1 / 19

IIPS Fall Conference

IIPS Fall Conference. Session III Network Administrators Network Management (:30). Overview. What is managed Software used to Manage the network Using Logon Scripts to manage workstations Software/Hardware used to troubleshoot network problems

leal
Download Presentation

IIPS Fall Conference

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IIPS Fall Conference Session III Network Administrators Network Management (:30)

  2. Overview • What is managed • Software used to Manage the network • Using Logon Scripts to manage workstations • Software/Hardware used to troubleshoot network problems • Tips and Suggestions to make managing your network easier

  3. What is Managed • What it is that we manage • Approximately 1200 Workstations • 25 Windows NT/2000 Servers • 2 Unix Servers • 1 Novell Server • Approximately 40 Student Computer Labs • Approximately 300 Staff/Faculty Workstations • Approximately 100 Networked Printers • Mostly HP JetDirects managed with HP WebAdmin

  4. IT Department Staff Director Associate Director Unix Admin Telephone Support Network Administrator Web Administrator 2 Tech Support Specialist Network/PC Support Computer Center Specialist Unix Support User Account Management Software Support Specialist Help Desk Web Development Trainer What is Managed (cont.)

  5. Software Used to Manage ABTECH’s network • BlueOcean’s TrackIt Enterprise • www.blueocean.com • Helpdesk and work order management • Wiredred’s E/Pop • www.wiredred.com • Workstation Remote Control and Instant Messaging • Hyper Technologies’ Deepfreeze Pro • www.winselect.com • Lab computer lockdown • Symantec’s Ghost • www.symantec.com/ghost • Imaging and Image Distribution • Symantec’s PCAnywhere • www.symantec.com/pca • Remote Control of Servers

  6. Using Login Scripts • Batch Files • Very limited for login scripts • Lots of additional stand alone programs needed to enable basic login script capabilities • VBScript • Useful but not designed for use in login Scripts • Must create routines, or find them on the net, that enable basic login script capabilities

  7. Using Login Scripts (cont.) • Kixtart • Login Script Processor designed from the ground up for use in login scripts • It will work on any version of Windows (9x, ME, 2000, and XP) • It was originally designed by a Microsoft engineer and included in the Windows NT Resource Kit

  8. Using Login Scripts (cont.) • Kixtart is available for free on the web at http://www.kixtart.org • Latest Official Release Kixtart is v3.63 • Kixtart 2001 RC3 is available

  9. Using Login Scripts (cont.) • What we do with logon scripts • Display Acceptable Use Policy • Set various registry settings • Configure Termite (Terminal Emulation Software) • Install or Configure Groupwise

  10. What we do with logon scripts (cont.) • Copy Files • Map Drives • If necessary install Command Antivirus • Do not use Window 2000 Group Policies to distribute Command Antivirus • Determine if Deepfreeze is installed and take appropriate action

  11. Hardware/Software used to diagnose problems with ABTECH’s network • Fluke’s One Touch • Network Instruments’ Expert Observer • Basic Tools • PING • TRACERT (traceroute) • NET VIEW • NBTSTAT • WINIPCFG / IPCONFIG • Suggestions • Fluke’s OptiView • http://www.flukenetworks.com/ • Network Associates Sniffer • www.sniffer.com

  12. Tips and Suggestions • Setup a Server either per a lab or for a group of labs • Why • Storage of Ghost image(s) for lab(s) • Application and User file storage off of primary servers • User accounts and groups for lab stations kept off of Administrative Servers, is the logon server for the lab(s) • Network traffic (ghost, applications) associated with the lab is kept off of primary network • Must have either the workstations or the lab switch connected to a multicast enabled switch • How • Does not need to be a real server, a workstation class machine can be used with server software loaded on it

  13. Tips and Suggestions (cont.) • Isolating labs where Windows NT/2000 Server is taught • Why • Certain services running on server can disrupt the campus network, the primary example is DHCP. • How • Must use a router, either hardware or software, to block broadcast traffic. • Do not use NAT if the workstations use files from a server on the other side of the router.

  14. Tips and Suggestions (cont.) • Lab Assistants for Student Computer Labs • Why • They can be trained to support the hardware and software in a lab. • They can be responsible for re-imaging the workstations in a lab. • How • Lab Assistants can be pulled for the student population in a part-time manner. • Full-time Lab Assistants (Lab Managers) could be placed under the IT department and used for other IT task when free.

  15. Tips and Suggestions (cont.) • Use only a few types of PC Configurations • Why • Makes troubleshooting problems easier • Allows for an easier setup using a pre-configured ghost image • How • Have one or more pc configurations from a single PC vendor that your staff or faculty can select • Pre-test the most common applications and your network setup with these configurations

  16. Conclusion • Any Questions?

More Related