Chapter 2

Getting organized with initial audit of the network

Abstract

We take the network from an unknown of unknowns and through a progression of steps, positively and accurately document each and every element of the network so that we obtain a known good basis to build stronger security and performance. We document this an open source network management system which we will later use for differential analysis and detection of unauthorized devices. We also recommend a data object classification system to sort sensitive data later.

Keywords

direct positive identification
NMS management
data object security
NMAP
NFV
password strength
security zones
Understanding that network elements, hosts, server, and wireless devices come in contact with your ...

Get Network Performance and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.