As a network administrator, youโ€™re used to an interrupt-driven workflowโ€”when somethingโ€™s broken, you’re expected to fix it.

But there are routine network maintenance tasks you can perform to keep ahead of potential issues. Being proactive with your network maintenance generally leads to fewer tickets and greater user satisfaction.

1. Keep an eye on the network firmware

When you get down to it, networking devices like routers and switches are simply computersโ€”just with a ton more ports. And like computers, they run software thatโ€™s susceptible to bugs and security threats, and they suffer from feature rot when theyโ€™re not updated to the latest code.

There are many examples of network gear needing firmware upgrades to patch nasty security holes that can (a) compromise the network device itself, and (b) potentially compromise devices connected to that network device (i.e., endpoints).

Take advantage of any automation that might be available for firmware updates. You might be able to schedule automatic upgrades during off-hours, or request notifications of new firmware from the device itself or the vendorโ€™s support website. Make it a point to check on firmware updates every few weeks.

2. Perform network capacity planning

Consumer appetite for bandwidth these days is insatiable. As more services become cloud-based and each service becomes increasingly interactive and data-rich, the load on the networkโ€”and the bandwidth required to support a userโ€”increases.

Watch for potential bottlenecks at every layer within the network. Common bottleneck points in the network include:

  • Trunk links between switches
  • Uplink from the core switch to the firewall
  • The ISP-provided WAN connection from the local network out to the Internet
  • Access point capacity
    • Radio (802.11) and client capacity
    • Backhaul / uplink capacity

Tips and tricks to stay ahead of the curve here

  • Commit to an acceptable peak utilization across all network devices. Configure your monitoring system you when this threshold is crossed.
  • Plan what youโ€™ll do to reduce such utilization. You might:
    • Set up an additional uplink between your switches (you can use a port-channel or link aggregation)
    • Engage the ISP providing WAN connectivity to upgrade the speed of the Internet connection. Sometimes if a line is maxed out, an ISP will recommend an additional link. Your firewall can then be configured to load balance traffic across the two connections. This serves as a form of redundancy as well.
  • Use tools like your firewallโ€™s traffic visualizer, a NetFlow analyzer, or packet capture against a workstation to understand what your users and devices are doing. Get answers to questions like:
    • What are the most common applications that employees are using? Is there any data that can be cached locally to prevent WAN congestion?
    • Is there any evidence to suggest users are accessing infrastructure for activities other than work?
    • Are there activities, like recurring backups, that can be shifted to off-peak hours?

3. Keep an eye out for unknown devices

Routinely review what devices, device types, and vendors you expect on the network.

Use a tool that provides you with automated network inventory and network topology to see whatโ€™s actually out there, and whether it lines up with your expectation.

If something looks suspicious, action it for follow-up.

4. Review and harden the networkโ€™s configurations for stability

No one likes for users to start messing with the IT infrastructureโ€”like bringing in an unmanaged switch or a consumer-grade access point so they can connect multiple devices to corporate Wi-Fi.

Where possible, harden the network to only allow the devices you expect to be on the network. This might be an IP phone and workstation combination for each employe, or maybe just a workstation if voice is handled through a softphone or cellphone.

Consider setting up MAC address limits per switchport. Enable PortFast, BPDU guard, storm control, and equivalent features to prevent unsanctioned devices being plugged into your infrastructure from taking the network down.

5. Do regular security and credential reviews

People come and people go. Sometimes passwords are never changed from the default. Sometimes theyโ€™re so weak they can be guessed by malicious actors with a bit of intuition and automation.

Consider a quarterly credential review to make sure access to devices isnโ€™t in the wrong peopleโ€™s hands.

Standard best practices for online banking or social media websites apply, such as generating complex passwords that arenโ€™t easily guessable. Use a proper password management tool to securely store credentials and share them safely. Use network management systems that allow for blind logins to devices for users with the appropriate role.

Thereโ€™s more than one way to extract information from a network device. For example, someone can typically gain a lot of basic information on how a network device is configured just by doing an SNMP walk against the device. They donโ€™t need login credentials to the deviceโ€™s web GUI or CLI. In many cases, SNMP can also be used to make configuration changes to devices.

So itโ€™s critical that devices are locked down as much as possible to prevent unauthorized users. Use non-standard community names and choose SNMPv3 over its predecessors when you can.

And make sure your credential management process applies to all services that could be used to extract from, or alter configurations on, a device.


To test Auvikโ€™s remote management features for yourself, sign up for a free 14-day trial and get full access to your network from the comfort of your desk.

Get templates for network assessment reports, presentations, pricing & moreโ€”designed just for MSPs.

Ebook cover - The Ultimate Guide to Selling Managed Network Services
  1. Craig Belisle Avatar
    Craig Belisle

    Thank you for the common sense information and reminders, and the unthought of information as well!!

Leave a Reply

Your email address will not be published. Required fields are marked *