SlideShare a Scribd company logo
Supporting
configuration
management II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Backups.
– Bring your own device.
PACE-IT.
Page 4
Supporting configuration management II.
Page 5
Backups are an essential
part of any configuration
management (CM) system.
Small changes in a network device’s configuration can introduce
unexpected consequences into the network. In addition, there is
always the possibility of a failure of a key component, which can
lead to the loss of data or functionality.
Backups play a key role in recovering from unexpected
consequences or from the failure of a component. Backup
schedules must be implemented and periodic tests should be
conducted to ensure that the backup process is working.
Supporting configuration management II.
Page 6
– Types of backups.
» Full: all data on the targeted system is backed up.
• Slowest backup method with the highest storage
requirements, but leads to the fastest recovery method.
• Recovery only requires the full backup file.
» Incremental: only the new or modified files are backed
up.
• Fastest backup method with the lowest storage
requirements, but leads to the slowest recovery
method.
• Recovery requires the last full backup file and all of the
incremental backup files.
» Differential: only data that has changed since the last
full backup is saved.
• Time to backup is moderate, requires a moderate
amount of storage, but also is the middle ground on the
length of time for recovery.
• Recovery requires the last full backup file and the last
differential backup file.
Supporting configuration management II.
Page 7
The configuration files of a
network device should also
be backed up.
Once a network device (e.g., a router or switch) has
been configured and is operating as expected, a
backup of the configuration files and operating
system should be done.
This helps to speed up the recovery time in cases of
equipment failure or when a change to the
configuration has introduced unexpected
consequences.
Supporting configuration management II.
Page 8
Supporting configuration management II.
Page 9
Bring your own device
(BYOD) policies allow
employees to use their
personal devices on an
organization’s network.
While the employees are happy that they get to use their favorite
IT devices on the corporate network, IT departments aren’t quite
as happy about it, as they have to deal with any consequences.
IT departments are tasked with keeping a network safe, yet they
have very little control over the devices that employees bring in.
In some cases, BYOD policies have led to the introduction of
malware into an organization’s network environment.
Network Admission Control (NAC) has been implemented in an
effort to reduce the risks associated with BYOD policies and to
introduce CM to those devices.
Supporting configuration management II.
Page 10
– NAC (Network Admission Control).
» NAC is a Cisco process; Microsoft uses Network Access
Protection (NAP).
• The names may be different, but the functions are similar.
» Includes more than just authenticating users and devices on
the network.
» All devices requesting access to network resources are
screened for:
• Type of device.
• Operating system used, including updates.
• Security software, including updates.
• Presence of malware.
• Other security vulnerabilities.
» In some cases, if the connection request has been rejected, the
device is redirected to a remediation server, which attempts to
resolve the known issue.
Supporting configuration management II.
Page 11
Supporting configuration management II.
Backups play an important role in any CM system. Backups are used to
recover from failed system components or loss of data. Backups may be
full, incremental, or differential in nature. Each has its own advantages and
disadvantages. Network devices should have their operating systems and
configuration files backed up as well.
Topic
Backups.
Summary
BYOD allows employees to bring in and use their favorite devices on an
organization’s network. Since IT departments are responsible for the IT
security of networks, this has led to some concerns. NAC is implemented in
order to help ensure that BYOD policies do not introduce problems to the
network. NAC screens devices for their suitability to join and use network
resources.
Bring your own device.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Applying Patches and Upgrades
PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
PACE-IT: Supporting Configuration Management (part 1)
PPTX
PACE-IT: Analyzing Monitoring Reports
PPTX
PACE-IT: Configuring Switches (part 1)
PPTX
PACE-IT: Wireless LAN Infrastructure (part 2)
PPTX
PACE-IT: Configuring Switches (part 2)
PPTX
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Applying Patches and Upgrades
PACE-IT: The Importance of Network Segmentation
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Analyzing Monitoring Reports
PACE-IT: Configuring Switches (part 1)
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Configuring Switches (part 2)
PACE-IT: Network Monitoring (part 2) - N10 006

What's hot (20)

PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
PACE-IT: Network Monitoring (part 1) - N10 006
PPTX
PACE-IT: Wireless LAN Infrastructure (part 1)
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 1)
PPTX
PACE-IT: Virtualization Technology - N10 006
PPTX
PACE-IT: Network Hardening Techniques (part 2)
PPTX
PACE-IT: Network Hardening Techniques (part 3)
PPTX
PACE-IT: Network Hardening Techniques (part 1)
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 2)
PPTX
PACE-IT: Troubleshooting Connectivity With Utilities
PPTX
Pace IT - Client Networking (Part 3)
PPTX
Pace IT - Client Networking (Part 2)
PPTX
Pace IT - Client Networking (Part 1)
PPTX
Pace it troubleshooting-common_network_issues_bf
PPTX
PACE-IT: Network Troubleshooting Methodology
PPTX
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PPTX
PACE-IT: Troubleshooting Connectivity With Hardware
PPTX
Pace IT - Control Panel (Part 1)
PACE-IT: Firewall Basics
PACE-IT: Common WAN Components and Issues
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Common Network Vulnerabilities
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Virtualization Technology - N10 006
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Connectivity With Utilities
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 1)
Pace it troubleshooting-common_network_issues_bf
PACE-IT: Network Troubleshooting Methodology
PACE-IT: Troubleshooting Copper Wire Networks (part 2)
PACE-IT: Troubleshooting Connectivity With Hardware
Pace IT - Control Panel (Part 1)
Ad

Viewers also liked (16)

PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
PACE-IT: Troubleshooting Common Network Issues
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Basics of Change Management
PPTX
PACE-IT: Security Policies and Other Documents
PPTX
PACE-IT: Special IP Networking Concepts - N10 006
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT: Introduction to Safety Practices (part 2)
PPTX
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PPTX
PACE-IT: Network Cabling (part 3) - N10 006
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT: Network Topologies - N10 006
PPTX
PACE-IT: Common Networking Potocols (part 1)
PPTX
PACE-IT: Rack and Power Management
PACE-IT: Risk and Security Related Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT: Troubleshooting Common Network Issues
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT: Physical Network Security Control
PACE-IT: Basics of Change Management
PACE-IT: Security Policies and Other Documents
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Common Network Security Issues
PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT: Network Topologies - N10 006
PACE-IT: Common Networking Potocols (part 1)
PACE-IT: Rack and Power Management
Ad

Similar to PACE-IT: Supporting Configuration Management (part 2) (20)

PPTX
Pace IT - Install and Configure OS (Part 2)
PPTX
Pace IT - Control Panel (Part 2)
PPTX
Pace IT - Admin Tools (Part 1)
PPTX
Pace IT - Control Panel (Part 3)
PPTX
Pace IT - Network Devices (part 2)
PPTX
Pace IT - Maintenance Procedures Best Practices
PPTX
Pace IT - Install and Configure OS (Part 1)
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT: Securing the Workstation
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPT
I Stor School Backup Solutions Presentation Full
PDF
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
PDF
RP_Patch_Management_S508C.pdf
PPTX
Pace IT - Basic OS Security Settings (Part 2)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PDF
Module 4 disaster recovery student slides ver 1.0
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
Pace IT - Admin Tools (Part 2)
DOCX
Dave Ford Resume
Pace IT - Install and Configure OS (Part 2)
Pace IT - Control Panel (Part 2)
Pace IT - Admin Tools (Part 1)
Pace IT - Control Panel (Part 3)
Pace IT - Network Devices (part 2)
Pace IT - Maintenance Procedures Best Practices
Pace IT - Install and Configure OS (Part 1)
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT: Securing the Workstation
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
I Stor School Backup Solutions Presentation Full
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
RP_Patch_Management_S508C.pdf
Pace IT - Basic OS Security Settings (Part 2)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Module 4 disaster recovery student slides ver 1.0
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT - Admin Tools (Part 2)
Dave Ford Resume

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
GDM (1) (1).pptx small presentation for students
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
Basic Mud Logging Guide for educational purpose
GDM (1) (1).pptx small presentation for students
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
human mycosis Human fungal infections are called human mycosis..pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pharma ospi slides which help in ospi learning
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O7-L3 Supply Chain Operations - ICLT Program
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPH.pptx obstetrics and gynecology in nursing

PACE-IT: Supporting Configuration Management (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Backups. – Bring your own device. PACE-IT.
  • 5. Page 5 Backups are an essential part of any configuration management (CM) system. Small changes in a network device’s configuration can introduce unexpected consequences into the network. In addition, there is always the possibility of a failure of a key component, which can lead to the loss of data or functionality. Backups play a key role in recovering from unexpected consequences or from the failure of a component. Backup schedules must be implemented and periodic tests should be conducted to ensure that the backup process is working. Supporting configuration management II.
  • 6. Page 6 – Types of backups. » Full: all data on the targeted system is backed up. • Slowest backup method with the highest storage requirements, but leads to the fastest recovery method. • Recovery only requires the full backup file. » Incremental: only the new or modified files are backed up. • Fastest backup method with the lowest storage requirements, but leads to the slowest recovery method. • Recovery requires the last full backup file and all of the incremental backup files. » Differential: only data that has changed since the last full backup is saved. • Time to backup is moderate, requires a moderate amount of storage, but also is the middle ground on the length of time for recovery. • Recovery requires the last full backup file and the last differential backup file. Supporting configuration management II.
  • 7. Page 7 The configuration files of a network device should also be backed up. Once a network device (e.g., a router or switch) has been configured and is operating as expected, a backup of the configuration files and operating system should be done. This helps to speed up the recovery time in cases of equipment failure or when a change to the configuration has introduced unexpected consequences. Supporting configuration management II.
  • 9. Page 9 Bring your own device (BYOD) policies allow employees to use their personal devices on an organization’s network. While the employees are happy that they get to use their favorite IT devices on the corporate network, IT departments aren’t quite as happy about it, as they have to deal with any consequences. IT departments are tasked with keeping a network safe, yet they have very little control over the devices that employees bring in. In some cases, BYOD policies have led to the introduction of malware into an organization’s network environment. Network Admission Control (NAC) has been implemented in an effort to reduce the risks associated with BYOD policies and to introduce CM to those devices. Supporting configuration management II.
  • 10. Page 10 – NAC (Network Admission Control). » NAC is a Cisco process; Microsoft uses Network Access Protection (NAP). • The names may be different, but the functions are similar. » Includes more than just authenticating users and devices on the network. » All devices requesting access to network resources are screened for: • Type of device. • Operating system used, including updates. • Security software, including updates. • Presence of malware. • Other security vulnerabilities. » In some cases, if the connection request has been rejected, the device is redirected to a remediation server, which attempts to resolve the known issue. Supporting configuration management II.
  • 11. Page 11 Supporting configuration management II. Backups play an important role in any CM system. Backups are used to recover from failed system components or loss of data. Backups may be full, incremental, or differential in nature. Each has its own advantages and disadvantages. Network devices should have their operating systems and configuration files backed up as well. Topic Backups. Summary BYOD allows employees to bring in and use their favorite devices on an organization’s network. Since IT departments are responsible for the IT security of networks, this has led to some concerns. NAC is implemented in order to help ensure that BYOD policies do not introduce problems to the network. NAC screens devices for their suitability to join and use network resources. Bring your own device.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.