Configuration Management And Security Management

2260 Words5 Pages

One of the keys to a secure network is to implement proper Network Management. Network Manage encompasses five domains. Those five domains are known as configuration management, accounting management performance management, fault management and security management. Utilizing these concepts is paramount for maintaining a secure network. Configuration management is the process of obtaining data from the network and using that data to manage the setup of all managed devices. The goal is to monitor network and system configurations so that the effects on network operations can be tracked and managed. In order to accomplish this function you must first gather network data. Once the data is gathered it must be used. Finally, all of this data must be stored. The data gathered for configuration management will identify in detail the total configuration such as the hardware, firmware and software that is being implemented on the network. This data can be collected manually or automatically. The manual method can be very time consuming, however during initial network setup this may be the only option. Gather data automatically via a software program would be the preferred method once a network is in place. Regardless of which method is used, enough network information needs to be gathered in order for it to be useful. Using the data collected in order to make or recommend changes to the network is the next step. All networks will need existing hardware to be upgraded at some point. New hardware will be purchased, obsolete hardware will be replaced and modern equipment will need to be installed. This goes the same with software and the inherent vulnerabilities in them. This is where the hard work of gathering the data pays off. This dat... ... middle of paper ... ...de traffic flow control. You can also use ACLs to decide which types of traffic are forwarded or blocked at the router interfaces. But one of the most important reasons to configure ACLs is to provide security for your network. The final step in security management is maintaining secure access points. Keeping the security measures up to date is a formidable task. The job requires a large amount of time and resources - yet it is essential. The key to preserving network security is finding both potential and actual security breaches. In conclusion, configuration, accounting, performance, fault and security management are a good baseline for maintaining and securing your network. These methods can help find loopholes, but no technique can guarantee security. The job of maintaining a secure network falls primarily on the people in the organization.

More about Configuration Management And Security Management

Open Document