Network Contingency and Recovery
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hello. My name is Dustin and today will be continuing our beginner network infrastructure course with network contingency and recovery. Let's get started.
00:13
So what is Contingency contingency is something that could happen depending on other occurrences. For example, if you apply a patch to all of your writers at once and it ends up breaking the routers, you probably want to have some sort of contingency plan in place to get the network back up and going.
00:32
A good contingency plan should be really easy to follow for even the least experienced person at the organization. You never know who's actually going to be trying to follow and implement or work on that contingency plan. And if you make it too complex or complicated,
00:49
you really run the risk of keeping your network down for an unnecessary amount of time.
00:53
The easier the language and it is to follow the better chance of making at six successful.
01:00
Every contingency plan should answer three questions.
01:04
One. What could happen
01:07
to what to do in case it happens, And three, What can you do to prevent it from happening over happening again?
01:17
The plan should also include a variety of different possibilities and the likelihood of those things happening. Ideally, you'd also want to be keep it prioritized based on what could happen more often, um, than not.
01:36
So let's take a look at this network map real quick and see if we can come up with a really simple and quick contingency plan.
01:44
So if we start at the left, we just got a regular PC connected to a switch, which then follows that connection to the router. Another switch than a firewall and off the firewall. We've got a switch in a server, and then we've got a server router and then the Internet.
02:00
So first thing we want to know is what could happen? What are a few things that could happen? Um, that we should have plans for
02:10
what we do if anything did happen or what to do in case it happens.
02:15
If that thing were to happen,
02:17
what could we do to get things back going, how they should be?
02:22
And lastly, what can you do to prevent it from happening? So if we know something has the possibility of occurring, is there anything we can do before that happens to maybe prevented altogether
02:35
so first off, what are a few things that could happen that we need to be aware of and have plans for
02:40
and just base. Ah, based on this ruling that this real easy network diagram one things that comes to mind to me is it looks like there's only one path.
02:50
If something were to go down,
02:53
you're really gonna have some major issues. There's no redundancy. So if Router one goes down, PC zero is no longer to be able t o be able to connect to the Internet.
03:05
Same with switch three. The firewall switch for rather, too. If any of those devices go down your server, which is presumably a Web server or email server,
03:15
we'll lose all connectivity to the Internet, and that's definitely not what you want.
03:22
So next question what we do if the link between the firewall and switch four went down
03:29
again. You have that inside network activity. But anything outside of that is not gonna work.
03:36
So
03:37
what will we do
03:38
in case that happens
03:40
so really, in this one, it depends on what happened. If one router went down, maybe we'd wanna have a another router that's backed up and configured
03:50
and ready to just swap out. Um, if the line went down, maybe you've got some extra cables laying around with that see, thrown at or fiber, maybe a co axial cable.
04:00
Lastly, what could we do to prevent it from happening?
04:04
And again, In this case, it's pretty simple. There's no redundancy. Um, ideally, you'd wanna have to orm or, um, of most of your your network equipment and have, ah, back up line out. So maybe if you have a old router surrender to is a really old one,
04:24
um, it was from your ice P.
04:26
They haven't upgraded you to new one yet.
04:30
There's a good chance that that may have issues with patching or maybe just a lack of memory or CPU power to process the amount of traffic going in or out. So what can we do to prevent that from happening? One. We could possibly upgrade it
04:45
or to maybe get a secondary connection. Most organizations have two or more connections in case there first or primary Internet provider goes out.
04:56
They won't lose Internet to the whole organization, and that may be something that's a little less expensive to like a slower line or something, but it's something that we can do to prevent that from happening.
05:10
So configurations and backups
05:14
really backups on most network devices? Relatively easy, like we've talked about a lot of the modern devices. Do you have Gu Ys or the graphical user interface, where you just log in, go into your settings back up.
05:28
It will ask you where you want to back it up, whether that sum to, ah, a flash drive, extra hard drive FTP server
05:35
and you let it run.
05:38
If you are using the command line interface, it's usually pretty easy as well. The first step for most network devices is to enter your enable or privilege mode, and you can do that just by typing. Enable.
05:51
Step two would be copying the current configuration from the device
05:57
to your server and links that a lot of times you may have options to back it up to a, um, like file server and FTP server. Maybe just a thumb drive.
06:08
Um, in this case from the command line, we're going to copy it to a T FTP server.
06:14
Command is really simple. Just copy
06:16
running dash config
06:19
t ftp
06:20
colon
06:24
and then hit Enter and lastly for the address or name of the remote host. Um, if you've got a real dynamic network, maybe you want to put just the name of the server in there so it can use DTP to find that Or if you've got something real static, it may be a better idea just after the i P address
06:42
to put it in there.
06:43
And then he hit Enter
06:46
and a last you for the filing and he could name it whatever. Typically, um, it's you dated the current name with a version or a Daytona. So when you go to back it up, you know which file you're backing up
07:00
in. Press enter.
07:01
It will send that file the FDP in the in this case of TCP to our server
07:06
and we're good. So if we need to restore that backup, what can we dio? It's pretty easy. Um, again, from most buoys, you can just upload the file
07:17
and you're good to go.
07:18
In this case, we're gonna do a copy t ftp
07:23
running Dashon thing,
07:25
and again, it'll ask for the address or hosting of the server,
07:30
and then you'll need to enter the file name itself, and you wanna make sure that is exactly how it is. That way you could find it.
07:36
Press enter, and it will restore that configuration.
07:42
Notes. When you do restore from a server, it's important to remember you may need to add it to configuration a little bit and remove any lines beginning with Triple A or capital A. A. That's all the security commands that may lock you out of your your network device. If you didn't have the passwords backed up or anything like that,
08:01
Yeah,
08:01
it's also very important to remember. If you do do that, you you want to make sure you add those back with a new security passwords.
08:11
So in today's video, we discussed just a few things. We talked about contingency plans and why they're good. We also talked about backing up configurations and also restoring configurations
Instructed By
Similar Content