,

mobility for your many users out on the field and of course security throughout your network to

keep all data “true”.

Page 7: Glenn fluehr it245 ip1

Phase 1 Individual Project 7

Example 1 – Cisco Network Access.

Many new ideas and models Cisco has created with network analytics that is available to

all applications that offer great insight that help create new business models such as a “Control

Layer”. Cisco Application Policy Infrastructure Controller (APIC) is part of the Enterprise

Module that is the networks control layer of an open network environment.

APIC EM described

With Cisco’s APIC EM allows the ACI (Application Centric Infrastructure) to any WAN

and access edge. The ACI is a holistic architecture to centralize and automate of policy based

application profiles. This gives the IT department of an organization a quicker response time for

any network issues it may come across. The APIC EM is available to all customers and

developers that use this system to download needed items with no charge in Cisco’s “DevNet”

community.

Page 8: Glenn fluehr it245 ip1

Phase 1 Individual Project 8

Starting in 2015, Cisco will start offering the new Cisco ONE Software that will focus on

simplified purchasing models, focusing on common customer scenarios in the data center and

WAN and LAN infrastructure. For more than 20 years now, Cisco has developed great and

everlasting technology for all businesses and government with other people that can afford it. As

I have mentioned above with Cisco’s ONE software people can extract the value of this new

software that address many common business and other personal challenges in its 3 domains

(WAN, Data Centers, and Cloud Networking). With ONE on your system it allows you to cut

through the complexity of product by product based software features by decoupling the

ownership of these features in the hardware operating systems. The separation that uses the rights

are potable across many generations of hardware. It also gives the customers the ability to

acquire and deploy new virtual manner through an integrated licensing portal.

Example 2 – Cisco Control Layer, Application Layer and Element Layer

Cisco’s Control Layer supports API that include Cisco’s Open Network Environment

Platform Kit (onePK) that gives Cisco’s networks intelligence. These include an OpenFlow for a

Page 9: Glenn fluehr it245 ip1

Phase 1 Individual Project 9

standard based interoperability and a Command line interfaced (CLI) that helps users and IT to

protect the existing investments they have made on the network. They also offer what they like to

call the Network Element Layer as you see above in the Example 1 diagram. It is a

comprehensive set of devices that run through routing and switching with wired and wireless

capabilities that help the physical and virtual networks. Even large corporations and many

governments deploy Cisco’s IOS software and programmable application integrated circuits or

(ASIC) which help throughout any large networks here on the internet.

Cisco’s onePK is within its ONE or Open Network Environment software defined

networking (SDN).In Example 2, you can find these things I mention here. It is truly easy to use

for all IT and with its own toolkit for making deploying development, creation and rapid service

with many more applications it offers the network. OnePK offers new and existing networks a

more powerful and flexible control. All online and offline users have access to an all in one

development environment that simulates each and every network elements. OnePK is also

capable of integrating with other major networks and OS that include PyCharm, PyDev, Eslipse,

IDLE, NetBeans with many more that it offers its users on the network. It is also able to support

many common languages such as C, Java, and Python which gives it a powerful use for all on the

network.

Page 10: Glenn fluehr it245 ip1

Phase 1 Individual Project 10

Week 3: Network Models

Cisco IOS Software explained

Cisco has one of best worldwide IOS software network infrastructure that delivers

seamless integration and business critical services with the support of hardware platforms.

Currently working in over millions of active systems from small home offices to core systems

that support large service provider network around the world. The IOS is a type of operating

system that runs on most of Cisco’s routers and switches. Its core function enables data to

communicate between networks nodes, routing and switching as it moves throughout the system.

It also offers many vast services that any administrator can use to help improve their

performance and security of all of their network traffic. They can include encryption,

authentication, and firewall and policy enforcement. The great quality of services with intelligent

routing and proxy capability. Cisco’s ISRs (Integrated Services Routers) the IOS help support all

call processing and all unified communications services.

IOS XE and IOS XR described

There are 3 variants of the operating system that include the IOS XE, IOS XR, and the

Nexus OS. These are all 3 valuable to any network depending on the demands it requires each

one takes on separate needs and functions within each network system. The IOS XE runs on

every enterprise grade Cisco ISRs and all Aggregation Services Router including the Catalyst

switches. The IOS XR runs the Cisco service provider products such as any Carrier Routing

System routers. With the Nexus OS that runs on any Cisco’s Nexus family of data center

switches. They all give each part a very important protection and ease of use once installed.

