1 00:00:00,000 --> 00:00:00,960 In this lesson, 2 00:00:00,960 --> 00:00:03,570 we're going to cover IP address management. 3 00:00:03,570 --> 00:00:05,700 Now, in our modern enterprise scale networks, 4 00:00:05,700 --> 00:00:07,170 it's important that we properly manage 5 00:00:07,170 --> 00:00:08,820 our IP addresses efficiently 6 00:00:08,820 --> 00:00:11,640 as part of our ongoing processes and procedures. 7 00:00:11,640 --> 00:00:13,290 Now, in order to do this at scale, 8 00:00:13,290 --> 00:00:15,960 we're usually going to rely on automation and orchestration 9 00:00:15,960 --> 00:00:18,690 within the IP address management process. 10 00:00:18,690 --> 00:00:22,920 IP address management, also known simply as IPAM or IPAM, 11 00:00:22,920 --> 00:00:24,870 is a methodology and suite of tools 12 00:00:24,870 --> 00:00:27,060 that's used to plan, track, and manage 13 00:00:27,060 --> 00:00:30,480 the IP address space inside of your network infrastructure. 14 00:00:30,480 --> 00:00:33,060 Now, whenever you're using a DHCP server on your network, 15 00:00:33,060 --> 00:00:35,130 you are already conducting an automated method 16 00:00:35,130 --> 00:00:37,020 of assigning and configuring IP addresses 17 00:00:37,020 --> 00:00:38,310 to all of your clients. 18 00:00:38,310 --> 00:00:40,890 Yes, this is technically IP address management, 19 00:00:40,890 --> 00:00:42,660 but it's only one small part 20 00:00:42,660 --> 00:00:46,110 of this entire process known as IP address management. 21 00:00:46,110 --> 00:00:48,360 Now, when you really think about IP address management, 22 00:00:48,360 --> 00:00:50,790 you have to think about all the things that it encompasses, 23 00:00:50,790 --> 00:00:52,290 including the comprehensive management 24 00:00:52,290 --> 00:00:54,840 of your organization's assigned IP address space, 25 00:00:54,840 --> 00:00:57,060 including the tracking, planning, and managing 26 00:00:57,060 --> 00:00:59,160 of the network's address inventory. 27 00:00:59,160 --> 00:01:00,480 Now, back in the old days, 28 00:01:00,480 --> 00:01:02,280 the IP address management functions 29 00:01:02,280 --> 00:01:03,690 were usually conducted manually 30 00:01:03,690 --> 00:01:05,430 by relying on things like spreadsheets 31 00:01:05,430 --> 00:01:07,350 and a whole lot of human intervention. 32 00:01:07,350 --> 00:01:09,300 However, with the scale and complexity 33 00:01:09,300 --> 00:01:10,980 of modern cloud-based networks, 34 00:01:10,980 --> 00:01:13,470 we now have to use automation and orchestration 35 00:01:13,470 --> 00:01:15,390 to perform IP address management, 36 00:01:15,390 --> 00:01:17,280 'cause all of our older manual approaches 37 00:01:17,280 --> 00:01:19,230 simply cannot operate fast enough 38 00:01:19,230 --> 00:01:21,420 to meet our increasingly demanding needs. 39 00:01:21,420 --> 00:01:23,430 So instead, we're usually going to be 40 00:01:23,430 --> 00:01:25,170 using integrated IP address management 41 00:01:25,170 --> 00:01:27,330 inside of our networks by using automation 42 00:01:27,330 --> 00:01:28,740 and orchestration functions 43 00:01:28,740 --> 00:01:31,290 to transform this process into a dynamic tool 44 00:01:31,290 --> 00:01:34,170 that not only oversees the allocation of IP addresses, 45 00:01:34,170 --> 00:01:36,810 but also ensures that each device's addresses 46 00:01:36,810 --> 00:01:37,643 are going to align 47 00:01:37,643 --> 00:01:40,440 with the overall network policies and architectures. 48 00:01:40,440 --> 00:01:42,150 By using IP address management, 49 00:01:42,150 --> 00:01:43,680 we're going to be able to create a systematic 50 00:01:43,680 --> 00:01:46,050 and error-resistant method of managing vast pools 51 00:01:46,050 --> 00:01:49,170 of IP addresses inside of our enterprise networks. 