Cisco Routers

Cisco routers provide access to applications and services, and integrate technologies

IP Phone - Cisco

IP phone takes full advantage of converged voice and data networks, while retaining the convenience and user-friendliness you expect from a business phone...

WAN - Cisco Systems

Transform your WAN to deliver high-performance, highly secure, and reliable services to unite campus, data center, and branch networks.

EtherChannel - Cisco Systems

EtherChannel provides incremental trunk speeds between Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet. EtherChannel combines multiple Fast ...

Looking Toward the Future - Cisco Systems

Looking Toward the Future by Vint Cerf. The Internet Corporation for Assigned Names and Numbers (ICANN) was formed 9 years ago....

Pages

Tuesday, November 15, 2011

Next Generation WAN FAQs

 

What is MPLS?
MPLS (Multi-Protocol Label Switching) is a packet-forwarding technology which uses labels to make data forwarding decisions. With MPLS, the Layer 3 header analysis is done just once (when the packet enters the MPLS domain). Label inspection drives subsequent packet forwarding. MPLS provides the following beneficial applications: Virtual Private Networking (VPN), Traffic Engineering (TE), Quality of Service (QoS) and ATM over MPLS (AToM). Additionally, it decreases the forwarding overhead on the core routers. MPLS technologies are applicable to

IP Telephony FAQs


What does IP telephony mean?
    IP (Internet Protocol) telephony, or called IPT, is a method for taking analog audio signals, like the kind you hear when you talk on the phone, and turning them into digital data that can be transmitted over the Internet.  In the company, the digitized telephone traffic between Company locations will be carried over our WAN and LANs instead of the Public Telephone Network or the Internet.

Network Questionnaire

Example network questionnaire for Network Administrators:

General

1. Please provide an organization chart(s) for all personnel who will be involved with this audit.
2. Please provide a list of contacts.  This list should include the person's name, telephone number, e-mail address, room number, and job description (Ex. UNIX System administrator).
3. Please provide network drawings identifying all firewalls,

Monday, November 14, 2011

Cisco Network Design


      Cisco uses its own brand of networking symbols. Since Cisco has a large Internet presence and designs a broad variety of network devices, its list of symbols is exhaustive. For CISCO specific network drawing diagrams, download the add-ons to enjoy the full functionality of all the Cisco Visio  here>>>
http://www.cisco.com/web/about/ac50/ac47/2.html


Detailed Cisco Network Diagram

      Identifiable network icons are used to depict common network appliances. For example: Router, and the style of lines between them indicate the type of connection. Clouds are used to represent networks external to the one pictured for the purposes of depicting connections between internal and external devices, without indicating the specifics of the outside network. The server is further connected to a printer and a gateway router, which is connected via a WAN link to the Internet.
Visio Network Stencils

Packet® Icon Library

Packet Icons Product 1

Packet Icons Product 2

Packet Icons Product 3

Packet Icons Product 4

Packet Icons Product 5

Packet Icons Product 6
or http://www.cisco.com/en/US/products/hw/prod_cat_visios.html

Problem & Communication Process

Problem Management and Communication Process

       Outage Communication Timeline for example Sev 1
Communications activities begin after notification from Help Desk, from users or from Key Production Environment Manager. After initial consultation with responding infrastructure manager or appropriate support team assigned to

Manual Back up and Restore CFG

Manual Back up and Restore Configuration Files for Switch

       The purpose of this content provides the IT services staff with some basic steps to migrate the configuration from an existing switch to a new switch and this content is to ensure that all backup the configuration is correct and also ensure the backup and restore process are agreeable with the business unit requirement. Use a Terminal Emulation Program to Backup and Restore a Configuration

       A terminal emulation program can be used to back up and restore a configuration. This is a description of the procedure using Microsoft HyperTerminal Terminal Emulation software:

  1. If the configuration needs to be copied from another switch, connect to that switch through the console or Telnet.
  2. At the Switch> prompt, issue the enable command, and provide the required password when prompted.
     
         The prompt changes to Switch#, which indicates that the switch is now in privileged mode.
  3. Issue the terminal length 0 commands in order to force the switch to return the entire response at once, rather than one screen at a time.      This allows you to capture the configuration without extraneous --more-- prompts generated when the switch responds one screen at a time.
  4. On the HyperTerminal menu, choose Transfer > Capture Text.          The Capture Text window appears.
  5. Name this file "config111111.txt." [name template “configmmddyy.txt”]
  6. Click Start in order to dismiss the Capture Text window and begin the capture.
  7. Issue the show running-config command, and allow time for the switch to complete its response. You will see: Building configuration...          followed by the configuration.
  8. On the HyperTerminal menu, choose Transfer > Capture Text > Stop in order to end the screen capture.  
  9. Open the config111111.txt file you created in any text editor, such as Notepad or Wordpad.
  10. Connect to the switch that needs the configuration.
  11. Open the config111111.txt file.
  12. Highlight the entire contents of the config.txt file. You can do this by dragging the cursor from before the first character to after the last character in the file while holding down the left mouse button. Alternatively, if you use Notepad, you can choose Edit > Select All from the menu.
  13. Copy the selected text to the Windows clipboard. You can either choose Edit > Copy from the text editor menu, or hold down the CTRL key and simultaneously press the C key in order to perform the copy.
  14. Switch to the HyperTerminal window, and issue the configure terminal command at the Switch# prompt. Then press Enter.
  15. Paste the configuration file into the switch by selecting Edit > Paste to Host on the HyperTerminal menu.
  16. After the configuration has finished pasting and the switch brings you back to the configuration prompt, issue the copy running-config startup-config command in order to write the configuration into memory.
  17. Issue the exit command in order to return to the Switch# prompt
  18. Logon as local administrator and verify that the Switch is functioning as expected Use the show running-config command to confirm that the configuration file has been copied to the destination switch

Role and responsible
1.   IT Service are responsible to maintain the procedure and assure that the document is align with the procedure
2.   IT Service Asst. Application owner is an assigned information owner who agrees with the backup strategy.
3.   The procedure and document are subjected to review and approved by information owner by specify period.
4.   IT Service run test the switch backup and restore process that must be tested at least once a year to ensure that the backup strategy is effective. Use the test to restore the configuration at least once a year and have the application owner sign document.

Sunday, November 13, 2011

CMM's Of Voice Telephone Network

      Cost Management Moments (CMM's) are intended to educate and encourage everyone to do their part in support of reducing expenses in IT's company. Please take a moment to review the latest CMM on the topic of General Company Telephone Network (CTN) usage and see what you can do to contribute its success. Voice Telephone Network Usage Billing




      Carriers charge the company on a per-minute basis. Rather than track millions of small transactions through our billing systems and pass that cost on to business units, ITC bundles the cost of all of these transactions and bills an average fixed fee for usage.