Page 11: Glenn fluehr it245 ip1

Phase 1 Individual Project 11

Cisco’s Nexus – The wonder of the world

The Cisco’s Nexus OS like the 1000V they call the NX-OS switch that rendered fully in

software for any multi-tenant services that composed of both physical and virtual networking.

Distributing virtual switch allows any network team viable access to monitor, manage and

troubleshoot any and all of the physical and virtual networks with the same Cisco commands and

tools offered. The Nexus 1000V is an IEEE 802.1Q base switching technology that is

programmable. If you did not know what an IEEE is it stands for Institute of Electrical and

Electronics Engineers) that is the world’s largest technical professional society. They promote the

development and applications of electronic technology. It is used to control the paths of any and

all applications programming interface (API) in order to communicate with all data planes. It

used physical switch, regardless of who is the manufacturer. In turn this allows any administrator

that uses any non Cisco physical network components to take full advantage of this new Nexus

00V to handle any virtual network management.

Page 12: Glenn fluehr it245 ip1

Phase 1 Individual Project 12

Diagram for the Nexus 1000V

One thing I like about the Cisco’s IOS router software is its standard functionality to

perform load balancing that is available across all router platforms. It will forward all process to

the router and it is automatically activated if the routing table has multiple paths to one

destination. This standard of routing protocols called the RIP (Routing Information Protocol) or

its cousin called RIPv2 and the EIGRP (Enhanced Interior Gateway Routing Protocol) are all

part of the configured routes and packet that are forwarding mechanisms. It will allow all routers

to use multiple paths to a single destination or “Load Balancing”.

Page 13: Glenn fluehr it245 ip1

Phase 1 Individual Project 13

Load Balancing on a Cisco IOS

Most all the time the routers must select a route from many learned paths via the same

routing process within the same administrative distance. When a router chooses the path with the

lowest distance to the destination it will calculate the difference and the need to be manipulated

in order to achieve its objective that is load balancing. If any router receives and installs multi

paths with the same administrative distance and cost to each destination then this is where load

balancing can occur. Each number of paths that is used is limited by the number of entries the

routing protocol puts in the table. By default the IOS has four entries for most IP routing

Page 14: Glenn fluehr it245 ip1

Phase 1 Individual Project 14

protocols with the exception of the BGP (Border Gateway Protocol) there is a max amount of

entries of six different path that can be configured.

Load Balancing described

Most anyone can set load balancing to work per each destination or packet. Each

destination means that the router distributes the packets based on the address. Each is given two

paths to the same network with all packets of the first destination on that network to go over the

first path of all of the packets of the second destination that goes over the second path and so on.

This process preserves the packets order with potential unequal usage of the links provided. If

one host takes on the majority of the traffic all packets use one link that leaves the bandwidth on

other links unused. Using more destination addresses gives a more equal use of links and

allowing the load balancing to work more normally. Here is where the use of IOS software to

achieve a more equal use of each link to build a route cache entry of every destination address

instead of its destination network. All the traffic for different hosts on the same destination

network can use many different paths. If you use this type of traffic control it has a bad side with

the core backbone routers that carry all the traffic. It will affect the memory and processing

requirements for maintaining the cache that will become more demanding.

A new process called per packet load balancing means that the router sends one packet

per destination over the first path and another packet to another destination over another path and

so on. The per packet load balancing guarantees equal load across all links. There is always the

potential that each packet may arrive out of order at each destination because of the differential

delay may exist within the network. But of course Cisco has its IOS software that takes on the

per packet load balancing does disable the forwarding acceleration by the route cache since the

route cache information includes the outgoing interface. This will ensure equal utilization of all

Page 15: Glenn fluehr it245 ip1

Phase 1 Individual Project 15

the links but the processor intensive task will impact the overall forwarding performance. With

Cisco’s newer switching schemes such as their Cisco Express Forwarding (CEF) that allows you

to do per packet and per destination load balancing more quickly. When you start working with

the CEF you will ask “Who does the load balancing?” and Cisco will tell you that their CEF or

routing protocol is being used. CEF does all the switching of the packets based on the routing

table which is being populated by the routing protocols. It performs all the load balancing once

the routing protocol table is calculated.

