TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Subject:Re: Internet Architecture Project - PLEASE HELP From:Arlen -dot- P -dot- Walker -at- jci -dot- com To:"TECHWR-L" <techwr-l -at- lists -dot- raycomm -dot- com> Date:Wed, 3 Apr 2002 09:18:50 -0600
>2. Scan your internal network range using a tool like SuperScan from
>Foundstone. That will determine what machines are there and what aren't.
It can
>also scan for open ports. If your company has any security on the network
>(which they probably don't) you'll set off the IDSs. But that will at
least
>show them that you know what you're doing (sort of).
Ummmm.....ask permission from someone up the ladder before doing this, as
I've known several folks who have been fired for doing this without warning
someone first. At least tell them that since there's not a good network
diagram in existence, you're going to have to do something like this in
order to create one. Antagonizing the SME's doesn't get you very far in
this case. Also, be prepared for 90% of the results of this to be useless
to you (90% of the machines will probably be DHCP clients, which means they
won't be found at those addresses consistently). Use the other 10% to
cross-check against the DNS material, to make sure you haven't missed
anything. Anything DHCP should be noted, but don't think too hard about
them; *everything* with a fixed address *has* to be documented, whether
it's in the DNS or not (especially if not).
Net security types get *really* hostile (think http://www.bofh.net/ --
language advisory is hereby given) when traffic like this hits their
precious servers; they'll swarm out like hornets looking for the poor slob
who just kicked their nest, and you'll want to have some shelter when they
do.
The other 7 points from Andrew are pretty good, though I'll never
understand his attachment to Visio. Any flowcharting tool will do; I used
MacFlow last time I did something like this.
Have fun,
Arlen
Chief Managing Director In Charge, Department of Redundancy Department
DNRC 224
Arlen -dot- P -dot- Walker -at- JCI -dot- Com
----------------------------------------------
In God we trust; all others must provide data.
----------------------------------------------
Opinions expressed are mine and mine alone.
If JCI had an opinion on this, they'd hire someone else to deliver it.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Free copy of ARTS PDF Tools when you register for the PDF
Conference by April 30. Leading-Edge Practices for Enterprise
& Government, June 3-5, Bethesda,MD. www.PDFConference.com
Are you using Doc-to-Help or ForeHelp? Switch to RoboHelp for Word for $249
or to RoboHelp Office for only $499. Get the PC Magazine five-star rated
Help authoring tool for less! Go to http://www.ehelp.com/techwr
---
You are currently subscribed to techwr-l as: archive -at- raycomm -dot- com
To unsubscribe send a blank email to leave-techwr-l-obscured -at- lists -dot- raycomm -dot- com
Send administrative questions to ejray -at- raycomm -dot- com -dot- Visit http://www.raycomm.com/techwhirl/ for more resources and info.