What is to be ocumented

Benefits of Network Documentation
Faster troubleshooting
Good documentation reduces the need to research solutions to the same problem each time the problem arises.
A visual diagram can help identify potential problem areas in a more timely manner.
Reduced information loss
Prevents loss of important network information when employees leave the organization, making the transition period less painful.
Easier task sharing
Network administrators can successfully delegate network responsibilities because important information is available in written form.
Improved network design
A current network diagram is a key element in any design process.
What is the GREATEST benefit to you?
Complete up-to-date network documentation will save you TIME!
How much information do I need to include?
Theoretically
A good rule of thumb is to include everything you would need to rebuild your ENTIRE network from scratch.
Realistically
The amount and depth of your documentation will vary depending on the complexity of your network and the resources you have to create/collect the documentation.
Building /floor diagram
Floor layout and ports mapped to racer panel for easily manage or monitor particular systems
Physical network diagram
A complete network connection and devices shows easily to understand. Cable from ISP and connected to which router, which switch etc. And show Important servers connected in which port of which switch.
Logical network diagram

The logical network diagram deals with IP address information .Provides detailed information on how traffic routed from device to another logically.
Hardware information
List hardware information for each network device and endpoint. Make/model Serial number Number of ports MAC address ( if need to monitor) Type of connection (RJ45/OF)
Configuration information
Documenting the configuration information is more critical for some of the OS HAL. Once the hardware fails, replace with the other and can easily configure with documents. Document configuration information for each device.

Print off hard copies of configuration files.

Keep copies on floppy disk or another server.

Document specific software configurations.
Topology information
What topology used(star, bus, Token ring and Ethernet or wireless)
Protocol information

TCP/IP – ranges used

IPX/SPX – network numbers

AppleTalk – zone information
DNS information
Registered DNS, registered with whom and IP information .Management IP, username, password and contact details
Mail server information
Registered Hostname, registered with whom and IP information. If it is hosted outside Management IP, username, password and contact details.
Web server information
Registered Hostname, registered with whom and IP information. If it is hosted outside Management IP, username, password and contact details.

Domain controller information
NetBIOS, dns name and IP address .Roles handling and Administration details.
Other server information
NetBIOS, dns name and IP address .Roles handling and Administration details. In which Department and who handling server etc.
Password information
All the server, router, switches and desktop password in softcopy as well as hard copy in secure place.
Network administration information

Contact details for outsourced or administrators on the Network (LAN and WAN)

Hardware and Software vendor information

License information for software

Maintenance contracts
Device log sheets
Router logs, switch logs, DC logs, Server logs. Patches/configuration changes logs.
Procedure documentation
Configuring Application/software information’s. Details about user/machine creations .Details about administration site details. Usage of monitoring /helpdesk tools. Printer configurations on different platform. How to trouble shoot etc.
Network utilization reports
Utilizations of protocol status .Band width utilizations. Download utilizations etc.
Usage policy
Is the written policy (or you can put this in your intranet) that outlines the terms and conditions for Network use, Email ethicates, Web usages etc . It defines what is considered acceptable use and also the penalties for rule violations.
Security policy

Copy of Security Policy (make hard copy and sealed ,keep in fire proof safes)

Who has access to password information(some one want it very urgently broke the seal and sign it )

Procedures for reporting a Security Incident.(shows the hierarchy)

Advertisements

Posted on April 9, 2011, in General, Uncategorized. Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: