Performance Management (Best Practices) REF:www.cisco.com Document ID 15115.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 1: Introduction to Scaling Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Implementing a Highly Available Network
Chapter 19: Network Management Business Data Communications, 4e.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Business Data Communications Chapter Six Backbone and Metropolitan Area Network Fundamentals.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Performance Management (Best Practices) REF: Document ID
CIS 460 – Network Analysis and Design Chapter 3 – Characterizing the Existing Internetwork.
Windows Server 2008 Chapter 11 Last Update
Connecting LANs, Backbone Networks, and Virtual LANs
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
1/28/2010 Network Plus Unit 5 Section 2 Network Management.
Existing Network Study CPIT 375 Data Network Designing and Evaluation.
Module 10 Configuring and Managing Storage Technologies.
Characterizing the Existing Internetwork PART 1
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Performance Management (Best Practices) REF: Document ID
© 2011 Cisco and/or its affiliates. All rights reserved. 1 High Performance Network Analysis Enterprise Operate Practice Cisco Services Andrew Wojtkowiak.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Performance Management (Best Practices) REF: Document ID
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
LAN Switching and Wireless – Chapter 1
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Performance Management (Best Practices) REF: Document ID
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Performance Management (Best Practices) REF: Document ID
Business Data Communications, Fourth Edition Chapter 11: Network Management.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
1 Root-Cause VoIP Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
Chapter 8 1 Chap 8 – Network Troubleshooting Learning Objectives Establish a network baseline Describe troubleshooting methodologies and troubleshooting.
Service Level Monitoring. Measuring Network Delay, Jitter, and Packet-loss  Multi-media applications are sensitive to transmission characteristics of.
Network design Topic 6 Testing and documentation.
Performance Management (Best Practices) REF: Document ID
Network design Topic 2 Existing network infrastructure.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public Course v6 Chapter # 1 Chapter 2: Troubleshooting Processes for Complex Enterprise.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Performance Management (Best Practices) REF: Document ID
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Network Management Mechanisms Two major network management protocols: Simple Network Management Protocol (SNMP) Common Management Information Protocol.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Performance Management (Best Practices) REF: Document ID
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Configuring Network Devices
Instructor Materials Chapter 1: LAN Design
Chapter 9 Optimizing Network Performance
Instructor Materials Chapter 8: Network Troubleshooting
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Administration CNET-443
Data collection methodology and NM paradigms
Module 5 - Switches CCNA 3 version 3.0.
Requirements Definition
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Performance Management (Best Practices) REF: Document ID 15115

Introduction Performance Management involves optimization of network response time and management of consistency and quality of individual and overall network services Performance Management involves optimization of network response time and management of consistency and quality of individual and overall network services –Need to measure the user/application response time

Performance management issues User performance User performance Application performance Application performance Capacity planning Capacity planning Proactive fault management Proactive fault management It is important to note that with newer application like video and voice performance management is the key success It is important to note that with newer application like video and voice performance management is the key success

Critical success factors (1/2) Gather a baseline for both network and application data Gather a baseline for both network and application data Perform a what-if analysis on network and application Perform a what-if analysis on network and application Perform exception reporting for capacity issues Perform exception reporting for capacity issues Determine the network management overhead for all proposed or potential network management services Determine the network management overhead for all proposed or potential network management services

Critical success factors (2/2) Analyze the capacity information Analyze the capacity information Periodically review capacity information for both network and applications as well as baselining and exception Periodically review capacity information for both network and applications as well as baselining and exception Have upgrade or tuning procedures set up to handle capacity issues on both a reactive and long-term basis Have upgrade or tuning procedures set up to handle capacity issues on both a reactive and long-term basis

Indicators for performance management (1/3) Performance indicators provide mechanism by which an organization can measure critical success factors. Performance indicators provide mechanism by which an organization can measure critical success factors. They are the followings: They are the followings: Document the network management business objectives Document the network management business objectives Create detailed and measurable service level objectives Create detailed and measurable service level objectives

Indicators for performance management (2/3) Provide documentation the service level agreement (SLA) with charts or graphs that show the success or failure of how these agreements are met over the time Provide documentation the service level agreement (SLA) with charts or graphs that show the success or failure of how these agreements are met over the time Collect a list of the variables for the baseline such as polling interval, network management overhead incurred, possible trigger threshold Collect a list of the variables for the baseline such as polling interval, network management overhead incurred, possible trigger threshold – –whether the variable is used as a trigger for a trap, and trending analysis used against each variable

Indicators for performance management (3/3) Have a periodic meeting that reviews the analysis of the baseline and trends. Have a what−if analysis methodology documented. – –This should include modeling and verification where applicable When thresholds are exceed, develop documentation on the methodology used to increase network resources. – –One item to document is the time line required to put in additional WAN bandwidth and a cost table

Performance management process flow (1/3)

1 develop a network management concept of operation 1 develop a network management concept of operation –Define the required features : Services, Scalability and Availability objectives –Define availability and network management objectives –Define performance SLAs and Metrics –Define SLA

Performance management process flow (2/3) 2 Measure Performance 2 Measure Performance –Gather network baseline data –Measure availability –Measure response time –Measure accuracy –Measure utilization –Capacity planning

Performance management process flow (3/3) 3 perform a proactive fault analysis 3 perform a proactive fault analysis –Use threshold for proactive fault management –Network management implementation –Network operation metrics

Performance management process flow

Develop a network management concept of operation (1/3) The purpose is to describe the overall desired system characteristics from an operational standpoint The purpose is to describe the overall desired system characteristics from an operational standpoint The use of this document is to coordinate the overall business goals of network operation, engineering, design other business units and the end users. The use of this document is to coordinate the overall business goals of network operation, engineering, design other business units and the end users.

Define the required features: Services, Scalability objectives (1/2) Define services :to understand applications, basic traffic flows, users and site counts and require network services (create model of your network) Define services :to understand applications, basic traffic flows, users and site counts and require network services (create model of your network) Create solution scalability objectives: to help network engineers design networks that meet future growth requirement and not experience resource constraint. Create solution scalability objectives: to help network engineers design networks that meet future growth requirement and not experience resource constraint. – media capacity, number of routes and etc

Define the required features: Services, Scalability objectives (2/2) These are the standard performance goals: – –Response time – –Utilization – –Throughput – –Capacity (maximum throughput rate)

Define availability and network management objectives (1/2) Availability objectives define the level of services (service level requirements) Availability objectives define the level of services (service level requirements) –define different class of service for a particular organization – Higher availability objective might necessitate increased redundancy and support procedures

Define availability and network management objectives (2/2) Define manageability objectives to ensure that overall network management does not lack management functionality Define manageability objectives to ensure that overall network management does not lack management functionality –Must understand the process and tools for organization –Uncover all important MIB or network tool information

Define performance SLAs and Metrics The performance SLAs should include the average expected volume of traffic, peak volume of traffic, average response time and maximum response time allowed The performance SLAs should include the average expected volume of traffic, peak volume of traffic, average response time and maximum response time allowed

Define SLAs SLA (Service Level Agreement) - enterprise SLA (Service Level Agreement) - enterprise SLM (Service Level Management) – service provider SLM (Service Level Management) – service provider SLM include definitions for problem types and severity and help desk responsibilities SLM include definitions for problem types and severity and help desk responsibilities –Escalation path, time before escalation at each tier support level –Time to start work on the problem –Time to close target based on priority –Service to provide in the area of capacity planning, hardware replacement

Performance management process flow

Measure Performance Gather Network Baseline data Gather Network Baseline data –Perform a baseline of the network before and after a new solution deployment –A typical router/switch baseline report includes capacity issues related to CPU, memory, buffer, link/media utilization, throughput –Application baseline: bandwidth used by app per time period

Measure availability Availability is the the measure of time for which a network system or application is available to a user Availability is the the measure of time for which a network system or application is available to a user –Coordinate the help desk phone calls with the statistics collected from managed devices –Check scheduled outages –Etc

Measure Response Time Network response time is the time required to travel between two points Network response time is the time required to travel between two points Simple level – pings from the network management station to key points I the network. (not accuracy) Simple level – pings from the network management station to key points I the network. (not accuracy) Server-centric polling : SAA (Service Assurance Agent) on router (Cisco) to measure response time to a destination device Server-centric polling : SAA (Service Assurance Agent) on router (Cisco) to measure response time to a destination device Generate traffic that resembles the particular application or technology of interest Generate traffic that resembles the particular application or technology of interest

Measure accuracy Accuracy is the measure of interface traffic that does not result in error and can be expressed in term of percentage Accuracy is the measure of interface traffic that does not result in error and can be expressed in term of percentage Accuracy = 100 – error rate Accuracy = 100 – error rate Error rate = ifInErrors * 100 / (ifInUcastPkts + IfInNUcastPkts) Error rate = ifInErrors * 100 / (ifInUcastPkts + IfInNUcastPkts)

Measure Utilization (1) Utilization measure the use of a particular resource over time Utilization measure the use of a particular resource over time Percentage in which the usage of a resource is compared with its maximum operational capacity Percentage in which the usage of a resource is compared with its maximum operational capacity High utilization is not necessarily bad High utilization is not necessarily bad Sudden jump in utilization can indicate unnormal condition Sudden jump in utilization can indicate unnormal condition

Measure Utilization (2) Input utilization = Input utilization = ifInOctets *8*100/(time in second)*ifSpeed Output Utilization Output Utilization ifOutOctets *8*100/(time in second)*ifSpeed

Capacity planning The following are potential areas for concern: The following are potential areas for concern: –CPU –Backplane or I/O –Memory –Interface and pip sizes –Queuing, latency and jitter –Speed and distance –Application characteristics

Performance management process flow

Perform a Proactive fault analysis One method to perform fault management is through the use of RMON alarms and event groups One method to perform fault management is through the use of RMON alarms and event groups Distributed management system that enables polling at a local level with aggregation of data at a manager to manager Distributed management system that enables polling at a local level with aggregation of data at a manager to manager

Use threshold for proactive fault management (1/2) Threshold is the point of interest in specific data stream and generate event when threshold is triggered Threshold is the point of interest in specific data stream and generate event when threshold is triggered 2 classes of threshold for numeric data 2 classes of threshold for numeric data –Continuous threshold apply to continuous or time series data such as data stored in SNMP counter or gauges –Discrete threshold apply to enumerated objects or discrete numeric data such as Boolean objects

Use threshold for proactive fault management (2/2) 2 different forms of continuous threshold 2 different forms of continuous threshold –Absolute :use with gauges –Relative (delta): use with counter Step to determine threshold Step to determine threshold –1 select the objects –2 select the devices and interfaces –3 determine the threshold values for each object or interface –4 determine the severity for the event generated by each threshold

Network management implementation The organization should have an implemented network management system. The organization should have an implemented network management system. SNMP/RMON or other network management system tools SNMP/RMON or other network management system tools

Network operation metrics (1/2) Number of problems that occurs by call priority Number of problems that occurs by call priority Minimum, maximum and average time to close in each priority Minimum, maximum and average time to close in each priority Breakdown of problems by problem type (hardware, software crash, configuration, power user error) Breakdown of problems by problem type (hardware, software crash, configuration, power user error)

Network operation metrics (2/2) Breakdown of time to close for each problem type Breakdown of time to close for each problem type Availability by availability or SLA Availability by availability or SLA How often you met or missed SLA requirements How often you met or missed SLA requirements

Performance Management Indicator

Document the network management business objectives (1/3) This document is the organization network management strategy and should coordinate the overall business goals of network operations, engineering, design, other business units and the end users. This document is the organization network management strategy and should coordinate the overall business goals of network operations, engineering, design, other business units and the end users. It enable the organization to form the long range planning activities for network management and operation. It enable the organization to form the long range planning activities for network management and operation.

Document the network management business objectives (2/3) Identify a comprehensive plan with achievable goals Identify a comprehensive plan with achievable goals Identify each business service/application that require network support Identify each business service/application that require network support Identify those performance-based metric needed to measure service Identify those performance-based metric needed to measure service

Document the network management business objectives (3/3) Plan the collection and distribution of the performance metric Plan the collection and distribution of the performance metric Identify the support needed for network evaluation and user feedback Identify the support needed for network evaluation and user feedback Have documented, detailed and measurable SLA objectives Have documented, detailed and measurable SLA objectives

Document the Service Level Agreements Before document the SLA, you must define the service level objectives metrics Before document the SLA, you must define the service level objectives metrics This document should be available to users for evaluation to provide feedback for variables needed to maintain the service agreement level This document should be available to users for evaluation to provide feedback for variables needed to maintain the service agreement level SLAs are living agreement SLAs are living agreement –What works today might become obsolete tomorrow

Create a list of variables for the baseline This list includes items such as This list includes items such as –polling interval –Network management overhead incurred –Possible trigger thresholds –Trending analysis used against each variable –Router health –Switch health –Routing information –Utilization –delay

