• Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in change management

Implementing Changes

Once you have your network policies defined, see the prior posts Building Configuration Policy Checks, Part 1  and Building Configuration Policy Checks, Part 2, then implemented in a configuration policy check, you need a way to correct any non-compliant configurations. An obvious choice for remediation is to simply login to the offending device and type in the correct configuration statements. If you have a couple of devices to correct, that may well be the right choice, providing that you don't make a silly mistake while entering the commands. But is there a better way?


Bruce Enders of Chesapeake NetCraftsmen recounts a story that demonstrates why configuration repositories and monitoring configuration changes are valuable.  A NetCraftsmen customer called on a Saturday morning to ask about a network problem.  Bruce gave them some free advice and the customer tried to figure out their network problem.  Sunday afternoon, they called back, asking for onsite assistance. The problem was that a dual SAN implementation was no longer reachable from its main server.  The two SAN units (I'll refer to them as SAN-A and SAN-B) were at different locations (perhaps to facilitate off-site data storage and disaster recovery).  Upon arriving at the customer site, Bruce performed basic troubleshooting with 'ping' on SAN-A.  With no response, he checked the configuration of the attached switch and found that the interface descriptions didn't match the cabling.  The cabling had been incorrectly reconnected during some of the troubleshooting during Saturday.


Posted by on in General Networking

Got it?  It's a checklist of checklists, all about IT processes.  Smile The official name is The IT Audit Checklist Series ( and it is a list of checklists useful to IT professionals.  The lists are created by the IT Compliance Institute.  There are some useful checklists for various IT functions that would be useful in networking: