Premium Essay

Configuration Management

In: Business and Management

Submitted By Jikesh
Words 3446
Pages 14
UNIVERSITY OF PRETORIA

10
CONFIGURATION MANAGEMENT
Assignment
Jikesh Jagbeer

UNIVERSITY OF PRETORIA

10
CONFIGURATION MANAGEMENT
Assignment
Jikesh Jagbeer

Contents Introduction 2 The Project Office: Configuration Management Plan 3 Section 1: Introduction 3 Purpose 3 Project Framework 3 Section 2: Configuration Identification 4 Configuration Items 4 Baseline Documents produced in a typical project 4 Naming Convention for Project Documentation 5 Document Format 5 Section 3: Configuration Organisation 6 Section 4 Configuration Management Phasing and Milestones 8 Section 5: Data Management 8 Section 6: Change Control 9 Change Control Process 9 Change Control Board 10 Change Manager 10 Duties of a CCB Member 11 Change categorization 11 CAB meetings 12 Section 7: Interface Management 13 Section 8: Configuration Status Accounting 13 Status Account Data 13 Configuration Management Database 13 Section 9: Verification 13 CM Process Audits 13 CM Baseline Audit 13 Section 10: Reference Documents 14

Introduction

The South African Post Office (SAPO) is constantly under pressure to reduce cost whilst improving its profit margin through innovative products and effective service delivery. SAPO is a multifaceted organisation which operates in various industries e.g. Logistics, IT and Cash Collection etc. Hence SAPO, at any given moment in time, has a large number of projects that are in various stages of execution.
These projects consume a large amount of capital resources as well as human resources. In an attempt to reduce the risk of unexpected costs and project cancellations, improve communications to and the involvement of business and end users as well ensures the value and quality of project deliverables SAPO has implemented a project management framework. The framework is also expected to grow the…...

Similar Documents

Free Essay

Hcm Configuration

...| HCM 9.0 Configuration Guide WorkCenter PeopleTools 8.51 | Last Revised: 06/04/12 FINAL 07/20/11 REVISION CONTROL Document Title: HCM 9.0 Configuration Guide: WorkCenter PeopleTools 8.51 Author: CMS Central File Reference: [ HCM90_CFG_WorkCenter_PT851.docx ] Date | By | Action | Section(s) | 07/08/11 | N Louie | Created | All | 06/04/12 | N Louie | Added Appendix for Security Info to Web Libraries | Appendix B | | | | | Review/Approval History Date | By | Action | Pages | 07/01/11 | User Group / Review Team | Review and Input | All | 07/25/11 | PMO QA | Standards Review | All | 07/20/11 | Application Manager | Approved for Release | All | Confidentiality Statement This document has been checked and screen shots do not contain any confidential information (staff names, addresses, social security numbers). Please add a new line, verifying that screen shots have been checked each time this document is published. Publishing Date | Name of Individual Checking Screen Shots | 07/21/11 | N Louie | 06/04/12 | N Louie | Table of Contents Page Page Introduction 1 Definitions 2 Process Flow 2 Terms 3 1.0 Template Pagelets 4 1.1 Content Reference Links 4 1.1.1 How To Do This Task 4 1.2 Navigation Collections 6 1.2.1 How To Do This Task 7 2.0 Pagelet Wizard 11 2.1 Navigation Collection Pagelets 11 2.1.1 How To Do This Task 12 2.2 Query Pagelets 16 2.2.1 How To Do This Task 17 2.3 External Links......

Words: 2247 - Pages: 9

Premium Essay

Dynamic Host Configuration Protocol

...DHCP: DynamicHostConfigurationProtocol In simple terms, DHCP determines if your IP is static or dynamic and the length of time an IP address is assigned. Dynamic Host Configuration Protocol is controlled by a DHCP server. Your router can be a DHCP server…and if you’re on a home network, it most likely serves this purpose. Read more: http://www.whatismyip.com/ip-faq/what-is-dhcp/#ixzz2SFrnB7wR I know this might be confusing because the word dynamic is in the term, but just because you have DHCP enabled on your computer doesn’t mean you can’t be assigned a static IP. DHCP enabled on your computer simply means you’re letting a DHCP server assign its IP. Having it enabled DOES NOT mean it’s a DHCP server. A true DHCP server (not your Linksys router) gives the LAN Admin a ton of control with IP assigning. Ever print to a network printer? Ever wonder how that printer keeps its network assignment? Each network device has a MAC address. You can assign a static IP at the server to a specific MAC address. This allows the network printer to always get the same IP even after it reboots and without assigning the IP at the printer. If you print the network configuration at the printer, it will probably tell you that DHCP is enabled and no static IP is assigned. That’s because the IP assignment is handled at the server. Your ISP has a DHCP server. They can assign IPs by modem MAC addresses. When your modem comes online, it communicates to the network indicating it is looking for...

Words: 425 - Pages: 2

Premium Essay

Nat Configuration

...use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this document is based on these software and hardware versions: • Cisco 2500 Series Routers • Cisco IOS® Software Release 12.2 (10b) The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Quick Start Steps for Configuring and Deploying NAT When you configure NAT, it is sometimes difficult to know where to begin, especially if you are new to NAT. These steps guide you to define what you want NAT to do and how to configure it: 1. Define NAT inside and outside interfaces. ♦ Do users exist off multiple interfaces? ♦ Are there multiple interfaces going to the internet? 2. Define what you're trying to accomplish with NAT. ♦ Are you trying to allow internal users to access the internet? ♦ Are you trying to allow the internet to......

Words: 3234 - Pages: 13

Free Essay

Hardware Configurations

...NT1110 Unit 8: Video Summary 6 Hardware Configurations I watched 4 videos on Hardware Configuration. They were, in order, Device Manager, Driver Signing, Hardware Profile and Regional and Language Options. The 1st, Device Manager went over how to manage all your hardware devices. It covers how they are configured, their settings, drivers and resources. It’s found in System Properties. After this, was Driver Signing which is Microsoft’s way of confirming that its devices and drivers have been tested and are compatible with Microsoft’s operating system. Each driver and device is checked off in the System Properties verifying its authenticity. There is also driving signing options for hardware installations with software that is not Windows. They are Ignore, which means install anyway. Warn, which means the system will prompt you to choose and Block, which blocks unsigned software. The next video was Hardware Profile. This is a list of devices enabled at the start of a computer and loading into the operating system. It too is found in System Properties. It covered how to change your hardware profile. It’s usually used for laptops. We can change what devices our system uses 1st for instance, changing the network connections when traveling. The last video was Regional and Language Options. This is found on the Control Panel. Here, you can set language or choose how you want your numbers, currency, time and dates displayed. You can go to Customize to make changes.......

Words: 498 - Pages: 2

Premium Essay

Switch Configuration

...Switch Configuration Switch Configuration First I would unpack the switch along with all of its contents, check for any missing or damaged items and if any our found I would then contact the cisco team but if everything looks great I would then proceed. If I have all the equipment ready for the switch I would then continue on with what they call the express set up. First thing I would do is verify that no devices are connected to the switch when first initializing the setup the switch will start acting like a DHCP server. Since my network has a static IP address I will change it for the time being to DHCP. Once switch is mounted and I have all my devices prepared for it I will then power it on. As the POST initializes I can get a good indication that the switch is functioning properly. I can tell when the POST is complete by SYSLED blinking green and if it fails it would blink an amber color. Next with my laptop I will hook directly in to the switch via CAT5. From there I will log in to the switch by opening my web browser and in the address bar typing in the IP address of the switch, which by default is 10.0.0.1 then you will enter the express setup GUI will open. In the express setup GUI I will configure my VLAN ID, IP, and IP subnet mask then I will enter my routers IP to point the switch through my default gateway. Then I will enable Telnet and set the Telnet password this will allow me to access and manage my switch using the command line interface (CLI). I can...

Words: 585 - Pages: 3

Free Essay

Implementing Firewall Configurations

...Implementing Firewall Configurations Robert Collazo Rasmussen College Implementing Firewall Configurations First he would like me to use a host firewall in which case I would then use the Windows Firewall. Windows Firewall with Advanced Security includes a host-based firewall component that is a protective boundary for the local computer, which monitors and restricts information that travels between your computer and its attached networks or the Internet. It provides an important line of defense against someone who might try to access your computer without your permission. Then he would like me to be able to configure, maintain and monitor rules for multiple profiles, notifications and authenticated exceptions and he would also like me to be able to create and manage inbound and outbound rules and with windows firewall I can accomplish both of these task because Windows Firewall with Advanced Security works by examining the source and destination addresses, source and destination ports, and protocol numbers of a packet, and then comparing them to the rules that are defined by the administrator. When a rule matches a network packet then the action specified in the rule (to allow or block the packet) is taken. Windows Firewall with Advanced Security also lets you allow or block network packets based on whether they are protected by IPsec authentication or encryption. Then I could also have capabilities of Data encryption and connection security rules with Windows......