Reviews the baseline and trends Network management personnel should conduct meeting periodically (operational and planning) Network management personnel should conduct meeting periodically (operational and planning) Also include the review of SLA Also include the review of SLA

Document a what-if analysis methodology A what-if analysis involves modeling and verification of solutions. A what-if analysis involves modeling and verification of solutions. It includes the major questions, the methodology, data sets and configuration file It includes the major questions, the methodology, data sets and configuration file The main point is that he what-if analysis is an experiment hat someone else should be able to recreate with the information provided in the document The main point is that he what-if analysis is an experiment hat someone else should be able to recreate with the information provided in the document

Document the methodology used to increase network performance This document includes additional WAN bandwidth and a cost table that helps increase the bandwidth for a particular type of link This document includes additional WAN bandwidth and a cost table that helps increase the bandwidth for a particular type of link It helps the organization realize how much time and money it costs to increase the bandwidth It helps the organization realize how much time and money it costs to increase the bandwidth Periodic review this document to ensure that it remain up to date Periodic review this document to ensure that it remain up to date

Configuration Management (Best Practice) Ref.: Document ID 15111

High Level process flow for Configuration Management

Create Standards (1) Create Standards helps reduce network complexity, the amount of unplanned downtime and exposure to network impact events Create Standards helps reduce network complexity, the amount of unplanned downtime and exposure to network impact events

Create Standards (2) Following standards for optimal network consistency Following standards for optimal network consistency –Software version control and management –IP addressing standard and management –Naming convention and Domain Name System/ DHCP assignment –Standard Configuration and Descriptors –Configuration Upgrade procedure –Solution Templates

Software Version Control and Management (1) Software version control is the practice of deploying consistent software versions on similar network devices Software version control is the practice of deploying consistent software versions on similar network devices Limit amount of software defects and interoperability issues Limit amount of software defects and interoperability issues Reduce the risk of unexpected behavior Reduce the risk of unexpected behavior –With user interfaces –Feature behavior / upgrade behavior

Software Version Control and Management (2) Following steps for Software version control Following steps for Software version control –Determine device classifications based on chassis, stability and new feature requirements –Target individual software versions for similar-device classification –Test, validate and pilot chosen software versions –Document successful version as standard for similar- device classification –Consistently deploy or upgrade all similar devices to standard software version

IP Address Standards and Management (1) IP address management is the process of allocating, recycling and documenting IP address and subnets in a network IP address management is the process of allocating, recycling and documenting IP address and subnets in a network It reduces the opportunity for overlapping or duplicate subnets, wasted IP address space, complexity It reduces the opportunity for overlapping or duplicate subnets, wasted IP address space, complexity

IP Address Standards and Management (2) We should standard subnet size for standard application We should standard subnet size for standard application –Subnet size of building –Subnet size of WAN link –Subnet size of Branch site –Subnet size of Loopback The subnet block should promote IP summarization (contiguous IP ) The subnet block should promote IP summarization (contiguous IP ) Create standards for IP assignment Create standards for IP assignment –Router should be the first available address –Switch may be the next available address –Dynamic address should be followed by fixed address Finally document standard you developed and IP allocation Finally document standard you developed and IP allocation

Naming Convention and DNS/DHCP Assignment (1) Consistent, structure use of naming conventions and DNS for devices helps Consistent, structure use of naming conventions and DNS for devices helps –Create a consistent point to routers for all network management information related to a device –Reduce the opportunity for duplicate IP address –Creates simple identification of a device showing location, device type and purpose –Improve inventory management by providing a simpler method to identify network devices

Naming Convention and DNS/DHCP Assignment (2) On router, it is strongly recommended to use loopback interface as the primary management interface On router, it is strongly recommended to use loopback interface as the primary management interface Loopback interface can be used for trap, SNMP and syslog Loopback interface can be used for trap, SNMP and syslog Individual interface can have name convention that identifies the device, location, purpose and interface Individual interface can have name convention that identifies the device, location, purpose and interface

Naming Convention and DNS/DHCP Assignment (3) It is also recommended to identify DHCP ranges and adding them to the DNS including location of the user It is also recommended to identify DHCP ranges and adding them to the DNS including location of the user Example: “dhcp-bldg-c21-10” to “dhcp- bldg-c21-253” which identifies IP address in building C, second floor wiring closet 1 Example: “dhcp-bldg-c21-10” to “dhcp- bldg-c21-253” which identifies IP address in building C, second floor wiring closet 1

