Spring Cleaning Part 2
Step Up Your Spring Cleaning with A Network Assessment (Part 2)
In part-one of our Network Assessment piece, we showed you how to focus your spring-cleaning efforts on creating a network inventory and examining your IT infrastructure. In section two, we look to audit three more critical aspects of your network: performance, security, and management.
After an audit of your inventory and infrastructure, you now have a clearer picture of your network. Next, you’ll want to test its performance by analyzing key metrics to help define the overall quality of your service.
To compile this data, you’ll need a network performance measurement tool. Tools such as Wireshark or iPerf can provide powerful data packet capture analytics with diagnostic capabilities. Broadly speaking, these tools are split into two categories: Passive and Active. Passive tools limit disruptions by avoiding introducing additional network traffic. Active tools inject data into your network to monitor its path to a target destination. It’s important to know the difference between these tools. Choosing an active tool will require clever scheduling so as not to interrupt existing network traffic.
When testing, you’ll be looking to measure these key metrics:
- Latency – the amount of time it takes for data to travel from a defined location to its chosen destination
- Bandwidth – the amount of data that can be transmitted over a specific period of time (usually measured in bits per second)
- Packet Loss – the number of data packets that fail to transmit from one destination to another
- Jitter – related to latency, jitter quantifies the variations in time delay when packets are sent over the network
- Thoroughput – also related to latency, thoroughput is the amount of data packets that can be delivered in a predetermined time frame
With these measurements in hand, you should have a set of hard data to test all your variables against to help improve your network performance going forward.
Solidify Your Security
Internal networks are notoriously open and contain many vulnerabilities. Lack of encryption or authentication controls are usually two of the most common problems. In your assessment, you’ll want to do a thorough inspection for weaknesses by monitoring network traffic for any exposed services and testing device and control configurations. It’s also time to scan every port in your network. Unprotected ports in your network are like unlocked doors in your home. Secure ports by implementing firewalls, SSH public key authentications, and keeping the services you use constantly up-to-date. Also, don’t forget to take physical security risks into account as well. Fires, floods, or stolen equipment can be just as damaging as compromised passwords or malicious viruses.
The final detail you’ll need to take a careful look at is how your network is being managed. One look at the inventory list you made when you started, and it’s easy to see why this can be a daunting task. Developing and communicating coherent company policies surrounding network access and usage are paramount to keeping your systems clean and under control. Monitor network usage heavily during your assessment to figure out who’s using what and when.
Assess Whether You Need Assistance
If you’re looking to make your network assessment as thorough as possible, a Managed Service Provider (MSP) like Link High Technologies can also help. We’ll analyze your data to properly identify holes in your security systems, expertly optimize your infrastructure, and even help manage your network for you. Contact Link High Technologies to make your network the cleanest aspect of your office.