compliances , data-center-soc-noc , networking

Sample – High Level LAN Architecture Considerations

December 14, 2014

Standards-based: Implementation, Monitoring and Break / Fix.

  1. Green Initiatives – reduce power, space, & cable plant requirements.
  2. High Speed Backup Infrastructure design.
  3. Wireless Standards for Trusted Laptops and BYOD.
  4. Deployment in new office build-outs.
  5. Implement Global LAN Multicast Architecture
  6. Migrate LAN infrastructure of recently acquired sites to corporate standards.
  7. Evaluate NextGen Data Center Network Architecture.
  8. Enhance Wireless and BYOD standards for Guest Workers.
  9. Develop Port-Level Authentication Control Architecture.
  10. Support Network Security objectives for segmentation and role-based access to network resources.

WAN MPLS Architecture

Standards-based Architecture in place.

  1. Client Connectivity Service Models Established.
  2. IPSEC encryption service offering available where required.
  3. Implement Global WAN Multicast Architecture.
  4. Enhance QOS architecture for Voice & Video.
  5. Evaluate GET VPN for NextGen Encryption Standard.
  6. Enhance traffic classification.
  7. and prioritization across WAN.
  8. Deploy NextGen encryption standard.

Extranet / Internet Architecture

Standard Extranet & Internet infrastructure deployed globally.

  1. Data Services consolidated regionally.
  2. Continue support for Global DC Consolidation Projects.
  3. Enhance FlexWorker Remote Access service models.
  4. Implement Out of Region Recovery Requirements for Inter-Agency applications.
  5. Provide a consistent infrastructure for system access across the global enterprise via secure private and public network access.

Network Security Architecture

  1. Next Gen architecture for Firewall, Intrusion Detection, Vulnerability Scanning, Web Proxy, DNS and Remote Access installed Globally.
  2. Centralized logging of network access for employees, clients and vendors in place.
  3. Evaluate Intrusion Prevention/Anomaly Detection Solutions
  4. Develop Cyber Security Architecture (DD0S).
  5. Implement NextGen Load Balancing Architecture.
  6. Enhance Risk Management processes in support of Compliance and Audit Requirements.
  7. Implement controls to protect voice services.
  8. Migrate from Device based to Entitlement based access controls for network resources.
  9. Integrate Logging Data Sources to support Event Correlation capability.

www.bestitdocuments.com