How to take control of your network infrastructure. Table of contents
A table of contents for all articles in the series “How to Take Network Infrastructure Under Your Control” and links.
At the moment, 7 articles have been published:
Chapter 1. Retention
Chapter 2. Cleaning and documentation
Chapter 3. Network security. Part One
Chapter 3. Network Security. Part Two
Chapter 3. Network Security. Part Three
Chapter 4. Automation. Templates
Addition. About the three components necessary for the successful operation of IT.
There will be about 10 articles in total.
At the moment, 7 articles have been published:
Chapter 1. Retention
Chapter 2. Cleaning and documentation
Chapter 3. Network security. Part One
Chapter 3. Network Security. Part Two
Chapter 3. Network Security. Part Three
Chapter 4. Automation. Templates
Addition. About the three components necessary for the successful operation of IT.
There will be about 10 articles in total.
Chapter 1. Retention
- Equipment
- Emergency work
- Partners
- Backup
- Software version
- Ticket system
- Logging
- Monitoring
- Change control
- The processes
- Conclusion of the first part
- Addition. About the three components necessary for IT to work successfully
- Why is this not working?
- Three components
Chapter 2. Cleaning and documentation
- Set of documents
- Physical Switching Scheme
- Network diagrams
- Routing scheme
- L2 circuit (OSI)
- Typical Design Errors
- Typical Design L1 Layer Error (OSI)
- Typical Design L2 Layer Error (OSI)
- L3 Design Error Examples (OSI)
- Design Quality Assessment Criteria
- Changes
Chapter 3. Network Security
- Part one
- Hardware configuration audit (hardening)
- Design Security Audit
- DC (Public services DMZ and Intranet data center)
- Is a firewall necessary or not?
- Protection level
- Segmentation
- TCAM
- High availability
- Convenience in management
- DC (Public services DMZ and Intranet data center)
- Part two
- Design Security Audit (continued)
- Internet access
- Design
- Configure BGP
- DOS / DDOS protection
- Firewall traffic filtering
- Internet access
- Design Security Audit (continued)
- Part three
- Design Security Audit (continued)
- Office: Campus & Remote access VPN
- Architecture
- General principles
- Facilities
- Mobility
- Easy access to all company resources
- Availability of Internet resources
- "Fast work" network
- Remedies
- Zero trust
- High level of protection
- Network visibility
- Unified central authentication and authorization system
- Host checking
- About a sense of proportion and balance
- SAFE Analysis of Office Architecture
- Office: Campus & Remote access VPN
- Design Security Audit (continued)
- Part Four (coming soon)
- Design Security Audit (continued)
- Wan edge
- Branch
- Core
- Design Security Audit (continued)
- Part Four (coming soon)
- Access Audit
- Process audit
Chapter 4. Automation
- Part one
- DevOps for the web
- Project
- PAY, F5Y, ACY