IP switching by Cisco IOS

IP switching is an internal mechanism by the Cisco IOS to forward all packets through

routers. Here in lies The Express Forwarding Depending on which of these mechanisms is to be

used so it switches the majority of packets in the overall system performance and load balancing

is affected. The CEF keeps all load balancing through the use of load share tables. All other load

balancing solutions on the Cisco routers is made on outbound interfaces. CEF helps track all

paths based on both the source and destination address of all paths given. This in turn simplify it

where you can say that the path is an IP session and each session is logically identified as a

unique source destination address pair.

Page 16: Glenn fluehr it245 ip1

Phase 1 Individual Project 16

Diagram of CEF

Week 4: Protocols and Agents

Cisco CallManager and how it works

Cisco has what they call a CallManager system that shares both voice applications and

manual attendant console functions. It helps all services that hold, forward, transfer, and other

services for each users that extend to IP phones and gateways. CallManager is a software based

application to help its capabilities in the production environments that only require upgrades of

software and server platforms that help avoid expensive hardware change costs for all users. The

CallManager and IP phones with Cisco’s gateways and applications that utilize IP network

provides a distributed virtual telephone network. The improvements in this system help the end

users call admission control to ensure that the quality of voice is clear at all time. It even has a

web based interface that configures the databases to provide for remote devices and system to be

configured. This gives the end user easy access to the administrators via HTML based online

Page 17: Glenn fluehr it245 ip1

Phase 1 Individual Project 17

help. Cisco provides several Windows services that are installed during Cisco CallManager

installation. You use Cisco CallManager Serviceability to activate and deactivate as well as start

and stop the services. After you activate the services, you can configure them by modifying the

service parameters.

Cisco’s PSTN explained

Cisco uses PSTN or a Public Switched Telephone Network that has been transformed into

an ISDN (Integrated Systems Digital Network). Here lies a basic means to implement a SS7

(Signaling System 7) in the PSTN backbone to make it possible such widespread services as we

all know as Caller ID and Dialed Number delivery, 800 Directory, Calling Card services and so

on. Prior to ISDN data connectivity over the PSTN was a basic telephone service. Being

connected over ISDN gives the users the internetworking designer increased bandwidth that

reduces call setup time and latency and lower signal and noise ratios.

IP and RFC791 described

Cisco controls many protocols but I am only going to mention a few and ones that I have

used in this paper. The IP protocol is a network layer that contains addressing information to

control the information to enable packets to be routed via IP is documented in RFC 791 and its

primary network layer protocol in an Internet protocol suite. TCP and IP is the heart of the

Internet protocols and is used vastly within the networks. “IP has two primary responsibilities:

providing connectionless, best-effort delivery of datagrams through an internetwork; and

providing fragmentation and reassembly of datagrams to support data links with different

maximum transmission unit (MTU) sizes.” Border Gateway Protocol (BGP) is a powerful and

scalable routing protocol that is the routing protocol that was employed on the Internet. The BGP

uses many routing parameters, called attributes that defines routing policies to maintain a stable

Page 18: Glenn fluehr it245 ip1

Phase 1 Individual Project 18

routing exchange with the information when the TCP connects between nodes that are first

established. When there is any changes to the routing table that are detected the BGP routers

send to other networks only those routes that have changed each BGP routers. It also updates

advertise only to optimal path to a destination network used at the time.

As I mentioned above the ISO network management model give five functional areas of

any network management. I will try to explain again this to you all that is called ISO. I hope you

all will learn more this time around.

ISO diagram for Cisco

Here is a basic diagram of an ISO network. Here shows the flow and connections of this

network. In this diagram you will see that Cisco uses a SNMP platform that directly shares the

data with a CiscoWorks200 server. Also they use a new method called Common Information

Model and Extensible Markup Language (CIM/XML) as you will see now being used on the net

as you surf around. I can define the details of the integration with other management models

such as SNMP MIB or Desktop Management Task Force Management Information Files (DMTF

Page 19: Glenn fluehr it245 ip1

Phase 1 Individual Project 19

MIF) that provide the actual model descriptions. XML represents structured data in textual form.

The goal of XML is to keep most of the descriptive power of SGML whilst removing as much of

the complexity as possible. It is similar to HTML but it used to represent structured data in a

document.

IP accounting

On the other hand, Cisco provides more help and software called IP accounting that

support and provides basic IP accounting functions. User can see information of all the packets

and data being switched through the IOS software. IP traffic is measured only on an outbound

basis. All traffic generated by the new software or terminating in the software is not included in

the accounting information given. This allows to maintain accurate accounting totals of each

check pointed databases used on the network. It has many other functions for users of the

network to utilize at any time it is on demand. The information that identifies IP traffic that fails

IP access lists. Identifying IP source addresses that violate IP access lists signals possible

attempts to breach security. Here gives the analysis of this data to keep the network secure at all

times. Each and every data that the IP accesses is configured and verified.

