Sunteți pe pagina 1din 16

CarNet

Network Documentation

Academies Australasia
Certificate IV
Network and Technical Documentation
Contents
Introduction................................................................................................................ 3
Purpose...................................................................................................................... 3
Network Diagram....................................................................................................... 4
Network Configuration................................................................................................ 6
Naming standards and labeling schemes...................................................................6
Client PCs IP addressing............................................................................................. 7
IP CALCULATION......................................................................................................... 7
Computer checklists for workstation..........................................................................7
Produce procedure and policy manuals......................................................................9
Acceptable use policy.............................................................................................. 9
Procedure for creating new users on the server....................................................11
Sample Sign-off form................................................................................................ 12
References................................................................................................................ 13

Page 2 of 16
Introduction

Network documentation shall be kept either in written form or electronic form in a minimum of
two places. It should be kept in two facilities at least two miles apart so that if one facility is
destroyed, information from the other facility may be used to help construct the IT infrastructure.
Information in both facilities should be updated monthly at the time of the documentation review

IT & Network Support

Name: Position: Phone: Email:


Jack Black IT Manager 04040201 jack.black@carnet.com.au
01
johanthan IT Support 04040201 jonathan@carnet.com.au
02
Peter Smith IT Support 04040201 peter.smith@carnet.com.au
03
James White IT Support 04040201 james.white@carnet.com.au
04

External IT & Network Support

Company: Client ID: Phone: Note:


Telstra 1372145 1300- Internet Services
8971281
Carbonite 9827182 1300- Cloud Backup Services
1277812
Microsoft 4514521 1300- Server & Client OS
2541552

Passwords

Due to security reasons, network documentation does not include the


systems passwords. Only the general manager and the IT manager have the
list of the passwords.

Page 3 of 16
Purpose
This policy is designed to provide for network stability by ensuring that network documentation
is complete and current. This policy should complement disaster management and recovery by
ensuring that documentation is available in the event that systems should need to be rebuilt. This
policy will help reduce troubleshooting time by ensuring that appropriate personnel are notified
when changes are made to the network.

Page 4 of 16
Network Diagram
CarNet Office Diagram

CarNet Network Diagram

Page 5 of 16
Rack server located in the IT room. It includes three servers, router, main switch
and wireless lan switch. Its locked with security lock.

Page 6 of 16
Page 7 of 16
Network Configuration

Naming standards and labeling schemes


One of the most important parts of the network documentation is naming and labeling. Giving
the identities to the device and cables reduce the response time sharply

Part of Name Description Examples

First 2 Type of device FS File Server


characters WS Work station
PR Printer
Next 2 Location IT IT Room
characters S1 Staff Room 1
Next 2 Department MA Management
characters SA Sales
IT IT
Following Depends upon item. For file servers and workstations WSSYSA01
characters there will be a 2-digit number. PRHOLJ01

Page 8 of 16
According the above table, CarNets labelling standards as follows:

Name Description Location Unique Name


Dell Win Server IT Room DSITIT01
Dell AD & File Server IT Room ADITIT01
IBM Intranet IT Room INITIT01
Router IT Room ROITIT01
Access Point Reception APREIT01
Workstation Reception WSRESA01
Workstation Staff Room 1 WSS1MA01
Workstation Staff Room 2 WSS2MA01

Client PCs IP addressing


Client Room IP
IT01 IT Room 192.168.10.21
IT02 IT Room 192.168.10.22
ST01 Staff Room I 192.168.10.23
ST02 Staff Room I 192.168.10.24
ST03 Staff Room II 192.168.10.25
ST04 Staff Room II 192.168.10.26
ST05 Staff Room III 192.168.10.27
ST06 Staff Room III 192.168.10.28
REC01 Reception 192.168.10.29
REC02 Reception 192.168.10.30

IP CALCULATION
Subnet mask: 255.255.255.0
Network: 192.168.10.0
1st 192. 168.10.1
Last 192. 168.10.254
broadcast 192.168.10.255

We need 16 subnets
2^4 = 16 meaning WE will use 4 Subnet bits, in other words WE will be borrowing 4 bits from
the host portion and adding them the the network portion.

Reverse those host bits. Our mask is 11111111.11111111.11111111.00000000 or /24 you borrow
4-bits from host (TOP DOWN). As you know "1's" identify the network ; 0's identify the host. So
the last octet is the only octet with host bits so you're borrowing FOUR of them changing it from

Page 9 of 16
00000000 to 11110000. Which equals 240 (128 + 64 + 32 + 16). * if you don't understand how to
convert binary to decimal form then you need to go back and learn that*

Our new mask is now 11111111.11111111.11111111.11110000 or /28; or 255.255.255.240


From that you can see that you have 4 host bits (number "0's" in your mask) so using the formula
2^b-2; the number of hosts each subnet can have is 2^4 - 2 which equals 14 USEABLE (b =
number of host bits)
Number of subnets using formula 2^b-2; your mask will give you (b = number of network/subnet
bits)....2^4 = 16 so you'll have 16 networks. (because you didn't add 2 in step 1 you don't need to
subtract 2)
Our needs 16 subnets each with 10 - 14 addresses; what this mask will give you 16 subnets each
with max of 14 usable address (16 total 1 for network 1 for broadcast). So this will work, thus
your answer is :

MASK can be written as: 255.255.255.240; or /28 ; or 11111111.11111111.11111111.11110000


First Four Subnet address are : (32 - 28 = 4, 2^4 = 16, your block size is 16)
1. 192.168.10.0 ~ range 192.168.10.1 - 192.168.10.14 ~ broadcast 192.168.10.15
2. 192.168.10.16 ~ range 192.168.10.17 - 192.168.10.30 ~ broadcast 192.168.10.31
3. 192.168.10.32 ~ range 192.168.10.33 - 192.168.10.46 ~ broadcast 192.168.10.47
4. 192.168.10.48 ~ range 192.168.10.49 - 192.168.10.62 ~broadcast 192.168.10.63

Computer checklists for workstation

Workstation Checklist
Made Dell Comments
Model Vostro NA
Computer Name IT01 NA
Domain/Workgroup Carnet.com.au NA
CPU Intel i5 2.4Ghz NA
RAM 4GB NA
HDD 500GB (2 partitions) NA
Programs & Add-ons Checked Unnecessary software uninstalled
Disk Health Checkdisk Performed %100 functional, no errors
Disk Fragmentation Defrag performed
Screen 17 Tested Functional
Operation System Windows 7 Pro SP1
Windows Update Status Update Performed Missing updates installed
Antivirus NA Need antivirus

Page 10 of 16
Antivirus Log Notes NA
Firewall Status Windows Firewall Need better protection
IP Information DHCP 192.168.10.35 NA
Office Version MS Office 2007 It may need upgrade
Critical Applications CarNet Software Need upgrade to be ready Win10
File Shares No shared files All files accessible from server
Backup Method NA All company documents and mails
stored in the servers with backup
Backup Status NA
Printers Network Printers Functional

Page 11 of 16
Produce procedure and policy manuals
Acceptable use policy

1 Overview
The purpose of this policy is to establish acceptable and unacceptable use of electronic devices
and network resources at CarNet in conjunction with its established culture of ethical and lawful
behavior, openness, trust, and integrity.

CarNet provides computer devices, networks, and other electronic information systems to meet
missions, goals, and initiatives and must manage them responsibly to maintain the
confidentiality, integrity, and availability of its information assets. This policy requires the users
of information assets to comply with company policies and protects the company against
damaging legal issues.

2 Scope
All employees, contractors, consultants, temporary and other workers at CarNet, including all
personnel affiliated with third parties must adhere to this policy. This policy applies to
information assets owned or leased by CarNet, or to devices that connect to a CarNet network or
reside at a CarNet site.

3 Policy Statement
3.1 You are responsible for exercising good judgment regarding appropriate use of CarNet
resources in accordance with CarNet policies, standards, and guidelines. CarNet resources may
not be used for any unlawful or prohibited purpose.
3.2 For security, compliance, and maintenance purposes, authorized personnel may monitor
and audit equipment, systems, and network traffic per the Audit Policy. Devices that interfere
with other devices or users on the CarNet network may be disconnected. Information Security
prohibits actively blocking authorized audit scans. Firewalls and other blocking technologies
must permit access to the scan sources.
3.3 You are responsible for the security of data, accounts, and systems under your control.
Keep passwords secure and do not share account or password information with anyone,
including other personnel, family, or friends. Providing access to another individual, either
deliberately or through failure to secure its access, is a violation of this policy.
3.4 You must ensure through legal or technical means that proprietary information remains
within the control of CarNet at all times. Conducting CarNet business that results in the storage
of proprietary information on personal or non- CarNet controlled environments, including
devices maintained by a third party with whom CarNet does not have a contractual agreement, is
prohibited. This specifically prohibits the use of an e-mail account that is not provided by

Page 12 of 16
CarNet, or its customer and partners, for company business.
3.5 You are responsible for ensuring the protection of assigned CarNet assets that includes
the use of computer cable locks and other security devices. Laptops left at CarNet overnight
must be properly secured or placed in a locked drawer or cabinet. Promptly report any theft of
CarNet assets to the Management.
3.6 All PCs, PDAs, laptops, and workstations must be secured with a password-protected
screensaver with the automatic activation feature set to 10 minutes or less. You must lock the
screen or log off when the device is unattended.

You are responsible for the security and appropriate use of CarNet network resources
under your control. Using CarNet resources for the following is strictly prohibited:
3.7 Causing a security breach to either CarNet or other network resources, including, but not
limited to, accessing data, servers, or accounts to which you are not authorized; circumventing
user authentication on any device; or sniffing network traffic.
3.8 Causing a disruption of service to either CarNet or other network resources, including,
but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and
forged routing information for malicious purposes.
3.9 Exporting or importing software, technical information, encryption software, or
technology in violation of international or regional export control laws
3.10 Intentionally introducing malicious code, including, but not limited to, viruses, worms,
Trojan horses, e-mail bombs, spyware, adware, and keyloggers.
3.11 Port scanning or security scanning on a production network unless authorized in advance
by Information Security.
The following are strictly prohibited:
3.12 Inappropriate use of communication vehicles and equipment, including, but not limited
to, supporting illegal activities, and procuring or transmitting material that violates CarNet
policies against harassment or the safeguarding of confidential or proprietary information.
3.13 Sending Spam via e-mail, text messages, pages, instant messages, voice mail, or other
forms of electronic communication.
3.14 Forging, misrepresenting, obscuring, suppressing, or replacing a user identity on any
electronic communication to mislead the recipient about the sender.
3.15 Posting the same or similar non-business-related messages to large numbers of Usenet
newsgroups (newsgroup spam).
3.16 Use of a CarNet e-mail or IP address to engage in conduct that violates CarNet policies or
guidelines. Posting to a public newsgroup, bulletin board, or listserv with a CarNet e-mail or IP
address represents CarNet to the public; therefore, you must exercise good judgment to avoid
misrepresenting or exceeding your authority in representing the opinion of the company.

4 Enforcement
An employee found to have violated this policy may be subject to disciplinary action, up to and

Page 13 of 16
including termination of employment. A violation of this policy by a temporary worker,
contractor or vendor may result in the termination of their contract or assignment with CarNet.

5 Revision History

Date of Change Responsible Summary of Change


05 Dec 2016 jonathan Policy created

Procedure for creating new users on the server

1. Get approval from management to add user to the Active Directory


2. Click Start, point to Programs, point to Administrative Tools, and then click Active
Directory Users and Computers.
3. In the Active Directory Users and Computers window, expand carnet.com.au
4. Right-click Users, point to New, and then click User.
5. In the New Object - User dialog box, define the first name and logon name
6. Click Next.
7. In the Password box, type a password for the account, and then in the Confirm password
box, type the password again.
8. Select User cannot change password and Password never expires, and then click Next.
9. Click Finish.
10. Add the user to the groups which it belongs

Page 14 of 16
Sample Sign-off form
Project Name: CarNet Network Improvement
Service Owner: Remote IT Solutions
Project Manager: Jack Black
Document Date: 10/01/2016

1. Project Summary
Start Date 12/01/2016 Finish Date 15/04/2016
Project Duration 3 Months

2. Project Goal
Improving the network infrastructure to cat 6e

3. Project Deliverables

4. Comments (If any)


1gbit is enough for the current structure but cat 6e recommended for possible future upgrades

5. Document Signatures
Name Description Signature Date
Service Owner Name mm/dd/yyyy

Project Manager
Name

Others (if needed)


Version: 1.21 Document Revision Date: 15/06/2013

Page 15 of 16
References
Microsoft TechNet - technet.microsoft.com

Wikipedia www.wikipedia.net

Youtube youtube.com

Page 16 of 16

S-ar putea să vă placă și