Conduct a Physical Inventory Audit


The first step in a network audit is to identify physical network assets. The audit provides a nice side benefit because you can collect the device asset information. If your company requires the collection and reporting of asset information, you'll be able to do both with the same effort.

A physical inventory audit consists of the following:

  • Documenting the wiring closet locations

  • Documenting the wiring

  • Documenting the network devices

  • Documenting the servers

  • Documenting the key users

Where Are Your Wiring Closets?

It's 2 a.m. and the network is down; do you know where your wiring closets are? Surprisingly, some enterprises would have to answer "no" to this question.

You must document the location of each wiring closet, lab, and raised floor area in which cabling terminates and network devices are located. This is an important step in documenting the network because knowing where the wiring closets are helps you determine where connections terminate. The documentation of wiring closets will become invaluable when fighting network problems and trying to isolate the source of a problem.

You should document the location of each wiring closet in two ways. First, develop and maintain a list of wiring closets that contains the following information about each location:

  • Building, floor, and location

  • Name of wiring closet

  • Key or badge type of access

  • Description of purpose (for example, server room, floor 2 wiring, or development test lab)

Second, obtain building engineering documents and mark up the wiring closet locations. By visually representing the wiring closets, such documents aid you in understanding the relationship of the wiring closets to each other.

TIP

Scan the plans or save them with a CAD system as JPEG files and put them on a secured website. Link them together so that a person can drill down. Starting with a map of the various corporate sites, drill down to a location, then a building, then a floor and up pops the appropriate floor plans with the wiring closets highlighted. This procedure can help your operators or anyone else needing access to the wiring closets to quickly drill down and determine the location.


If you are not sure where each of the wiring closets are, this is a perfect opportunity to hunt them down and understand what state of disrepair they may be in. If you end up visiting each of the wiring closets in order to verify their location and purpose, use the opportunity to answer the question raised in the following section.

NOTE

While you're out inventorying the wiring closet, make sure you lock them down. It becomes an impossible task to maintain good documentation and integrity with the network when multiple groups of people with possible conflicts of interest have access to the wiring closet.

If someone walks in and moves cables around or switches off a device, you may be ultimately held responsible for their actions.


Where Are Your Wires?

You've got wiring closets spread all over the campus, perhaps all over the world. Fiber between floors, service provider demarcations, cables running under a bridge, copper running between wiring closets all of these become indistinguishable when you are sitting in a wiring closet or computer center trying to isolate a problem. You must have and maintain accurate schematics of wiring termination and purpose.

The main purpose of a cabling audit is to ensure that connections run where you think they run. This is important when documenting the logical connections.

The easiest method to track connections is by implementing an organized labeling system in the wiring closet by labeling both ends of a cable with the same label. The label should clearly identify the source, destination, and purpose of the cable. Thus, when looking at a cable or a wiring rack, you can clearly understand the purpose and termination of the cable.

Select a Wiring System that Fits with Your Organizational Needs

There are plenty of vendors who offer organized wiring systems. The goal is to purchase racks that make it easy to snake wires to their connection points and contain labels identifying the wire's purpose or destination at the other end.

Rack systems provide multiple color labeling and connectors, allowing you to color-code the type of connection. For example, you may designate blue to represent servers, red to represent wiring closet connections, yellow to represent user connections, and so on. Using the colored wires that match the colored connectors allows for easy identification of a wiring mistake.

A poorly maintained wiring closet makes troubleshooting become more complicated than it need be. In Figure 1-1, cables are going everywhere (including on the floor), making it very easy to introduce more problems during troubleshooting.

Figure 1-1. An Example of a Bad Wiring Closet

graphics/01fig01.jpg

Too frequently, network administrators have been shocked to find out that a connection is not what it seems. For example, what they thought was a connection to a new server was actually a redundant link to a switch that happens to have spanning tree turned off. The result: a bridging loop that may cripple the network.

There are standards for organizing wiring and wiring closets, such as structured tested cabling and wiring closet locations. You should review these standards and stick with those that work with you.

Finally, be sure to keep your wiring closets organized. The identification systems in place (such as color-coding) do no good if patch cables are hanging all over the place. Motivate the operators to keep clean wiring closets with cables tucked away properly and everything labeled appropriately. This will greatly simplify the identification of connections while troubleshooting problems.

If you haven't tracked physical connections or feel that the current documentation method is out-of-date, you will need to audit each wiring closet and trace where the wiring goes. This can be a tedious process, especially if you have no idea of the state of the cabling.

TIP

If you have a third party managing your cable for you, be sure that they maintain the labeling as they make changes. Build incentives into their contract, which are based on the cleanliness and accuracy of the wiring closet.

In addition to cleanly running and maintaining cabling, they should remove cables that run nowhere that is, cables that once connected network devices that have been removed.


Figure 1-2 is an example of a typical floor wiring diagram.

Figure 1-2. Example of a Floor Wiring Diagram

graphics/01fig02.gif

This example represents a typical floor wiring diagram in which the source and destination of wiring is documented. Table 1-1 is used to document the wiring locations and terminations.

Table 1-1. Example of a Wiring Documentation Table
Building Name:    
Location of telecommunications closets:    
Location of cross-connect rooms and demarcations to external networks:    
Logical wiring topology (structured, star, bus, ring, centralized, distributed, mesh, tree, or whatever fits):    
Vertical Wiring:
  Coaxial Fiber STP Category 3 UTP Category 5 UTP Other
Vertical Shaft 1            
Vertical Shaft 2            
Vertical Shaft n            
Horizontal Wiring:
  Coaxial Fiber STP Category 3 UTP Category 5 UTP Other
Floor 1            
Floor 2            
Floor 3            
Floor n            
Work-Area Wiring:
  Coaxial Fiber STP Category 3 UTP Category 5 UTP Other
Floor 1            
Floor 2            
Floor 3            
Floor n            

Where Are Your Network Devices?

You've found and documented all of the wiring closets worldwide and implemented a well-documented wiring system with labels. Now, it's time to physically learn and document the location of the routers, switches, hubs, firewalls, and other network-related equipment that make up your network.

You should start by collecting and recording an inventory of the devices and their locations. At a minimum, you should track the following:

  • Device name

  • Device location

  • Device IP address (the IP address to manage the device by)

  • Person or group responsible for the device

Note that although manual tracking of information is quite common, you should consider automating the collection of device information and the association of that information with contact information. For instance, use a Layer 3 auto-discovery routine to generate the device list. Then, have a routine query each of the devices to obtain the MIB II sysContact and sysName variables to correlate the device name and contact name. The routine can then use the contact name to look up contact information (phone number, pager).

The final report would then include all information listed previously, but would be generated in an automated fashion. This will save time compared to the manual method as well as increase the chances that the documentation is up-to-date and accurate.

Table 1-2 is an example of a spreadsheet used to track network devices.

Table 1-2. Example of a Spreadsheet for Tracking Inventory
Device Name Device IP Address Device Location Contact Information
bb-rtr-01 10.50.50.1 Building 4 Adam Smith
      999-999-9999
    Floor 2  
      800 page-me1
    Rack 3 afrog@fake.edu
bb-rtr-02 10.50.50.2 Building 4 Adam Smith
      999-999-9999
    Floor 2  
      800-page-me1
    Rack 4 afrog@fake.edu
bb-sw-11 10.50.50.102 Building 4 Gina Jones
      999-999-8888
    Floor 2  
      800-page-me1
    Rack 4 jedi@fake.edu

In Table 1-2, the network manager chose to track the minimum amount of device information, as well as the device contact. Typically, the contact is the person who should be called when an incident involves the owned device.

Collecting Other Inventory Information

Inventory information, such as serial number, firmware revs, hardware revs, software and configuration, is extremely useful for the network management process.

Serial numbers are particularly relevant for tracking your assets and working with Cisco support. Unfortunately, some devices do not provide their serial numbers via SNMP (this is mainly because of the way the devices are manufactured). When this is the case, you can set the serial number via SNMP by entering the snmp-server chassis-id command and providing the serial number.

Some companies have to march through their wiring closets and server rooms every couple of years to document devices for asset tracking purposes. This usually involves verifying that each device has an asset tracking "brass tag" on it and that the equipment is where it was thought to be.

If this is your experience, you should consider purchasing or developing software that automates the collection of this information. Cisco and other vendors provide software that performs this function.

Where Are Your Servers?

Tracking the location of shared servers and how they are connected into the network is just as important as tracking network devices. Too often, when a user complains of slow response time, the server support teams point the finger at the network support team. By knowing how servers and key applications connect into the network, you will be able to determine definitively whether the source of a slow response problem, for example, is the network or a device connected to it.

Using the methods described in the previous sections, you should document where the servers are physically located and how they connect back to their associated switches or hubs. Server types include the following:

  • File and print servers

  • Mainframes

  • Network infrastructure servers such as DNS/DHCP servers

  • Corporate web servers

  • Any other shared devices that are considered critical to a particular operation

Table 1-3 illustrates a server tracking spreadsheet.

Table 1-3. Example of a Server Tracking Table
Device Name Device IP Address Device Location Switch Switch Port Contact Information
mail-02 10.29.30.2

Building 4

Floor 2

Rack 3

Ser-sw-01 4/2

Adam Smith

999-999-9999

800-page-me1

afrog@fake.edu

mail-03 10.29.30.3

Building 3

Floor 2

Rack 1

Ser-sw-01 5/2

Suzie Q

999-999-8888

800-page-me1

suzieq@fake.edu

dns-02 10.40.44.2

Building 3

Floor 2

Rack 1

ny-sw-07 2/7

Adam Smith

999-999-9999

800-page-me1

afrog@fake.edu

Documenting the servers, as shown in Table 1-3, is important when troubleshooting. It also makes a handy reference when performing administrative tasks on the servers.

You may consider working with the server administrators to develop a questionnaire that identifies relevant information concerning each server that would help to understand the server and its application's availability. Examples include the documentation of the following:

  • How the server is configured

  • What applications run on the server

  • What group or business unit owns the server

  • Preventive maintenance and backup schedules.

By documenting and keeping accurate the server information, your operations staff will be able to distinguish between planned maintenance and unplanned outages. The server administrators may never offer thanks, but you will impress them when your network documentation actually helps them do their job.

Where Are Your Key Users?

For larger organizations, it can become burdensome to track every network connection for every user. Each managed connection requires a bit more hard disk space and network bandwidth. Only those ports that are considered business-critical should be monitored. This avoids filling event logs with link-down messages when users turn their PCs off for the day. Additionally, monitoring that many ports will generate reams of data that will probably not be used and can complicate the reporting process.

Network performance and server access for a user or group of users can be inferred by measuring the availability and performance of the connecting network devices and servers involved. This conserves the amount of polling to the network devices (because information for every hub or switch port will not be generated) and considerably cuts down the amount of stored data to process.

However, from a management perspective, monitoring certain key users may still be important. It can be helpful to identify a single user out of a group in order to measure their network connectivity and performance. The information from the single user can then be used to infer performance for the rest of the group. For instance, you may choose to monitor the network port for named users from individual groups in order to use the port as a gauge for the availability of the network for the entire group.

It may also make political sense to monitor the ports of certain executives (or "mahogany row") to ensure that you catch performance problems before they occur. With both fault and performance monitoring, it is usually in the network manager's best interest to ensure that the boss's connection is running smoothly. This may seem sneaky or underhanded (it is), but it generally ensures that the executive's view of the network (and, therefore, your company's investment in the network) is as fast and clean as the network infrastructure. You do not want the VP of Sales who is responsible for your network's funding to call in a network down or performance problem with their connection.

You should never sacrifice the performance and availability of network services for a group of people in order to provide greater-than-ordinary access to an executive. Or as Spock once said, "The needs of the many outweigh the needs of the few or the one."

NOTE

Sometimes, catering too much to the executive level can backfire. It may be advantageous to have certain executives experience network problems, as felt by the majority users, in order to gain budget. If this is the case, let them feel your pain!




Performance and Fault Management
Performance and Fault Management: A Practical Guide to Effectively Managing Cisco Network Devices (Cisco Press Core Series)
ISBN: 1578701805
EAN: 2147483647
Year: 2005
Pages: 200

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net