Looking at a Cisco NetFlow

Cisco NetFlow is a Cisco developed flow technology that allows bandwidth monitoring

of a network. NetFlow Analyzer is a software that uses Cisco NetFlow to monitor bandwidth and

runs in windows and Linux. Cisco routers/switching devices export NetFlow as UDP packets.

Cisco NetFlow is one of the flows, among other flows, that is used to monitor bandwidth in the

network. These Cisco NetFlow packets can be analyzed using NetFlow Analyzer, to monitor

bandwidth, to gather information on the top talkers, applications and many other features.

Page 20: Glenn fluehr it245 ip1

Phase 1 Individual Project 20

Network traffic analysis is one of the uses of NetFlow Analyzer. NetFlow Analyzer delivers easy

to understand reports on in-depth traffic analysis and network bandwidth monitoring.

Cisco’s NetFlow explained

Cisco’s NetFlow (network flow) is a new technology it has implemented as an input side

measurement technology that allows the capturing of the data required for the network planning,

monitoring and accounting applications. It is employed on each router interfaces for the service

providers or WAN router interfaces with Cisco’s Enterprise customers. Cisco recommends a very

carefully planned NetFlow to be deployed with the NetFlow services that activates on any

strategically located routers. Each Cisco staff works with each and every customer to determine

on which routers to be used to interface with NetFlow for each customer’s traffic flow patterns,

network topology and architecture.

Page 21: Glenn fluehr it245 ip1

Phase 1 Individual Project 21

Week 5: Network Security

Approving Network Security Changes

This is one of three ways to keep your network safe and secure. There should be an

approved security setup at all time so when things change on a network, it is brought up to the

administrator for approval. The equipment that is used to keep your network safe has also

software to keep track of any changes made. These changes can be good and bad for your

network that is why your administrator needs to be alerted before the change is made on your

network. They call this a security policy that identifies specific security requirements on any

Page 22: Glenn fluehr it245 ip1

Phase 1 Individual Project 22

technical and non-technical terms. When the administrator defines a requirement as an outside

FTP connection they will allow it to be passed through the firewall. Any outside connections

need to be more protected by the network since you really don’t know what is coming in from an

outside source. So the administrator needs to setup many policies to protect the network from

unauthorized access from the outside. That is why it is really important to created special policies

and requirements for your company using the network.

Secured Network Diagram

The network administrator must create a security team to keep track and review all

requirements created by the network configuration or any design issues that will meet those

Page 23: Glenn fluehr it245 ip1

Phase 1 Individual Project 23

requirements created by the administrator. Once the team has been created they can keep track

and able to monitor all actions on the network to keep security at its best. All security policies

will be implemented by the team at all times. So when there is a change to a network, they can

apply these polices to keep the network running smoothly. If any changes are being made, and

made by the administrator and updated by the administrator the team will follow the changes

until noted further in any near future made by the administrator keeping the network safe for any

wrong doing and transactions.

Monitoring Security of Your Network

Most important when you deal with a large network with outside means is to keep it all

LOCKED UP until the user or device can prove itself once it connects with the network. When

there is something that has been detected for a change the security monitoring system helps the

security team decide on if it is in violation and is needed to be dealt with. When the administrator

has created a “snap shot” of the network the security software can create a starting point to keep

all security in check. There are levels of security violations it creates Low, Medium, and a High

Risk violation. When the software conducts a Risk Analysis, it will identifies the level of risk

Page 24: Glenn fluehr it245 ip1

Phase 1 Individual Project 24

that is being monitored and will deal with it based on the preset policies made by the

administrator. While approving certain security changes, the software will identify specific

threats to the network. With having these parameters they can develop a clear picture of what is

needed to be monitored at all times. A Risk Analysis matrix is the firewall that considers if it is a

high risks network device in real time. Once the firewall has determined the level of risk it will

either all or disallow the device or user through to the network to be accessed.

So when you monitor the security levels Cisco recommends you to monitor low risks

equipment every week, medium risk equipment every day and high risk equipment every hour.

This will keep your network secure at the best effort from both the security team and the

administrator. All security policies address how to notify the security team of any violations. You

network that maintains the monitoring system software will be the first to detect these violations.

It should trigger a notification to the operations center, which in turn should notify the security

team, using a pager if necessary.

