What is configuration Management?
Identifying and documenting all the infrastructure and devices installed at a site.
A systematic approach to ensuring that the desired state of an IT system is maintained throughout its lifecycle.
What elements help implement configuration management?
A CMS (Configuration management system)- The tools and databases that collect, store, manage, update, and present information about CIs.
A CI (Configuration item)- An asset that requires specific management procedures for it to be used to deliver the service.
Service assets- Are things, processes, or people that contribute to the delivery of an IT service. Each asset must be identified by some sort of label.
What are the various configuration states?
Configuration Baseline: Documents the approved or authorized state of a CI, allows auditing processes to detect unexpected or unauthorized change. Sometimes referred to as the golden configuration.
Production configuration: The state of a CI as used withing a working network. The Configuration settings used when an appliance, instance or app is booted up or started.
Backup configuration: A copy of the production configuration made at a particular time, may not match the golden config as production config changes.
What are backup policies in network management more focused on?
Swiftly restoring faulty switches, routers, firewalls, and load balancers.
What are 2 backup modes a appliance may support?
State/ bare metal: This is a snapshot type image of the whole system.
Can be redeployed to any device of the same make and model as a system restore.
Configuration File: This is a copy of the configuration data in a structured format, such as Extensible Markup Language (XML)
This file can be used in a two-stage restore where the OS or firmware image is applied first, and then the configuration is restored by importing the backup file.
What does the change management process do?
Minimizes the risk of configuration drift and unscheduled downtime by implementing changes in a planned and controlled way.
How do major changes get approved?
They require approval through a Change Advisory Board (CAB)
How is the need for change implemented in a formal change management protocol?
The need for the change and the procedure is captured in a RFC (request for change) document.
The RFC be considered at the appropriate level, and affected stakeholders will be notified
What is typical asset management information?
Type, model, serial number, asset ID, location, user(s), value, and service information.
Name a application that assists in inventory management.
Lansweeper
What is the starting point for trouble shooting license issues?
The log.
This should show whether an evaluation/trial period has just expired or when a seat/instance count has been exceeded.
What is the difference between EOS and EOL?
End of Life
When a manufacturer discontinues sales of a product.
Support and availability of spares and updates become more limited.
End of support.
These products no longer receive security updates and represent a critical vulnerability if any remain in active use.
The exact terminology can vary between vendors.
What is a hotfix and a coldfix and what is the difference?
hotfix: A code change that addresses a specific issue that can be applied without incurring downtime
coldfix: A code change that requires the software or host to be restarted.
What is patch management?
Refers to the procedures put in place to manage the installation of updates for hardware (firmware) and software.
What is flashing the chip?
Updating firmware.
Make sure you make a backup of the system before updating the firmware (esp. for firewall)
Name some methods of destroying media.
Incineration, pulverization, and degaussing.
What is the standard method for media sanitizing?
overwriting.
The basic type of overwriting is called zero filling, it does one pass of 0’s then all 1’s then one or more additional passes in a random pattern.
What is Secure erase? (SE)
Method of sanitizing a drive using the ATA command set.
This command can be invoked using a drive/array utility or the hdparm Linux utility. On HDDs, this performs a single pass of zero-filling.
What is a SED?
Self Encrypting Device
What is Instant Secure Erase? (ISE)
Used on HDD and SSD that are self encrypting.
All data on the drive is encrypted using a MEK(media encryption key).
When the erase command is issued the MEK is erased, rendering the data unrecoverable.
What are commonly used physical network diagrams?
Cable Maps: aka floor plan, show how wires are routed through conduit from telecommunications closets to work areas. Also documents wall port locations and cable runs in an office.
Port location diagram: Identifies how wall ports located in work areas are connected back to ports in a distribution frame or patch panel and then from the patch panel ports to the switch ports.
Wiring Diagram: aka pin out shows detailed information about the termination of twisted pairs in an RJ45 jack or Insulation Displacement Connector (IDC) and how fiber strands are documented.
Rack Diagrams: records the position of each appliance in the rack. Also records service tags, port IDs, and links, identifying which power outlets on the uninterruptible power supply (UPS) connect to which appliance power supply units (PSU)s.
How should you make a logical network diagram?
With a schematic.
When making a schematic don’t try to represent too much information in a single diagram.
ex. create separate diagrams for the PHY, Data Link, and Logical (IP) layers
Physical layer-Asset IDs, cable links, and wall/patch panel/switch port IDs. You can use color-coding or line styles to represent the cable type
Data Link-Shows interconnections between switches and routers, with asset IDs (or the management IP of the appliance), interface IDs, and link-layer protocol and bandwidth.
Logical IP-IP addresses of router interfaces (plus any other static IP assignments) and firewalls, plus links showing the IP network ID and netmask, VLAN ID (if used), and DHCP scopes.
Application- Server instances and TCP/UDP ports in use, configuration info and performance baseline
Schematics can either be drawn manually using a tool such as Microsoft Visio
What is IPAM?
IP address management.
Software consolidating management of multiple DHCP and DNS services to provide oversight into IP address allocation across an enterprise network.
IPAM software can often be used to manage and reconfigure DHCP and DNS servers remotely.
What are common agreements?
SLA (Service Level Agreements): a contractual agreement setting out the detailed terms under which an ongoing service is provided. Defines aspects of the service, such as scope, performance characteristics, and responsibilities that are agreed upon between the service provider and the customer.
NDA (Nondisclosure Agreement): The legal basis for protecting information assets. Defines what uses of sensitive data are permitted, what storage and distribution restrictions must be enforced, and what penalties will be incurred by breaches of the agreement.
MOU (Memorandum of Understanding): A preliminary or exploratory agreement to express an intent to work together. Intended to be relatively informal and not to act as binding contracts. However, MOUs almost always have clauses stating that the parties shall respect confidentiality.