Table of contents for all articles in the series "How to take control of the network infrastructure" and links.
5 articles have been published so far:
Addition.
There will be about 10 articles in total.
Chapter 1
- Equipment
- emergency work
- Partners
- Backup
- Software versions
- Ticket system
- Logging
- Monitoring
- Change control
- Processes
- Conclusion of the first part
- Addition.
About three components necessary for successful IT work - Why doesn't it work?
- Three components
Chapter 2 Cleaning and Documentation
- Set of documents
- Physical Switching Diagram
- Network diagrams
- Routing scheme
- L2 scheme (OSI)
- Common Design Errors
- Typical L1 Layer Design Error (OSI)
- Typical L2 Layer Design Error (OSI)
- Examples of errors in L3 design (OSI)
- Design Quality Evaluation Criteria
- Changes
Chapter 3 Network Security
Part one - Hardware configuration audit (hardening)
- Design security audit
- DC (Public services DMZ and Intranet data center)
- Do you need a firewall or not?
- Protection level
- Segmentation
- CAGR
- High availability
- Ease of management
- DC (Public services DMZ and Intranet data center)
Part two - Security design audit (continued)
- Internet access
- Design
- Configuring BGP
- DOS/DDOS protection
- Firewall traffic filtering
- Internet access
- Security design audit (continued)
- Part three (coming soon)
- Security design audit (continued)
- Campus (Office) & Remote access VPN
- WAN edge
- Branch
- Core
- Security design audit (continued)
- Part four (coming soon)
- Access audit
- Process audit
Chapter 4 Changes (coming soon)
- DevOps
- Automation
Source: habr.com