Www.tils.qut.edu.au Peter Kurtz Manager, Network Operations Centre.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

powerful network monitoring & management solution
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Virtual LANs.
Southampton Open Wireless Network The Topology Talk.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Network Operations and Network Management.
|ESDS SOFTWARE SOLUTION PVT. LTD.| Enterprise Datacenter Management Suite.
MONITORING TOOLS Open Source Security Tools to monitor your network.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Wireless and Switch Security NETS David Mitchell.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Chapter 9: Troubleshooting and Repairing Networking.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID CISCO NETWORK CONNECTIVITY Center Network Connectivity Monitor 1.1.
MANAGED SERVICES OPERATIONS. Increasing IP Infrastructure Complexity Requires Greater Need for Services Data Center B2B Links Branch Offices Distribution.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Alison Davis and Peter Kurtz Port Based Network Authentication in a Lab Environment QUESTNet 2000.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter Overview Network Communications.
Presentation & By-Line Goes In This Space (Edit Slide Master) IT Monitor in Corporate IT Networks Martin Otterson Chris Farquhar.
© 2011 Cisco and/or its affiliates. All rights reserved. 1 High Performance Network Analysis Enterprise Operate Practice Cisco Services Andrew Wojtkowiak.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Inventory:OCSNG + GLPI Monitoring: Zenoss 3
1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Operations in HEAnet Brian Nisbet NOC Manager. Operational Overview 30+ Technical Staff. – 75% of whom participate in NOC Duty. 60+ Clients. Expanding.
Home Overview Top 10 Dashboards CCTV Views Community Getting Started Network Netowrk.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
Configuring Network Access Protection
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Module 11: Designing Security for Network Perimeters.
Country Report on IP/ISP Network By Bredalyn Jatios & Douglas Kilemente Marshall Islands National Telecommunications Authority.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Objectives Blue Color VLAN’s Should reach Message Server from all locations Red Color VLAN’s Should not Reach Message Server In Each L2 Switch Blue Color.
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Figure 11-1 A residential AP (Access Point) WAN4 Switch ports DC Power.
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
Network Management Systems at ACU Campus Network Monitoring Campus Network Monitoring Wireless Network Monitoring Wireless Network Monitoring VoIP Network.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Kevin Watson and Ammar Ammar IT Asset Visibility.
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Chapter 1 Introduction to Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM)
Cisco Unified Communications Management
TECHNOLOGY GUIDE THREE
Instructor Materials Chapter 9: Testing and Troubleshooting
Securing the Network Perimeter with ISA 2004
Presented By: #NercompPDO3
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Based on work by DoIT Network Services, UW-Madison
ISMS Information Security Management System
Intrusion Detection system
Network Monitoring System
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Peter Kurtz Manager, Network Operations Centre

QUT Network Infrastructure Central Overview Data Network Monitoring Voice Network Monitoring System Monitoring Environmental Monitoring IT Asset Management System Outline

QUT WAN

QUT Core

QUT Network 45,000 staff and Students Servers Network Ports 1117 Switches / Devices 13 x Cisco routers 2 x Juniper routers Border & Corporate Cisco Firewalls FSM 2 x Cisco VPN 3000s devices x Dialin Cisco modems

457 x Cisco Aps o 1231, 1242 o 1131, 1252 o x Cisco Controllers o 4 x WiSM (2 x 4400) o 1 x x Location Server Radius Authentication o AD + Free Radius 2 x VPN devices 2 x Intrusion Prevention System (IPS) QUT Wireless Design

Information Technology Services CRICOS No 00213J Wireless Coverage Maps

Data Network Monitoring Central log Server Syslogs, netflow, authentication logs etc. Statseeker Ciscoworks IARF In house software – C and Perl scripts Wireless stats CPU and Memory etc..

Ciscoworks LMS 3.1 Device configuration roll out; such as the configuration of the FaST trial. Configuration collection; Used for processing device compliance in release management. Inventory reports & Compliance management User tracking; we can find users and their switch ports, IP address, from MAC address or random attributes. Topology manager; Visualise the network and display it's current status in regard to, link status, spanning-tree status, etc.

Statseeker

In-house QUT

Wireless Monitoring

Central Management using WCS Cisco Unified Wireless Networking WCS manages the Controllers Controller manage the APs Bulk configuration using templates Service Statistics – Usage, Availability, Errors, Rouge APs APs are configured dynamically using LWAPP LWAPP (Light Wight Access Point Protocol) CAPWAP (Control And Provisioning of Wireless Access Points) RFC4118 Wireless Control System

WCS alerts on Rouge APs Detecting their signal Providing the location Categorise types access points WCS Contains Rouge APs Controllers disassociation requests to clients contacting the rouge access point Airmagnet laptop Analyser to detect rouge access points in the field Access Point Rouge Detection

Internet QUT Internet Access Audits Firewall Rules

Voice QUT PABX System extensions IPTel Alcatel’s 4760 Omnivista –Incidence Monitoring –Network Topology Tool –Performance/Utilisation Monitoring

Server QUT Using a mixture of open source products and Vendor supplied tools from HP, VMware and Sun. Open Source tools include Nagios and Cacti + in-house system called SMAR (System Monitoring and Reporting). Over 750 servers monitored by ITS. Monitoring Service is under review to consider new technologies such as Hyperic HQ, and MS SCOM etc.

Power and UPS Monitoring temp in data centers Swipe access CCTV Monitoring Environment QUT

Finance system Ciscoworks 2009 Project to develop a prototype database IT Asset QUT

IT Asset Life Cycle Tracking –Procurement, RMA, Write offs –Finance system connection –Electronic Stocktakes Develop a Dashboard – one view –Data Network, PABX, Hosts, UPS Where to next?

Questions