Page 25: Glenn fluehr it245 ip1

Phase 1 Individual Project 25

Restoration of a networked diagram

Cisco Network Security Restoration

In this diagram shows how someone would set up a restoration from a security breach.

When one restores a normal network operations is the final area of any security violation

response. When the administrator defines a security policy on how to conduct, secure, and make

back up each system policy will keep all in order and secure while you run your network. Once

Page 26: Glenn fluehr it245 ip1

Phase 1 Individual Project 26

the policy has been approved by the team, needed restoration takes place as the last resort that

include the process of obtaining all approvals before it starts?

“Once a network is in compliance, a secure change management process is needed to

maintain continuous compliance and validate that planned changes do not introduce new risk.

Secure change management incorporates risk assessment in an orchestrated, standardized

process; flags changes outside of this structure, allows administrators to reconcile flagged

changes, and troubleshoots where needed. Secure change management verifies that changes were

implemented as intended, identifies when a change has accidental consequences, and highlights

unapproved changes.”

Any security policies created show be a living document that will adapt to any and ever

changing environment. Any existing policy that is created it is a good idea to keep the network

up to date. If you check the CERT web site (https://www.fema.gov/community-emergency-

response-teams) you can have access to great tips, practices, and security improvements the help

alert your company to new and incorporated security policies. While you maintain yourself up to

date with CERT and maintaining your network security policies the comparison with the desired

security posture keep well as you go. Finally, keep in mind to practice is defined as a drill or test

of any support from your team or staff to make sure that they all have a clear understanding of

what is going on and any or all security violations going on. Monitor your network unannounced

by management can be done in conjunction with any network posture tests. Make sure you

review identifies all gaps in the procedures and training of any and all personnel so that

corrective action can be taken.

Page 27: Glenn fluehr it245 ip1

Phase 1 Individual Project 27

Risk Management and Lean Six Sigma

What is the Disaster Recovery System?

When your network is using a DRS that is invoked from a Cisco Unified

Communications Manager Administration help protect your network with data backup and

restore capabilities for any and all servers in a CUCM cluster. When you allow this to be

performed regularly scheduled will automatically be invoked to backup all data on your network.

The DRS runs cluster level backup that collects backups from other servers on a CUCM to the

central location and archives the backup data to a physical storage data bank. “DRS restores its

own settings (backup device settings and schedule settings) as part of the platform

backup/restore. DRS backs up and restores drfDevice.xml and drfSchedule.xml files. When the

server is restored with these files, you do not need to reconfigure DRS backup device and

schedule.”

Page 28: Glenn fluehr it245 ip1

Phase 1 Individual Project 28

Week 5: Network Management

Recovery point of a network for Cisco

As Cisco uses a Cloud system it takes it to a higher level of operations. While optimizing

the management of all your data on your network infrastructures with Cisco Cloud gives you a

better handle on all management solutions. Cisco Prime management products help speed up

your adoption of unified communications and the next generation video while using the cloud

Page 29: Glenn fluehr it245 ip1

Phase 1 Individual Project 29

and fixed mobile convergence and so much more offered. Cisco’s cloud management, data center

automation, OSS, and network management products provide highly effective tools for data

center operations and network operations centers. These tools can bring differentiated value to

your infrastructure and operations. Their commitment to all of the industries standards using

their software and hardware makes life so much easier to integrate into a current process,

systems and procedures that any company can come up with. The Cisco’s Cloud and system

management products can only help any organization to help get them to where they want to be

in any unparalleled time to value using the equipment, platforms and technologies they offer.

Page 30: Glenn fluehr it245 ip1

Phase 1 Individual Project 30

References

Evolve Your Network for New Opportunities. (2014, June 11). Retrieved November 27, 2015,

from http://www.cisco.com/c/en/us/solutions/enterprise-networks/architecture.html

How Does Load Balancing Work? (Cisco)

http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/5212-46.html

Cisco Active Network Abstraction Reference Guide, 3.7. (n.d.). Retrieved December 11, 2014,

from http://www.cisco.com/c/en/us/td/docs/net_mgmt/active_network_abstraction/3-7/

reference/guide/ANARefGuide37.html

Network Security Policy: Best Practices White Paper. (n.d.). Retrieved December 23, 2014, from

http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html

Disaster Recovery System Administration Guide for Release 8.5(1). (2010, November 30).

Retrieved December 23, 2014, from

http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/drs/8_5_1/drsag851.html