52 00:01:49,170 --> 00:01:50,520 Now, these automated systems 53 00:01:50,520 --> 00:01:53,520 are capable of detecting and resolving IP conflicts, 54 00:01:53,520 --> 00:01:55,740 ensuring that two devices are not being assigned 55 00:01:55,740 --> 00:01:58,200 the same IP address on that network, 56 00:01:58,200 --> 00:02:01,080 and this helps to maintain the integrity of this network. 57 00:02:01,080 --> 00:02:03,120 Now, our automated IP address management systems 58 00:02:03,120 --> 00:02:04,980 can also be configured to seamlessly interact 59 00:02:04,980 --> 00:02:07,710 with our DHCP and DNS servers 60 00:02:07,710 --> 00:02:10,860 to provide a more cohesive management of our IP addresses 61 00:02:10,860 --> 00:02:12,720 by ensuring that each component is aware of 62 00:02:12,720 --> 00:02:15,600 and working in sync with the others on the network. 63 00:02:15,600 --> 00:02:17,580 This integration is critically important 64 00:02:17,580 --> 00:02:19,860 if you're going to be using horizontal cloud scaling 65 00:02:19,860 --> 00:02:22,260 where new virtual machines are being automatically added 66 00:02:22,260 --> 00:02:23,760 and removed from your network 67 00:02:23,760 --> 00:02:26,340 to support the changing demands from your users. 68 00:02:26,340 --> 00:02:28,590 This way, anytime you have new virtual machine 69 00:02:28,590 --> 00:02:29,910 that's added into your network, 70 00:02:29,910 --> 00:02:32,310 it's automatically going to be assigned a new IP address, 71 00:02:32,310 --> 00:02:34,530 and that IP address will also be associated 72 00:02:34,530 --> 00:02:35,400 with the host name 73 00:02:35,400 --> 00:02:38,850 inside of your organization's internal DNS server too. 74 00:02:38,850 --> 00:02:40,800 Now, most IP address management solutions 75 00:02:40,800 --> 00:02:43,350 are also going to include comprehensive reporting features 76 00:02:43,350 --> 00:02:45,300 that you can use as a network administrator 77 00:02:45,300 --> 00:02:47,850 to get a deeper understanding of the network's performance, 78 00:02:47,850 --> 00:02:48,990 to detect anomalies, 79 00:02:48,990 --> 00:02:50,910 and then plan for any potential network changes 80 00:02:50,910 --> 00:02:52,710 or expansions in the future. 81 00:02:52,710 --> 00:02:54,930 IP address management also is going to be used 82 00:02:54,930 --> 00:02:57,450 by our cybersecurity teams to understand what devices 83 00:02:57,450 --> 00:02:59,190 have been allowed to connect to the network, 84 00:02:59,190 --> 00:03:00,510 what IP addresses they're using 85 00:03:00,510 --> 00:03:01,890 while they're connected to the network, 86 00:03:01,890 --> 00:03:03,450 and other things like that. 87 00:03:03,450 --> 00:03:04,920 Another security function provided 88 00:03:04,920 --> 00:03:06,750 by the IP address management system 89 00:03:06,750 --> 00:03:09,630 is its ability to help us identify any unauthorized devices 90 00:03:09,630 --> 00:03:11,040 or suspicious traffic patterns 91 00:03:11,040 --> 00:03:12,450 that are based on the different devices 92 00:03:12,450 --> 00:03:13,829 that are requesting IP addresses 93 00:03:13,829 --> 00:03:15,750 from your centralized management system. 94 00:03:15,750 --> 00:03:19,410 So remember, when it comes to IP address management or IPAM, 95 00:03:19,410 --> 00:03:20,790 what we're really talking about here 96 00:03:20,790 --> 00:03:22,650 is the methodology and a suite of tools 97 00:03:22,650 --> 00:03:24,030 that are used to plan, track, 98 00:03:24,030 --> 00:03:26,100 and manage the IP address space inside 99 00:03:26,100 --> 00:03:28,830 your organization's enterprise network infrastructure. 100 00:03:28,830 --> 00:03:31,080 Now, IP address management isn't just about adopting 101 00:03:31,080 --> 00:03:33,690 a new tool though, but it's also about a strategic shift 102 00:03:33,690 --> 00:03:35,310 in managing the foundational elements 103 00:03:35,310 --> 00:03:36,600 of our enterprise networks, 104 00:03:36,600 --> 00:03:39,060 so that we can enhance our network's efficiency, security, 105 00:03:39,060 --> 00:03:40,653 and resilience in the future.