Words: 344 - Pages: 2

Premium Essay

Basic Switch Configuration

...Basic Switch Configuration Switch>enable Switch# Examine the current running configuration file. Switch#show running-config Examine the current contents of NVRAM: Switch#show startup-config Examine the characteristics of the virtual interface VLAN1: Switch#show interface vlan1 Switch#show ip interface vlan1 Examine the following version information that the switch reports. Switch#show version Examine the default properties of the FastEthernet interface used by PC1. Switch#show interface fastethernet 0/18 Switch#show vlan examine the contents of the flash directory. Switch#dir flash: or Switch#show flash Switch#dir flash:c2960-lanbase-mz.122-25.SEE3 To save the contents of the running configuration file to non-volatile RAM (NVRAM), issue the the command copy running-config startup-config. Switch#copy running-config startup-config S1#configure terminal S1(config)#hostname S1 S1(config)#exit S1#configure terminal S1(config)#line console 0 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password cisco S1(config-line)#login S1(config-line)#exit S1(config)#enable secret class First, you will create the new VLAN 99 on the switch. Then you will set the IP address of the switch to 172.17.99.11 with a subnet mask of 255.255.255.0 on the internal virtual interface VLAN 99. S1(config)#vlan 99 S1(config-vlan)#exit S1(config)#interface vlan99 %LINEPROTO-5-UPDOWN: Line protocol on Interface......

Words: 873 - Pages: 4

Free Essay

Ip Configuration

...For the network configuration, we decided to go with a partial mesh configuration to save on cost and time. With the amount of staff members and estimate growth on a annual basis. For Ip address that’s needed to allow enough for employees and guest for the business the sufficient. ip address 10.0.0.0.0 with 255.255.255.255 subnet with 256 usable ip address with a /25 allow guest to use the network . The configuration of the wireless network would allow the management workgroup to connect wireless on the third floor were the upper management staff. Basement level to the second/ first floor with run unshielded paired Ethernet cabling only to the telemarketers, which is about 85 feet. 15 ft for the security desk and 20 feet to training room. Sales agents will run off the wireless with workgroup allowing minimal access to display product to customers with restricted access to the outside internet with the configurations to allow monitor and packet captures as well as the management group .wireless system will support IEEE 802.11g ,IEEE 802.11b, IEEE 802.11a. Cisco wireless access point will be mounted on the ceiling with a hexagon formation to allow maximum coverage within the infrastructure. Basic information relating to the communication of the wireless network in figure 1.1 and the layout of the cisco wireless access points figure 1.2. each workstation not part of the training or security will be equipped with 150Mbps 2.4GHz Wireless PCI LAN Adapter Card......

Words: 321 - Pages: 2

Premium Essay

Switch Configuration

...| Switch Configuration | | | Amanda Robertson | 4/20/2014 | | I was Hired By a company as a network engineer. One of my first jobs was to purchase, install, configure and deploy a Cisco Catalyst 2960-S Series Switches. This is a popular choice with the LAN Base Software, which comes with the switches. I found that this switch would be compatible with the companies needs having 48 ports, POE configurations that offer up to 15.4w per port, USB storage, 10 GB Ethernet uplink flexibility. This switch would use either copper or fiber optic cabling however I would prefer the fiber optic. The first step that I would have to take is to connect all hardware properly. “When you first set up the switch, you should use Express Setup to enter the initial IP information. This enables the switch to connect to local routers and the Internet. You can then access the switch through the IP address for further configuration” (Cisco, 2006-2010). Plug in the AC adaptor cord to the Cisco switch to power it on. The switch will go through POST and then verify that the SYST LED light blinks green rapidly. To run Express Set up mode, hold the mode button for 3 seconds, or when all lights above mode buttons turns green. Connect a CAT5 Ethernet cable to the switch and computer, after 30 seconds launch a browser and enter the IP address 10.0.0.1 in the browser and press enter. I would then fill out all the information requested by the Express Set up Mode, the Management interface......

Words: 569 - Pages: 3

Free Essay

Client Server Configuration

...Running Header: Unit 7 Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a......

