Hello. Welcome back.
Let's go certify that Design associate, of course.
Nice and one point for January. Instructor Wing.
previous video. We introduced the identifying the existing network.
From this video, we will begin to introduce characterizing existing that work
pre assessment question. You are reviewing our customer's existing network and need to obtain the following router information
interfaces. Running Processes II's image being executive
Which premier Shooter you use a show running convict
the show. Start up compute
See show processes of memory
Eyes a network engineer. We know all this community will help troubleshoot right?
But there is one can, you know, tell you
everything, which is a show tax support on the covers, all the commands above. So the answer will be e show tech support
In this lesson, we'll learn characterizing the existing network. Characterizing the network is in step two off the design methodology.
In this section, you will learn thio, identify your networks and major features tours to analyze existing network traffic on the tours for outing and monitoring network traffic.
Here's the steps in gathering information.
When arriving at aside, an existing network you need to opt in all the existing documentation. Sometimes no document dated information exists.
You should be prepared to use the tour's toe, obtain information and get access to log in to the network devices. To obtain information,
step one right. Identify properties of the existing network
network topology technologies on the applications, use existing documentation on organization and no input step to perform in that book. Audit that, as detailed to the description to the net off the network
stabbed three analyzed to gather the information right
from these slight you can see a network. The overview for
Provider Edge Rotter Replacement Project, which is a very high level, never diagram on also the technical overview. Right? The technical overview of sample tells us Roger Intervenes and Hardware Company features Roger I. P addresses in the service is
layer to VPN and the throne a surveys
US and US routing system Management's is the monitoring assistant. Security and motor cussed a sector they can check out from this diagram. Right.
Get some idea about information gathering
When performing a network audit. You have three primary sources of information Existing documentation existing that worker management software tours net validating tours. After gathering the existing documentation, you must obtaining access to the existing management software.
may already have Siskel Prime Tours, a center from which he can opt in hardware mottoes on a confidence and self diversions. You can also attend the existing router and switch configurations. The Net God it should have provided the following information Network devices list hardware specifications,
software versions, configuration of the network devices, all dating tours out. Put the information
interface speeds Spio on the memory utilization, one technology tax and a carrier information. In a small network,
you may be able to Upton the required information via manual assessment for a larger network. A manual assessment maybe too time consuming.
So we need to use the network assessment tours. Right Assessment tours include a following
Manu assessment Manual commands Review all the device configuration on the operation through the use of a stroke. Man's of network device configurations interfaces loads on Roger and Rachel are Bs scripting tours, existing network management, auditing floors,
simple narrative management, war as an MP
used to monitor performance of network device and a link uterus ization knife lo used for collecting and a Mandarin data off every flow in the Neckar segment. Cisco Discovery Prodigal CDP used to to discover how network devices are interconnected at each other.
Lynn Clear Discovery Protocol. ODP as used to be mounting Vander environments.
SIS Lock Jerry's Time staff The Log Information
Off device and system events that are captured and exported. This is the server
network based application, reclamation and bar Intelligent declassification engine, Siskel Fran Infrastructure and a Sorrow wins clacks ah s and M t and n f l o. Information. Where Shark
utilizes a span Port technology to capture real time package for analysis. Additional tours will emphasize on VoIP, wireless and security.
Air Magnet Uh, Analyzer
Cy Saturday for wireless I Survey
Langhart Network. A security scanner for Security section
Manu Auditing all network devices You can use the following commands the obtain information. Joey Merriment show processes CPO show version, show memory show logging show running computers to start up a configure show I Castro always are popular communes were using on the daily operation base.
You know, I hope you can you understand this
commands are very well. If not, do your whole mart to get from here only those communes. All right. Wanna emphasize? You know, some of them for a show version you can see from the screen. That's the example. Tell you the information with racial version
show Ikey Castro. This, you know, tells you the information
for the, you know, data flow in your network. This is the raw data gathering and show a I p Run a show. I kick I throw. This is the show i p Cash flow Few. The descriptions are in the net flow record display. Spend some time
guy familiar with those communities because of their very
useful and important to your daily operation. Right, Let's move on.
Learning check. Question number one which three sources does the network designer used to collect the information that is used to characterize existing networks? Choose three. A staff in poot Be visual image entry.
Seeing that, we got it.
De traffic and houses.
E server status takes half incident report. Right.
Um, I'll give you a second to think about it.
So we go where the staff in poot that regard it Traffic analysis, Um, you know, because of visual documentary server status sticks incident report are not related. Thio Hall you characterize your existing network is so based on the staffing man input.
Never got it right. Those air traffic analysis all the, you know, information gathered from those. Then I'm gonna help you. Characterizing existing network
question number two. What are the three effective ways to collect the information about existing data networks? Choose three, eh? You the organization. No input.
Be performing the traffic analysis. See, analyze the user mapping off running configure certification,
the performance packager level on it to verify carrier service guarantees e performing that regarded together more detail about it than ever.
F use reporters of that idolizes the marriage because of a customer's existing their work.
G contacted a customer interview regarding an open attack ticket.
I'll give you a second to think. Let's see you use the organizational input performance. Traffic analysis. I analyze the user mapping up running application does. This will not help right
performance package or level audit Thio Verify Carrier service guarantees that we will know how
user reports that analyzes the markings of a customer. Existing network
reports will not help you to crack the information about existing network.
Conducted a customer interview.
Maybe, but it's not ideally the answer. So we go with the A B. I eat. So did you get the right answer?
I hope you did all right.
Summary in today's brief lecture we discussed characterizing existing that work
any questions, sent me an email.
I'll see you in the next video. Bye for now.