Sample – High Level LAN Architecture Considerations
December 14, 2014Standards-based: Implementation, Monitoring and Break / Fix.
- Green Initiatives – reduce power, space, & cable plant requirements.
- High Speed Backup Infrastructure design.
- Wireless Standards for Trusted Laptops and BYOD.
- Deployment in new office build-outs.
- Implement Global LAN Multicast Architecture
- Migrate LAN infrastructure of recently acquired sites to corporate standards.
- Evaluate NextGen Data Center Network Architecture.
- Enhance Wireless and BYOD standards for Guest Workers.
- Develop Port-Level Authentication Control Architecture.
- Support Network Security objectives for segmentation and role-based access to network resources.
WAN MPLS Architecture
Standards-based Architecture in place.
- Client Connectivity Service Models Established.
- IPSEC encryption service offering available where required.
- Implement Global WAN Multicast Architecture.
- Enhance QOS architecture for Voice & Video.
- Evaluate GET VPN for NextGen Encryption Standard.
- Enhance traffic classification.
- and prioritization across WAN.
- Deploy NextGen encryption standard.
Extranet / Internet Architecture
Standard Extranet & Internet infrastructure deployed globally.
- Data Services consolidated regionally.
- Continue support for Global DC Consolidation Projects.
- Enhance FlexWorker Remote Access service models.
- Implement Out of Region Recovery Requirements for Inter-Agency applications.
- Provide a consistent infrastructure for system access across the global enterprise via secure private and public network access.
Network Security Architecture
- Next Gen architecture for Firewall, Intrusion Detection, Vulnerability Scanning, Web Proxy, DNS and Remote Access installed Globally.
- Centralized logging of network access for employees, clients and vendors in place.
- Evaluate Intrusion Prevention/Anomaly Detection Solutions
- Develop Cyber Security Architecture (DD0S).
- Implement NextGen Load Balancing Architecture.
- Enhance Risk Management processes in support of Compliance and Audit Requirements.
- Implement controls to protect voice services.
- Migrate from Device based to Entitlement based access controls for network resources.
- Integrate Logging Data Sources to support Event Correlation capability.
www.bestitdocuments.com