cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
763
Views
14
Helpful
15
Replies

Netwrok administration

kokbeng.lim
Level 1
Level 1

I have completed my computer science study and got a job as network administration in an big education institution. I am inexperience and new in this role. What should I check when doing the taking over procedure and what should

I ask beside the Lan documentation, cabling plan and physical diagrams.

Thanks.

15 Replies 15

mohammedmahmoud
Level 11
Level 11

Hi,

Beside what you've said, you should get all configurations, IP addressing schema, passwords, and most importantly contact numbers for all your vendors and integrators that your company deals with.

Plus you have to take all that you can from the engineer that you are replacing maninly experience and common known problems.

HTH, please do rate all helpful replies,

Mohammed Mahmoud.

Thanks. Do you mean configuration and passwords for the routers and switches? Also I think this sounds silly but I just cant figure which is the main router given the Lan diagram shows there is

3 routers in MPLS network?

Hi,

Yes i mean routers and switches configuration and passwords.

MPLS VPN provides full-mesh connectivity (the 3 routers are connected to the provider network and they can see each other simultaneously through the provider cloud), thus there is no hub and spoke like with FR.

Good Luck in your handover :)

HTH, please do rate all helpful replies using the scroll box on the right,

Mohammed Mahmoud.

Hi, can you provide me example like what will i see in the router running config in term of IP address being assigned at the interfaces? Do they contain internal and public IP addresses in MPLS network? Thanks.

Hi,

There are no extra MPLS VPN configuration on the CE side (your side), the CE router is not MPLS aware (it doesn't do label switching, it just do routing).

Accordingly the configuration on your side will just be a layer 2 configuration (FR, ATM or Ethernet), plus an IP address (most probably /30), this address is peering with the provider edge PE router that your CE is connected to. Each CE router of yours peers with a PE router on the provider side, and then the provider is responsible for label switching your traffic between your CEs.

I hope that i've been informative, please don't hesitate for any further questions.

HTH, please do rate all helpful replies,

Mohammed Mahmoud.

I think the router is not layer 2 config as in the Lan doc it mentioned OSPF routing protocol is used. Also how i know which of the routers is

connected out to Internet? Lastly why public address ie 10.1.x.x is use in my secondary Wins server? Thank you for your time.

Hi,

I didn't say that it would be layer 2 only i said "Accordingly the configuration on your side will just be a layer 2 configuration (FR, ATM or Ethernet), plus an IP address (most probably /30), this address is peering with the provider edge PE router that your CE is connected to"

And since there will be IP addresses between your CE routers and the provider PE routers, routing will be required, which can be done via static routing or dynamic routing (RIP, EIGRP, OSPF or BGP - But not ISIS), which is in your case OSPF.

To know your internet router, it is the router having Public IPs (another range other than 192.168.0.0 - 192.168.255.255, 172.16.0.0 - 172.31.255.255 or 10.0.0.0 - 10.255.255.255 - Which are all private IPs).

HTH, please do rate all helpful replies,

Mohammed Mahmoud.

I understand your points and thanks for the example. Does an organization allow to have

two ranges of Ip such as 192.168.0.0 and 10.0.0.0 which what I think my company is using?

Hi,

These ranges are private ip addresses, you can freely use all that you need from them:

192.168.0.0 - 192.168.255.255

172.16.0.0 - 172.31.255.255

10.0.0.0 - 10.255.255.255

HTH, please do rate all the helpful replies,

Mohammed Mahmoud.

Hi,

Pls explain how to interpret the sentence "an Ip address (most probably /30).

Thanks!

Hi,

Pls find the below table for details.

Class A

Number of

Bits Borrowed Subnet Effective Number of Number of Subnet

from Host Portion Mask Subnets Hosts/Subnet Mask Bits

------- --------------- --------- ------------- -------------

1 255.128.0.0 2 8388606 /9

2 255.192.0.0 4 4194302 /10

3 255.224.0.0 8 2097150 /11

4 255.240.0.0 16 1048574 /12

5 255.248.0.0 32 524286 /13

6 255.252.0.0 64 262142 /14

7 255.254.0.0 128 131070 /15

8 255.255.0.0 256 65534 /16

9 255.255.128.0 512 32766 /17

10 255.255.192.0 1024 16382 /18

11 255.255.224.0 2048 8190 /19

12 255.255.240.0 4096 4094 /20

13 255.255.248.0 8192 2046 /21

14 255.255.252.0 16384 1022 /22

15 255.255.254.0 32768 510 /23

16 255.255.255.0 65536 254 /24

17 255.255.255.128 131072 126 /25

18 255.255.255.192 262144 62 /26

19 255.255.255.224 524288 30 /27

20 255.255.255.240 1048576 14 /28

21 255.255.255.248 2097152 6 /29

22 255.255.255.252 4194304 2 /30

23 255.255.255.254 8388608 2* /

Class B Subnet Effective Effective Number of Subnet

Bits Mask Subnets Hosts Mask Bits

------- --------------- --------- --------- -------------

1 255.255.128.0 2 32766 /17

2 255.255.192.0 4 16382 /18

3 255.255.224.0 8 8190 /19

4 255.255.240.0 16 4094 /20

5 255.255.248.0 32 2046 /21

6 255.255.252.0 64 1022 /22

7 255.255.254.0 128 510 /23

8 255.255.255.0 256 254 /24

9 255.255.255.128 512 126 /25

10 255.255.255.192 1024 62 /26

11 255.255.255.224 2048 30 /27

12 255.255.255.240 4096 14 /28

13 255.255.255.248 8192 6 /29

14 255.255.255.252 16384 2 /30

15 255.255.255.254 32768 2* /31Class C Host/Subnet Table

Class C Subnet Effective Effective Number of Subnet

Bits Mask Subnets Hosts Mask Bits

------- --------------- --------- --------- --------------

1 255.255.255.128 2 126 /25

2 255.255.255.192 4 62 /26

3 255.255.255.224 8 30 /27

4 255.255.255.240 16 14 /28

5 255.255.255.248 32 6 /29

6 255.255.255.252 64 2 /30

7 255.255.255.254 128 2* /31

Benoy PC

Hi,

As you know the /30 address has 2 usable host IPs, accordingly it is most commonly used in Point-to-point connectivity (router infront of router with a point-to-point interface/subinterface) where only 2 host IPs are required, which is the case of a PE to CE connectivity (Point-to-Point).

Example:

R1(192.168.10.1/30)<-->R2(192.168.10.2/30).

HTH, please do rate all helpful replies,

Mohammed Mahmoud.

Hi,

how about this:

255.255.255.240 16 14 /28

Does this means i have 14 usable host IPs?

What does 16 stands for?

1 area i dun get it is why my network got different subnet masks, example:

255.255.255.0

255.255.255.240

255.255.255.252

255.255.255.192

Thank you.

Hi,

/28 means 16 IP addresses, where 14 of them are usable and the other 2 are not usable as host IPs, the first is the Subnet ID (all zeros) and the second is subnet broadcast address (all ones).

NOTE: All zeros and all ones, means that we have the host bits all either zeros or ones.

As for the second question, using different subnet masks in a network is simply called VLSM.

Variable Length Subnet Mask (VLSM):

A means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule, in order for good utilization of the address space.

With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts.

To use VLSM the routing protocol used must support VLSM (classless routing protocol).

HTH, please do rate all helpful replies,

Mohammed Mahmoud.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card