Words: 589 - Pages: 3

Premium Essay

Human Resource Management Configurations Approach

...Training for Excellence at Wegman Food Market Adrienne Sharpe HR Management Foundations Sue Golabek July 25, 2010 Training for Excellence at Wegman Food Market 1. Discuss how training at Wegmans’ is related to its organizational needs. The training at Wegmans is very much related to their organizational needs because all the training that Wegman has implemented such as the (LMS) learning management systems has put Wegman’s organization at an advantage over other food store chains. Wegman saw the need to have training that would be effective, and that a effective training program can actually teach what it is designed to teach, and it teaches skills, and behaviors that will help the their organization achieve its goal. Wegman took a number of steps to train their employees to meet their organizational needs. The training content at Wegman consist of on the job training, and classroom training, product knowledge, food safety, and the way to cook and bake, and superior customer service. With the training that Wegman has put in place has been very beneficial to their organization in relation to training. Training for Excellence at Wegman Food Market 2. According to the case, how does Wegmans’ measure the success of its training? Wegmans measure the success of its training based on whether a store’s sales are growing. The sales and profit growth are the primary ways that the company measures the performaces of the company’s director of training and......

Words: 624 - Pages: 3

Free Essay

Nt2670 - Installation and Configuration of Ms

...the option to have Windows automatically install updates.  Updates download and computer reboots then install Active Directory.  Add role - Active Directory Services This requires two steps; firstly, install Active Directory and lastly, to configure your Active Directory.  Now your Windows Server will now be a Domain Controller. Step 1 - Install Active Directory a. Start > Administrator > Server Manager > "Add Roles" > "Active Directory Domain Services". b. Select “Add Required Features” > ".NET Framework 3.5.1". > Next c. Install > When the installation is complete, you should see a message indicating "Installation Succeeded".  > Close to return to the Server Management Screen. Step 2 - Configure Active Directory At the Server Management screen you should now see that you have 1 role installed.  The Active Directory Domain Services may indicate that it is installed but there are errors.  This is because the software is installed but not configured. To configure Active Directory a. Click on the link "Run the Active Directory Services Installation Wizard (dcpromo.exe)".  b. When the Active Directory Domain Services Installation Wizard appears, press Next. c. Choose "create a new domain in a new forest".  Press Next d. Enter the name of your domain.  The domain name you enter here is the domain name that Exchange will associate with all of your email. e. Once you have decided on the name of your internal domain, that......

Words: 2240 - Pages: 9

Premium Essay

Use of Microsoft Sharepoint for Configuration Management in It Organizations

...Use of Microsoft SharePoint for Configuration Management in IT Organizations In the contemporary business marketplace, the requirement for a technology-based system to provide the tools for global organizations to archive and manage information has become an increasingly present issue. The use of a corporate-wide portal, supported by a collaborative, content management platform, provides an Information Management System (IMS) that culminates organizational information and intellectual capital, document storage, and collaborative workspaces into a single resource, accessible through a centralized portal interface (Microsoft, 2006, p. 14). Configuration Management (CM) encompasses the management of requirements, production, testing, technical documentation, and organizational processes during the lifecycle of a software system’s development. Within Information Technology (IT) organizations, CM defines a series of systematic controls for changes and developments to the software system, which ensure the integrity and traceability of the environment and software configuration throughout the development lifecycle. The CM process is a culmination of activities and support from each level of the organization, ensuring compliance with all applicable standards and guidelines for software development and production. Figure 1. Overview of Configuration and Change Management Process Integral to effective employment of CM processes is collaboration amongst the following......

Words: 990 - Pages: 4

Free Essay

The Reply Configuration Paper

...they formed an incident command system. That helps govern their response to any disaster, which could be natural or manmade. The incident command system created to aid in reducing the communication dilemmas with establishing terminology. To assist in creating a hierarchy structure to recognize the person in power, what is required, as well as the individuals anticipated to keep updating society of the crisis. They found helpful with reducing panic, to keep control within the incident. In this paper, it will discuss the response command configuration, appropriate staff or locations, Information staff, Scenario-base instruction, and conclusion. Response framework can help critical situations, like disasters. Command response configuration The portrayal within the incident command system normally has a single incident commander, which they control the plan of action also the ultimate decision-making abilities. The management personnel whom they report to the incident command comprise of a safety officer, which they observe safety situations, creates strategies for assuring the safety every staff member also the public. An officer of public information, they are the source information for everybody that is a crisis victim. The public information officer also serves as a liaison to the media, by them answering on inquiries, addressing rumors aiding, to keep the public alert of what resolution in the matter. “The liaison officer for all supporting agencies......

Words: 1903 - Pages: 8

Free Essay

Sharepoint 2010 Installation and Configuration Plan

...SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of Microsoft SharePoint......

Words: 7699 - Pages: 31