We provide customized LAN solutions with the aim of delivering data, voice and high quality video. The design process starts by determining what level of services a business requires. This is followed by elaborate design with the understanding of specific business requirements. This is followed by ensuring all security features of the network are incorporated from hardware to the logic.

When deciding a LAN network, we put in mind the following steps.

Functionality - the network must work with reasonable speed and reliability

Scalability - the network must be able to grow without any major changes to the overall design

Adaptability - the network should include no element that would limit use of new technologies as they become available

Manageability - the network must be able to allow ease of monitoring and managing


A detailed network audit is recommended for anybody and everybody who is managing a network. As a network engineer or manager, one should be aware of the network layout, inventory, top talkers, and traffic pattern into his network. Vericom with their extensive experience and advertise, we help our customers audit and document their networks for easier management and to minimize down-times and ensure quick MTTR. Below is a checklist for network audit which our technicians follow when conducting a detailed network audit for customers’ network.

1.    Network topology and physical infrastructure documentation. – To help you understand your network in a better way, As we say “ A picture is worth thousand words”

2.    Network addresses and names are assigned in a structured manner and are well documented – Name of your devices should tell you everything about IP, location, rack etc. about a device, I am sure this would make your life easy. So, Plan a very good naming convention

3.    Network wiring is installed in a structured manner and is well labeled – Its better to plan in advance.

4.    Network wiring between communications closets and end stations is generally no more than 100 meters

5.    Network security for basic security, including the following: passwords are reasonable; passwords are protected from casual observation in config files; dialin ports are protected.

6.    Inventory of all routers and switches. Include the following for each device –Location (city, address, building, floor, wiring closet, rack, slot-in-rack – as detailed as is reasonably possible).

7.    Security of physical location – Have a access-control device in place and specify who can access what.

8.    Configuration – Check configurations regularly and do keep a backup of all of them. This information is very important.

  • Model and serial number, Software version loaded,
  • Routing table snapshot,
  • Routing protocols in use,
  • Neighbor table,
  • ARP table,
  • CAM table (for switches),
  • Spanning tree information for switches,
  • Memory utilization (at multiple points during a day),
  • CPU utilization (at multiple points during a day) 

9.    Passwords for all equipment – Maintain a database of all credentials at a secure location.

10. Identify WAN links that terminate in routers outside the routing table

11. Points of Contact at external AS

12. Method of route sharing with the external AS (static routes, BGP, IGP, etc.)

13. WAN Circuit ID and carrier and contact phone number for WANs

14. Identify locations of major servers firewalls and respective topologies

15. Locate network management stations

16. Document the services and clients that exist at each site and their relative importance to the business.

17.   Documenting any charges for each WAN circuit – This would help in designing  traffic routing policies, Most paid links should be the most utilized one.

Created with Mozello - the world's easiest to use website builder.