Standard Configuration and Descriptors (1) Standard Configuration applies to protocol and media configuration as well as global configuration command Standard Configuration applies to protocol and media configuration as well as global configuration command Descriptors are interface commands used to describe an interface Descriptors are interface commands used to describe an interface It is recommended to create standard configurations for each device classification It is recommended to create standard configurations for each device classification –Router, LAN switch, WAN Switch, ATM switch

Standard Configuration and Descriptors (2) Each standard configuration contain the global, media, and protocol configuration command Each standard configuration contain the global, media, and protocol configuration command Global configuration Global configuration –Password, vty, banners –SNMP configuration, Network Time Protocol (NTP) Media configuration Media configuration –ATM, Frame Relay, Fast Ethernet configuration Protocol Configuration Protocol Configuration –Routing protocol –Access control list –QoS configuration

Standard Configuration and Descriptors (3) Descriptors are developed by creating a standard format that applies to each interface Descriptors are developed by creating a standard format that applies to each interface The descriptor includes The descriptor includes – the purpose and location of the interface –Other devices and location connected to the interface –Circuit identifier

Standard Configuration and Descriptors (4) It is recommended It is recommended –to keep standard configuration parameters in a standard configuration file –downloading the file to each new device prior to protocol and interface configuration We should document the standard configuration file including an explanation of each global configuration parameter and why it is important We should document the standard configuration file including an explanation of each global configuration parameter and why it is important RME (Cisco Resource Manager Essentials) RME (Cisco Resource Manager Essentials)

Configuration Upgrade Procedure (1) Upgrade procedures ensure that software and hardware upgrades occur smoothly with minimal downtime Upgrade procedures ensure that software and hardware upgrades occur smoothly with minimal downtime Upgrade procedures include Upgrade procedures include –vendor verification –Vendor installing references such as release notes –Upgrade methodologies or steps –Configuration guideline –Testing requirement

Solution Templates (1) Solution templates are used to define modular network solutions Solution templates are used to define modular network solutions A network module may be a wiring closet, a WAN field office or an access concentrator A network module may be a wiring closet, a WAN field office or an access concentrator It is used to ensure that similar deployment can be carried out in exactly the same way It is used to ensure that similar deployment can be carried out in exactly the same way –can reduce risk level to the organization

Solution Templates (2) Specific details of the solution template Specific details of the solution template –Hardware and hardware modules including memory, flash, power and card layouts –Logical topology including port assignment –Software versions including firmware versions –All non-standard, non-devices specific configuration, VLAN configuration, access lists, switching paths, spanning tree parameters and etc –Out of band management requirement –Cable requirement –Installation requirement including environmental, power and rack location

Maintain Documentation (1)

Maintain Documentation (2) It is recommended to use the following network documentation critical success factor It is recommended to use the following network documentation critical success factor –Current device, link and end user inventory –Configuration version control system –TACACS (Terminal Access Controller Access- Control System) configuration log –Network topology documentation

Validate and Audit Standards (1)

Validate and Audit Standards (2) We can use configuration management performance indicators to measure configuration management success We can use configuration management performance indicators to measure configuration management success Configuration management performance indicators Configuration management performance indicators –Configuration integrity checks –Devices, protocol and media audits –Standards and documentation review

Configuration integrity checks It should evaluate the overall configuration of the network its complexity and consistency and potential issues It should evaluate the overall configuration of the network its complexity and consistency and potential issues For cisco network, it is recommended to use Netsys configuration validating tool. For cisco network, it is recommended to use Netsys configuration validating tool.

Device, Protocol and Media Audits It is used to check consistency in software versions, hardware devices and modules, protocol and media and naming convention It is used to check consistency in software versions, hardware devices and modules, protocol and media and naming convention Ciscowork RME is a configuration tool that can audit and report on hardware versions modules and software versions Ciscowork RME is a configuration tool that can audit and report on hardware versions modules and software versions

Standards and Documentation review It is done to ensure that the information is accurate and up to date It is done to ensure that the information is accurate and up to date The audit should include reviewing current documentation recommending changes or additions and approving new standards The audit should include reviewing current documentation recommending changes or additions and approving new standards Following documents should be reviewed on a quarterly basis Following documents should be reviewed on a quarterly basis –Standard configuration definition –Solution templates including recommended hardware configuration –Current standard software versions –Upgrade procedures for all devices and software version –Topology documentation –Current templates –IP address management