One of the keys to a secure network is implementing proper network management. Network management includes five domains. These five domains are known as configuration management, accounting management performance management, error management and security management. Using these concepts is critical to maintaining a secure network. Configuration management is the process of obtaining data from the network and using it to manage the configuration of all managed devices. The goal is to monitor network and system configurations so that effects on network operations can be tracked and managed. To perform this function you must first collect network data. Once collected, the data must be used. Finally, all this data must be archived. The data collected for configuration management will identify in detail the total configuration such as hardware, firmware and software that is deployed on the network. This data can be collected manually or automatically. The manual method can be time consuming, however during initial network setup this may be the only option. Collecting data automatically via a software program would be the preferred method once a network is established. Regardless of which method you use, you need to gather enough network information for it to be useful. The next step is to use the data collected to make or recommend changes to the network. At some point, all networks will need to upgrade their existing hardware. New hardware will be purchased, obsolete hardware will be replaced, and modern equipment will need to be installed. The same goes for software and the vulnerabilities inherent in it. This is where the hard work of data collection pays off. This data... middle of the paper... traffic flow control. You can also use ACLs to decide what types of traffic are forwarded or blocked on router interfaces. But one of the most important reasons to configure ACLs is to ensure network security. The final step in managing security is maintaining secure access points. Keeping security measures up to date is a daunting task. The work requires a large amount of time and resources, but it is essential. The key to maintaining network security is to identify both potential and actual security breaches. In conclusion, configuration, accounting, performance, failure and security management are a good basis for maintaining and protecting the network. These methods can help find loopholes, but no technique can guarantee safety. The task of maintaining a secure network falls primarily on the people in the organization.
tags