How to take control of your network infrastructure. Table of contents

    A table of contents for all articles in the series “How to Take Network Infrastructure Under Your Control” and links.

    At the moment, 7 articles have been published:

    Chapter 1. Retention
    Chapter 2. Cleaning and documentation
    Chapter 3. Network security. Part One
    Chapter 3. Network Security. Part Two
    Chapter 3. Network Security. Part Three
    Chapter 4. Automation. Templates

    Addition. About the three components necessary for the successful operation of IT.

    There will be about 10 articles in total.


    Chapter 1. Retention



    Chapter 2. Cleaning and documentation


    • Set of documents
    • Physical Switching Scheme
    • Network diagrams
      • Routing scheme
      • L2 circuit (OSI)
    • Typical Design Errors
      • Typical Design L1 Layer Error (OSI)
      • Typical Design L2 Layer Error (OSI)
      • L3 Design Error Examples (OSI)
    • Design Quality Assessment Criteria
    • Changes

    Chapter 3. Network Security


    • Part one
      • Hardware configuration audit (hardening)
      • Design Security Audit
        • DC (Public services DMZ and Intranet data center)
          • Is a firewall necessary or not?
          • Protection level
          • Segmentation
          • TCAM
          • High availability
          • Convenience in management
      • Part two
        • Design Security Audit (continued)
          • Internet access
            • Design
            • Configure BGP
            • DOS / DDOS protection
            • Firewall traffic filtering
      • Part three
        • Design Security Audit (continued)
          • Office: Campus & Remote access VPN
            • Architecture
            • General principles
            • Facilities
              • Mobility
              • Easy access to all company resources
              • Availability of Internet resources
              • "Fast work" network
            • Remedies
              • Zero trust
              • High level of protection
              • Network visibility
              • Unified central authentication and authorization system
              • Host checking
            • About a sense of proportion and balance
            • SAFE Analysis of Office Architecture
      • Part Four (coming soon)
        • Design Security Audit (continued)
          • Wan edge
          • Branch
          • Core
      • Part Four (coming soon)
        • Access Audit
        • Process audit

    Chapter 4. Automation


    • Part one
      • DevOps for the web
      • Project
      • PAY, F5Y, ACY



    Also popular now: