Detailed network auditing is
recommended to everyone who manages a network. Network auditing must include
examination of the networks, software, systems, procedures and employee
training. The parameters like hardware configuration, settings and software’s
installed on the network have a great influence on the network performance. Network
depends not only on the infrastructure, but also on the devices connected to
the network and so it’s important to know the configuration of each device
connected to the network before the creation of network audit. The auditor’s
only job during network auditing is to note the errors and deficiencies.
A good checklist must include ISP Modem, network
switch, battery backup, firewall, grade of cabling, wireless security, a
circuit, sustained ping and bandwidth test, DHCP authority, DNS authority and
WAN IP. The auditor should run tests or checks on each of the above items to
complete a basic network diagnostic audit. It should include detailed
information about the routers and switches including its model, serial number,
location, configuration, routing protocols in use, spanning tree information
for switches, ARP table, CAM table, passwords, memory and CPU utilization. Including
these items in the checklist can ensure a successful network audit.
A
good Network Audit check list should contain:
- A graphical representation of network topology and its physical infrastructure helps to understand the network in a better way.
- The network addresses and names should be assigned in a structured manner and it should be well documented. Planning a good naming convention can make the work easy.
- Network cabling should follow structured cabling in-order to prevent wastage of time in tracking cables in the future.
- There are many free-ware and open-source tools available for monitoring the network availability. MRTG, Zenoss or NAGIOS are some examples.
- Good password policy is necessary for basic network security. Maintain a database of all database and other credentials at a secure location. Firewall configuration settings should be inspected. A hole in the firewall may be opened for any specific task, but may be no longer needed which if not closed can create security problems.
- Details of each device in the network should include the details like location, city, address, building, floor, wiring closet, rack, slot-in-rack, etc. as detailed as possible.
- Set access control device in place and specify who can access what to improve the security of the physical place.
- To detect security breaches quickly, event logs should be monitored continuously. Software tools are available to correlate events from multiple devices, to a single management station, which makes it easier to spot the dangerous events.
- The employees should be trained to identify and avoid security attacks like phishing attempts and they should be trained to perform their roles well. Improper configuration changes done by an untrained employee may bring down the entire network.
- Documenting the charges for each WAN circuit helps in designing the traffic routing policies. The most utilized one should be the most paid circuit.
Creation of a network audit checklist is an easy way
to simplify the auditing process. A network manager should be aware of factors
like network layout, inventory, top customers, traffic pattern of his network,
etc. It can not only make the troubleshooting easy, but can also reduce the
average time to repair to a great extent. Finally consider the other aspects
also during the audit process. Identifying the problems like inadequate energy
usage, back up facilities and other inefficiencies provide a way to improve the
performance of the network.
No comments:
Post a Comment