...UNIVERSITY OF PRETORIA 10 CONFIGURATION MANAGEMENT Assignment Jikesh Jagbeer UNIVERSITY OF PRETORIA 10 CONFIGURATION MANAGEMENT Assignment Jikesh Jagbeer Contents Introduction 2 The Project Office: Configuration Management Plan 3 Section 1: Introduction 3 Purpose 3 Project Framework 3 Section 2: Configuration Identification 4 Configuration Items 4 Baseline Documents produced in a typical project 4 Naming Convention for Project Documentation 5 Document Format 5 Section 3: Configuration Organisation 6 Section 4 Configuration Management Phasing and Milestones 8 Section 5: Data Management 8 Section 6: Change Control 9 Change Control Process 9 Change Control Board 10 Change Manager 10 Duties of a CCB Member 11 Change categorization 11 CAB meetings 12 Section 7: Interface Management 13 Section 8: Configuration Status Accounting 13 Status Account Data 13 Configuration Management Database 13 Section 9: Verification 13 CM Process Audits 13 CM Baseline Audit 13 Section 10: Reference Documents 14 Introduction The South African Post Office (SAPO) is constantly under pressure to reduce cost whilst improving its profit margin through innovative products and effective service delivery. SAPO is a multifaceted organisation which operates in various industries e.g. Logistics, IT and Cash Collection etc. Hence SAPO, at any given moment in time, has a large number of projects that are in various stages of execution. ...
Words: 3446 - Pages: 14
...Switch Configuration Switch Configuration First I would unpack the switch along with all of its contents, check for any missing or damaged items and if any our found I would then contact the cisco team but if everything looks great I would then proceed. If I have all the equipment ready for the switch I would then continue on with what they call the express set up. First thing I would do is verify that no devices are connected to the switch when first initializing the setup the switch will start acting like a DHCP server. Since my network has a static IP address I will change it for the time being to DHCP. Once switch is mounted and I have all my devices prepared for it I will then power it on. As the POST initializes I can get a good indication that the switch is functioning properly. I can tell when the POST is complete by SYSLED blinking green and if it fails it would blink an amber color. Next with my laptop I will hook directly in to the switch via CAT5. From there I will log in to the switch by opening my web browser and in the address bar typing in the IP address of the switch, which by default is 10.0.0.1 then you will enter the express setup GUI will open. In the express setup GUI I will configure my VLAN ID, IP, and IP subnet mask then I will enter my routers IP to point the switch through my default gateway. Then I will enable Telnet and set the Telnet password this will allow me to access and manage my switch using the command line interface (CLI). I can...
Words: 585 - Pages: 3
...Use of Microsoft SharePoint for Configuration Management in IT Organizations In the contemporary business marketplace, the requirement for a technology-based system to provide the tools for global organizations to archive and manage information has become an increasingly present issue. The use of a corporate-wide portal, supported by a collaborative, content management platform, provides an Information Management System (IMS) that culminates organizational information and intellectual capital, document storage, and collaborative workspaces into a single resource, accessible through a centralized portal interface (Microsoft, 2006, p. 14). Configuration Management (CM) encompasses the management of requirements, production, testing, technical documentation, and organizational processes during the lifecycle of a software system’s development. Within Information Technology (IT) organizations, CM defines a series of systematic controls for changes and developments to the software system, which ensure the integrity and traceability of the environment and software configuration throughout the development lifecycle. The CM process is a culmination of activities and support from each level of the organization, ensuring compliance with all applicable standards and guidelines for software development and production. Figure 1. Overview of Configuration and Change Management Process Integral to effective employment of CM processes is collaboration amongst the following cross-functional...
Words: 990 - Pages: 4
...DHCP Server configuration 1) Configure the network interface to give a static IP address to the DHCP server Edit the file /etc/network/interfaces [pic] 2) Use the command sudo apt-get install isc-dhcp-server in the terminal to install DHCP. 3) For the DHCP to assign Ipv4 addresses edit the file /etc/dhcp/dhcpd.conf and provide the range of address you want to the DHCP server to assign. [pic] 4) For ipv6 address, create a new file dhcpd6.conf and then configure the range of ipv6 addresses which needs to be assigned. The file should be created in /etc/dhcp/dhcpd6.conf [pic] 5) For ipv6, edit the file /etc/sysctl.conf and provide the below configurations. net.ipv6.conf.all.forwarding=1 net.ipv6.conf.all.autoconf=1 net.ipv6.conf.all.accept_ra=1 [pic] 6) Enter the below commands to enable the configurations made above. sudo sysctl -w net.ipv6.conf.all.autoconf=1 sudo sysctl -w net.ipv6.conf.all.accept_ra=1 sudo sysctl -w net.ipv6.conf.all.forwarding=1 7) Install the router advertisement daemon or radvd by using the command Sudo apt-get install radvd 8) Create file /etc/radvd.conf and put the internal interface and prefix there. [pic] 9) Now restart all the service using the commands - Sudo /etc/init.d/networking restart - Sudo /etc/init.d/radvd restart ...
Words: 335 - Pages: 2
...| Switch Configuration | | | Amanda Robertson | 4/20/2014 | | I was Hired By a company as a network engineer. One of my first jobs was to purchase, install, configure and deploy a Cisco Catalyst 2960-S Series Switches. This is a popular choice with the LAN Base Software, which comes with the switches. I found that this switch would be compatible with the companies needs having 48 ports, POE configurations that offer up to 15.4w per port, USB storage, 10 GB Ethernet uplink flexibility. This switch would use either copper or fiber optic cabling however I would prefer the fiber optic. The first step that I would have to take is to connect all hardware properly. “When you first set up the switch, you should use Express Setup to enter the initial IP information. This enables the switch to connect to local routers and the Internet. You can then access the switch through the IP address for further configuration” (Cisco, 2006-2010). Plug in the AC adaptor cord to the Cisco switch to power it on. The switch will go through POST and then verify that the SYST LED light blinks green rapidly. To run Express Set up mode, hold the mode button for 3 seconds, or when all lights above mode buttons turns green. Connect a CAT5 Ethernet cable to the switch and computer, after 30 seconds launch a browser and enter the IP address 10.0.0.1 in the browser and press enter. I would then fill out all the information requested by the Express Set up Mode, the Management interface would...
Words: 569 - Pages: 3
...use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this document is based on these software and hardware versions: • Cisco 2500 Series Routers • Cisco IOS® Software Release 12.2 (10b) The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact...
Words: 3234 - Pages: 13
...| HCM 9.0 Configuration Guide WorkCenter PeopleTools 8.51 | Last Revised: 06/04/12 FINAL 07/20/11 REVISION CONTROL Document Title: HCM 9.0 Configuration Guide: WorkCenter PeopleTools 8.51 Author: CMS Central File Reference: [ HCM90_CFG_WorkCenter_PT851.docx ] Date | By | Action | Section(s) | 07/08/11 | N Louie | Created | All | 06/04/12 | N Louie | Added Appendix for Security Info to Web Libraries | Appendix B | | | | | Review/Approval History Date | By | Action | Pages | 07/01/11 | User Group / Review Team | Review and Input | All | 07/25/11 | PMO QA | Standards Review | All | 07/20/11 | Application Manager | Approved for Release | All | Confidentiality Statement This document has been checked and screen shots do not contain any confidential information (staff names, addresses, social security numbers). Please add a new line, verifying that screen shots have been checked each time this document is published. Publishing Date | Name of Individual Checking Screen Shots | 07/21/11 | N Louie | 06/04/12 | N Louie | Table of Contents Page Page Introduction 1 Definitions 2 Process Flow 2 Terms 3 1.0 Template Pagelets 4 1.1 Content Reference Links 4 1.1.1 How To Do This Task 4 1.2 Navigation Collections 6 1.2.1 How To Do This Task 7 2.0 Pagelet Wizard 11 2.1 Navigation Collection Pagelets 11 2.1.1 How To Do This Task 12 2.2 Query Pagelets 16 2.2.1 How To Do This Task 17 2.3 External Links Pagelets 21 2.3.1 How...
Words: 2247 - Pages: 9
...For the network configuration, we decided to go with a partial mesh configuration to save on cost and time. With the amount of staff members and estimate growth on a annual basis. For Ip address that’s needed to allow enough for employees and guest for the business the sufficient. ip address 10.0.0.0.0 with 255.255.255.255 subnet with 256 usable ip address with a /25 allow guest to use the network . The configuration of the wireless network would allow the management workgroup to connect wireless on the third floor were the upper management staff. Basement level to the second/ first floor with run unshielded paired Ethernet cabling only to the telemarketers, which is about 85 feet. 15 ft for the security desk and 20 feet to training room. Sales agents will run off the wireless with workgroup allowing minimal access to display product to customers with restricted access to the outside internet with the configurations to allow monitor and packet captures as well as the management group .wireless system will support IEEE 802.11g ,IEEE 802.11b, IEEE 802.11a. Cisco wireless access point will be mounted on the ceiling with a hexagon formation to allow maximum coverage within the infrastructure. Basic information relating to the communication of the wireless network in figure 1.1 and the layout of the cisco wireless access points figure 1.2. each workstation not part of the training or security will be equipped with 150Mbps 2.4GHz Wireless PCI LAN Adapter Card with...
Words: 321 - Pages: 2
...NT1110 Unit 8: Video Summary 6 Hardware Configurations I watched 4 videos on Hardware Configuration. They were, in order, Device Manager, Driver Signing, Hardware Profile and Regional and Language Options. The 1st, Device Manager went over how to manage all your hardware devices. It covers how they are configured, their settings, drivers and resources. It’s found in System Properties. After this, was Driver Signing which is Microsoft’s way of confirming that its devices and drivers have been tested and are compatible with Microsoft’s operating system. Each driver and device is checked off in the System Properties verifying its authenticity. There is also driving signing options for hardware installations with software that is not Windows. They are Ignore, which means install anyway. Warn, which means the system will prompt you to choose and Block, which blocks unsigned software. The next video was Hardware Profile. This is a list of devices enabled at the start of a computer and loading into the operating system. It too is found in System Properties. It covered how to change your hardware profile. It’s usually used for laptops. We can change what devices our system uses 1st for instance, changing the network connections when traveling. The last video was Regional and Language Options. This is found on the Control Panel. Here, you can set language or choose how you want your numbers, currency, time and dates displayed. You can go to Customize to make changes. Topics ...
Words: 498 - Pages: 2
...Initial Assessment Author’s Note This project is being submitted on July 27th, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Initial Assessment The ISP that I am providing services for is responsible for access of the internet for a small business that is located near them. By the use of a small Tier3 they are able to do this. An ISP (Internet Service Provider) is a firm that provides internet to its subscribers that pay them a small fee for their access. In most cases ISP’s mainly focus on DSL, Cable modem, wireless and more recently, dedicated high speed interconnects such as Teir1 or fiber optics. In this case the ISP that I am helping is using a Teir3 meaning that they are only providing transit from other networks to reach the internet. There are three different ISP Tiers Tier1, Tier2 and Tier3; Tier1 is an ISP that has access to the entire Internet Region routing table only through its settlement-free peering relationships (DrPeering, 2013); A Tier2 ISP that purchases transit to reach destinations within an Internet Region (DrPeering , 2013). The basic requirements to run an ISP is having a solid backbone T1, 2 or 3; you will also need an Ethernet switch, an upstream router, a remote access server, and a local server for DNS and RADIUS (Patton Electronics, 2009). There are network layers associated ISP which consist of the Application Layer (Telnet, HTTP, FTP, SMTP), Transport Layer (TCP, UDP), Network Layer (IP), and...
Words: 513 - Pages: 3
...ASW-2(config)#int vlan1 ASW-2(config-if)#ip address 10.0.0.2 255.255.255.0 ASW-2(config-if)#exit ASW-2(config)#end ASW-2# int vlan1 ASW-2# ip default-gateway x.x.x.x %SYS-5-CONFIG_I: Configured from console by console Switch(config)#hostname ASW-1 ASW-1(config)#no ip domain-lookup ASW-1(config)#enable secret ciscoenpa55 ASW-1(config)# ASW-1(config)#line console 0 ASW-1(config-line)#password ciscoconpa55 ASW-1(config-line)#login ASW-1(config-line)#exec-timeout 10 0 ASW-1(config-line)#logging synchronous ASW-1(config-line)#line vty 0 15 ASW-1(config-line)#password ciscovtypa55 ASW-1(config-line)#login ASW-1(config-line)#exit ASW-1(config)#service password-encryption ASW-1(config)# ASW-1(config)#interface FastEthernet0/2 ASW-1(config-if)# ASW-1#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. ASW-1(vlan)#vtp server Device mode already VTP SERVER. ASW-1(vlan)# ASW-1(config-if)#switchport mode trunk ASW-1(config)#int vlan1 ASW-1(config-if)#ip address 10.0.0.2 255.255.255.0 ASW-1(config-if)#ip default-gateway 10.0.0.1 ASW-1(config)#end ASW-1(config)#int vlan1 ASW-1(config-if)#no shutdown ASW-1(config-vlan)#exit ASW-1(config)#vlan 10 ASW-1(config-vlan)#name Servers ASW-1(config-vlan)#exit ASW-1(config)#vlan 20 ASW-1(config-vlan)#name Users ASW-1(config-vlan)#exit ASW-2(config)#Vlan...
Words: 358 - Pages: 2
...Router>en Enter the configuration mode: Router#configure terminal Define the hostname (the name router is changed to Ciscozine) Router(config)#hostname Ciscozine Ciscozine(config)# Assign the privileged level secret The enable secret password allows you to enter enable mode (sometimes referred to as privileged mode or privileged-EXEC mode). To set a secret password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Define the privileged-EXEC mode password; remember to use a strong password (combine letters, numbers, nd symbols). The enable secret command uses a one-way encryption hash based on Message Digest 5 (MD5) Ciscozine(config)#enable secret C1sc0z$n3 Secure console port For security reasons, you must define a console password: Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure terminal Enter in the console configuration Ciscozine(config)#line console 0 Define your console password Ciscozine(config-line)#password g4S$%A2 Enable the password defined Ciscozine(config-line)#login Use the “logging synchronous” command, so the messages appear only after you press Return Ciscozine(config-line)#logging synchronous Secure VTY lines For security reasons, you must define a vty line password. The vty lines defines the password needed for a remote access (telnet, ssh, …) Enable administrative privilege Ciscozine>en Enter the configuration mode: Ciscozine#configure...
Words: 621 - Pages: 3
...Implementing Firewall Configurations Robert Collazo Rasmussen College Implementing Firewall Configurations First he would like me to use a host firewall in which case I would then use the Windows Firewall. Windows Firewall with Advanced Security includes a host-based firewall component that is a protective boundary for the local computer, which monitors and restricts information that travels between your computer and its attached networks or the Internet. It provides an important line of defense against someone who might try to access your computer without your permission. Then he would like me to be able to configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows Firewall...
Words: 344 - Pages: 2
...Running Header: Unit 7 Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain...
Words: 589 - Pages: 3
...Subnet and Router Configuration Author Note This research is being submitted on August 18th, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Subnet and Router Configuration Given the IP address 154.78.0.0 calculate the subnet masks that would offer 18 subnets, and have the ability to add 6 per year for the next five years, with each subnet having up to 580 hosts? With This IP address (154.78.0.0) in order to give my client 18 available Subnets also with an option of adding 6 more subnets for the next five years and with each subnet having up to 580 hosts per subnet. I have given this much thought and the subnet mask I would use is 255.255.252.0 this will give me 64 available subnets for growth along with 1,022 hosts per subnet I know that’s a little more than 580 hosts but in my mind having doubled that wouldn’t hurt. This will make my first host IP address be 154.78.0.1 and my last host address be 154.78.3.254 leaving 154.78.3.255 my broadcast address and 154.78.0.0 my network address. Indicate the steps and command that you would use to access and configure the router/switch. Configuring the Fast Ethernet Interface Steps | Command | Purpose | 1 | Router>enable | EXEC Mode, Privileged/pswd | 2 | Router# configure terminal | global configuration mode | 3 | Router# show ip interface brief | brief status of the interfaces that are configured for IP | 4 | Router(config)# interface fastethernet...
Words: 423 - Pages: 2