Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back.
00:02
Let's go certify that Design associate, of course.
00:06
Nice and one point for January. Instructor Wing.
00:10
I started
00:11
previous video. We introduced the identifying the existing network.
00:16
From this video, we will begin to introduce characterizing existing that work
00:24
pre assessment question. You are reviewing our customer's existing network and need to obtain the following router information
00:33
interfaces. Running Processes II's image being executive
00:40
Which premier Shooter you use a show running convict
00:45
the show. Start up compute
00:47
See show processes of memory
00:51
The show version
00:53
e show tax support
00:56
Eyes a network engineer. We know all this community will help troubleshoot right?
01:02
But there is one can, you know, tell you
01:04
everything, which is a show tax support on the covers, all the commands above. So the answer will be e show tech support
01:18
topic.
01:19
In this lesson, we'll learn characterizing the existing network. Characterizing the network is in step two off the design methodology.
01:30
In this section, you will learn thio, identify your networks and major features tours to analyze existing network traffic on the tours for outing and monitoring network traffic.
01:45
Here's the steps in gathering information.
01:48
When arriving at aside, an existing network you need to opt in all the existing documentation. Sometimes no document dated information exists.
01:57
You should be prepared to use the tour's toe, obtain information and get access to log in to the network devices. To obtain information,
02:08
step one right. Identify properties of the existing network
02:14
network topology technologies on the applications, use existing documentation on organization and no input step to perform in that book. Audit that, as detailed to the description to the net off the network
02:30
stabbed three analyzed to gather the information right
02:35
from these slight you can see a network. The overview for
02:39
Provider Edge Rotter Replacement Project, which is a very high level, never diagram on also the technical overview. Right? The technical overview of sample tells us Roger Intervenes and Hardware Company features Roger I. P addresses in the service is
02:58
layer to VPN and the throne a surveys
03:00
US and US routing system Management's is the monitoring assistant. Security and motor cussed a sector they can check out from this diagram. Right.
03:10
Get some idea about information gathering
03:16
When performing a network audit. You have three primary sources of information Existing documentation existing that worker management software tours net validating tours. After gathering the existing documentation, you must obtaining access to the existing management software.
03:36
The client
03:38
may already have Siskel Prime Tours, a center from which he can opt in hardware mottoes on a confidence and self diversions. You can also attend the existing router and switch configurations. The Net God it should have provided the following information Network devices list hardware specifications,
03:57
software versions, configuration of the network devices, all dating tours out. Put the information
04:03
interface speeds Spio on the memory utilization, one technology tax and a carrier information. In a small network,
04:13
you may be able to Upton the required information via manual assessment for a larger network. A manual assessment maybe too time consuming.
04:26
So we need to use the network assessment tours. Right Assessment tours include a following
04:31
Manu assessment Manual commands Review all the device configuration on the operation through the use of a stroke. Man's of network device configurations interfaces loads on Roger and Rachel are Bs scripting tours, existing network management, auditing floors,
04:50
simple narrative management, war as an MP
04:54
used to monitor performance of network device and a link uterus ization knife lo used for collecting and a Mandarin data off every flow in the Neckar segment. Cisco Discovery Prodigal CDP used to to discover how network devices are interconnected at each other.
05:13
Lynn Clear Discovery Protocol. ODP as used to be mounting Vander environments.
05:18
SIS Lock Jerry's Time staff The Log Information
05:24
Off device and system events that are captured and exported. This is the server
05:30
network based application, reclamation and bar Intelligent declassification engine, Siskel Fran Infrastructure and a Sorrow wins clacks ah s and M t and n f l o. Information. Where Shark
05:45
utilizes a span Port technology to capture real time package for analysis. Additional tours will emphasize on VoIP, wireless and security.
05:58
Air Magnet Uh, Analyzer
06:02
Pro A Cop Who?
06:05
Cy Saturday for wireless I Survey
06:09
Langhart Network. A security scanner for Security section
06:15
Manu Auditing all network devices You can use the following commands the obtain information. Joey Merriment show processes CPO show version, show memory show logging show running computers to start up a configure show I Castro always are popular communes were using on the daily operation base.
06:34
You know, I hope you can you understand this
06:39
commands are very well. If not, do your whole mart to get from here only those communes. All right. Wanna emphasize? You know, some of them for a show version you can see from the screen. That's the example. Tell you the information with racial version
06:55
show Ikey Castro. This, you know, tells you the information
07:00
for the, you know, data flow in your network. This is the raw data gathering and show a I p Run a show. I kick I throw. This is the show i p Cash flow Few. The descriptions are in the net flow record display. Spend some time
07:16
guy familiar with those communities because of their very
07:20
useful and important to your daily operation. Right, Let's move on.
07:27
Learning check. Question number one which three sources does the network designer used to collect the information that is used to characterize existing networks? Choose three. A staff in poot Be visual image entry.
07:43
Seeing that, we got it.
07:45
De traffic and houses.
07:47
E server status takes half incident report. Right.
07:53
Um, I'll give you a second to think about it.
07:59
So we go where the staff in poot that regard it Traffic analysis, Um, you know, because of visual documentary server status sticks incident report are not related. Thio Hall you characterize your existing network is so based on the staffing man input.
08:18
Never got it right. Those air traffic analysis all the, you know, information gathered from those. Then I'm gonna help you. Characterizing existing network
08:31
question number two. What are the three effective ways to collect the information about existing data networks? Choose three, eh? You the organization. No input.
08:41
Be performing the traffic analysis. See, analyze the user mapping off running configure certification,
08:50
the performance packager level on it to verify carrier service guarantees e performing that regarded together more detail about it than ever.
09:00
F use reporters of that idolizes the marriage because of a customer's existing their work.
09:05
G contacted a customer interview regarding an open attack ticket.
09:09
I'll give you a second to think. Let's see you use the organizational input performance. Traffic analysis. I analyze the user mapping up running application does. This will not help right
09:24
performance package or level audit Thio Verify Carrier service guarantees that we will know how
09:31
user reports that analyzes the markings of a customer. Existing network
09:35
reports will not help you to crack the information about existing network.
09:41
Conducted a customer interview.
09:45
Maybe, but it's not ideally the answer. So we go with the A B. I eat. So did you get the right answer?
09:54
I hope you did all right.
09:56
Summary in today's brief lecture we discussed characterizing existing that work
10:05
any questions, sent me an email.
10:07
I'll see you in the next video. Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor