Documente Academic
Documente Profesional
Documente Cultură
Network Documentation
Academies Australasia
Certificate IV
Network and Technical Documentation
Contents
Introduction................................................................................................................ 3
Purpose...................................................................................................................... 3
Network Diagram....................................................................................................... 4
Network Configuration................................................................................................ 6
Naming standards and labeling schemes...................................................................6
Client PCs IP addressing............................................................................................. 7
IP CALCULATION......................................................................................................... 7
Computer checklists for workstation..........................................................................7
Produce procedure and policy manuals......................................................................9
Acceptable use policy.............................................................................................. 9
Procedure for creating new users on the server....................................................11
Sample Sign-off form................................................................................................ 12
References................................................................................................................ 13
Page 2 of 16
Introduction
Network documentation shall be kept either in written form or electronic form in a minimum of
two places. It should be kept in two facilities at least two miles apart so that if one facility is
destroyed, information from the other facility may be used to help construct the IT infrastructure.
Information in both facilities should be updated monthly at the time of the documentation review
Passwords
Page 3 of 16
Purpose
This policy is designed to provide for network stability by ensuring that network documentation
is complete and current. This policy should complement disaster management and recovery by
ensuring that documentation is available in the event that systems should need to be rebuilt. This
policy will help reduce troubleshooting time by ensuring that appropriate personnel are notified
when changes are made to the network.
Page 4 of 16
Network Diagram
CarNet Office Diagram
Page 5 of 16
Rack server located in the IT room. It includes three servers, router, main switch
and wireless lan switch. Its locked with security lock.
Page 6 of 16
Page 7 of 16
Network Configuration
Page 8 of 16
According the above table, CarNets labelling standards as follows:
IP CALCULATION
Subnet mask: 255.255.255.0
Network: 192.168.10.0
1st 192. 168.10.1
Last 192. 168.10.254
broadcast 192.168.10.255
We need 16 subnets
2^4 = 16 meaning WE will use 4 Subnet bits, in other words WE will be borrowing 4 bits from
the host portion and adding them the the network portion.
Reverse those host bits. Our mask is 11111111.11111111.11111111.00000000 or /24 you borrow
4-bits from host (TOP DOWN). As you know "1's" identify the network ; 0's identify the host. So
the last octet is the only octet with host bits so you're borrowing FOUR of them changing it from
Page 9 of 16
00000000 to 11110000. Which equals 240 (128 + 64 + 32 + 16). * if you don't understand how to
convert binary to decimal form then you need to go back and learn that*
Workstation Checklist
Made Dell Comments
Model Vostro NA
Computer Name IT01 NA
Domain/Workgroup Carnet.com.au NA
CPU Intel i5 2.4Ghz NA
RAM 4GB NA
HDD 500GB (2 partitions) NA
Programs & Add-ons Checked Unnecessary software uninstalled
Disk Health Checkdisk Performed %100 functional, no errors
Disk Fragmentation Defrag performed
Screen 17 Tested Functional
Operation System Windows 7 Pro SP1
Windows Update Status Update Performed Missing updates installed
Antivirus NA Need antivirus
Page 10 of 16
Antivirus Log Notes NA
Firewall Status Windows Firewall Need better protection
IP Information DHCP 192.168.10.35 NA
Office Version MS Office 2007 It may need upgrade
Critical Applications CarNet Software Need upgrade to be ready Win10
File Shares No shared files All files accessible from server
Backup Method NA All company documents and mails
stored in the servers with backup
Backup Status NA
Printers Network Printers Functional
Page 11 of 16
Produce procedure and policy manuals
Acceptable use policy
1 Overview
The purpose of this policy is to establish acceptable and unacceptable use of electronic devices
and network resources at CarNet in conjunction with its established culture of ethical and lawful
behavior, openness, trust, and integrity.
CarNet provides computer devices, networks, and other electronic information systems to meet
missions, goals, and initiatives and must manage them responsibly to maintain the
confidentiality, integrity, and availability of its information assets. This policy requires the users
of information assets to comply with company policies and protects the company against
damaging legal issues.
2 Scope
All employees, contractors, consultants, temporary and other workers at CarNet, including all
personnel affiliated with third parties must adhere to this policy. This policy applies to
information assets owned or leased by CarNet, or to devices that connect to a CarNet network or
reside at a CarNet site.
3 Policy Statement
3.1 You are responsible for exercising good judgment regarding appropriate use of CarNet
resources in accordance with CarNet policies, standards, and guidelines. CarNet resources may
not be used for any unlawful or prohibited purpose.
3.2 For security, compliance, and maintenance purposes, authorized personnel may monitor
and audit equipment, systems, and network traffic per the Audit Policy. Devices that interfere
with other devices or users on the CarNet network may be disconnected. Information Security
prohibits actively blocking authorized audit scans. Firewalls and other blocking technologies
must permit access to the scan sources.
3.3 You are responsible for the security of data, accounts, and systems under your control.
Keep passwords secure and do not share account or password information with anyone,
including other personnel, family, or friends. Providing access to another individual, either
deliberately or through failure to secure its access, is a violation of this policy.
3.4 You must ensure through legal or technical means that proprietary information remains
within the control of CarNet at all times. Conducting CarNet business that results in the storage
of proprietary information on personal or non- CarNet controlled environments, including
devices maintained by a third party with whom CarNet does not have a contractual agreement, is
prohibited. This specifically prohibits the use of an e-mail account that is not provided by
Page 12 of 16
CarNet, or its customer and partners, for company business.
3.5 You are responsible for ensuring the protection of assigned CarNet assets that includes
the use of computer cable locks and other security devices. Laptops left at CarNet overnight
must be properly secured or placed in a locked drawer or cabinet. Promptly report any theft of
CarNet assets to the Management.
3.6 All PCs, PDAs, laptops, and workstations must be secured with a password-protected
screensaver with the automatic activation feature set to 10 minutes or less. You must lock the
screen or log off when the device is unattended.
You are responsible for the security and appropriate use of CarNet network resources
under your control. Using CarNet resources for the following is strictly prohibited:
3.7 Causing a security breach to either CarNet or other network resources, including, but not
limited to, accessing data, servers, or accounts to which you are not authorized; circumventing
user authentication on any device; or sniffing network traffic.
3.8 Causing a disruption of service to either CarNet or other network resources, including,
but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and
forged routing information for malicious purposes.
3.9 Exporting or importing software, technical information, encryption software, or
technology in violation of international or regional export control laws
3.10 Intentionally introducing malicious code, including, but not limited to, viruses, worms,
Trojan horses, e-mail bombs, spyware, adware, and keyloggers.
3.11 Port scanning or security scanning on a production network unless authorized in advance
by Information Security.
The following are strictly prohibited:
3.12 Inappropriate use of communication vehicles and equipment, including, but not limited
to, supporting illegal activities, and procuring or transmitting material that violates CarNet
policies against harassment or the safeguarding of confidential or proprietary information.
3.13 Sending Spam via e-mail, text messages, pages, instant messages, voice mail, or other
forms of electronic communication.
3.14 Forging, misrepresenting, obscuring, suppressing, or replacing a user identity on any
electronic communication to mislead the recipient about the sender.
3.15 Posting the same or similar non-business-related messages to large numbers of Usenet
newsgroups (newsgroup spam).
3.16 Use of a CarNet e-mail or IP address to engage in conduct that violates CarNet policies or
guidelines. Posting to a public newsgroup, bulletin board, or listserv with a CarNet e-mail or IP
address represents CarNet to the public; therefore, you must exercise good judgment to avoid
misrepresenting or exceeding your authority in representing the opinion of the company.
4 Enforcement
An employee found to have violated this policy may be subject to disciplinary action, up to and
Page 13 of 16
including termination of employment. A violation of this policy by a temporary worker,
contractor or vendor may result in the termination of their contract or assignment with CarNet.
5 Revision History
Page 14 of 16
Sample Sign-off form
Project Name: CarNet Network Improvement
Service Owner: Remote IT Solutions
Project Manager: Jack Black
Document Date: 10/01/2016
1. Project Summary
Start Date 12/01/2016 Finish Date 15/04/2016
Project Duration 3 Months
2. Project Goal
Improving the network infrastructure to cat 6e
3. Project Deliverables
5. Document Signatures
Name Description Signature Date
Service Owner Name mm/dd/yyyy
Project Manager
Name
Page 15 of 16
References
Microsoft TechNet - technet.microsoft.com
Wikipedia www.wikipedia.net
Youtube youtube.com
Page 16 of 16