How to take control of network infrastructure. Table of contents
Table of contents for all articles of the series "How to take control of the network infrastructure" and links.At the moment, 6 articles have been published:
Chapter 1. HoldChapter 2. Cleaning and DocumentationChapter 3. Network Security. Part oneChapter 3. Network Security. Part twoChapter 3. Network Security. Part three')
Addition.
About the three components necessary for the success of ITThere will be about 10 articles in total.
Chapter 2. Cleaning and Documentation
- Set of documents
- Physical switching circuit
- Network diagrams
- Routing scheme
- L2 scheme (OSI)
- Typical design errors
- Characteristic design-level error L1 (OSI)
- Characteristic design-level error L2 (OSI)
- Examples of errors in L3 (OSI) design
- Criteria for assessing the quality of design
- Changes
Chapter 3. Network Security
- Part one
- Hardware Configuration Audit (hardening)
- Audit design security
- DC (Public services DMZ and Intranet data center)
- Need or not firewall?
- Protection level
- Segmentation
- TCAM
- High availability
- Convenience in management
- Part two
- Audit design security (continued)
- Internet access
- Design
- BGP Setup
- DOS / DDOS protection
- Firewall traffic filtering
- Part three
- Audit design security (continued)
- Office: Campus & Remote access VPN
- Architecture
- General principles
- Facilities
- Mobility
- Easy access to all company resources
- Availability of Internet resources
- "Quick work" network
- Means of protection
- Zero trust
- High level of protection
- Network visibility
- Unified centralized authentication and authorization system
- Host checking
- About sense of proportion and balance
- SAFE office architecture analysis
- Part Four (coming soon)
- Audit design security (continued)
- Part Four (coming soon)
- Access Audit
- Process audit
Chapter 4. Changes (coming soon)
Source: https://habr.com/ru/post/447008/
All Articles