-
Documenting network:
- Mapping the network - logical and physical network maps
- Change management
- Managing cables
- System labeling
- Circuit labeling
- Patch panel labeling
- Baselines - point of reference
- Inventory management
-
Fault tolerance - maintain uptime in case of failure; adds complexity and cost.
-
Single device fault tolerance - RAID, redundant power supplies and redundant NICs.
-
Multiple device fault tolerance - server farms with load balancing and multiple network paths.
-
Redundancy and fault tolerance - redundant hardware components, RAID, UPS, clustering and load balancing.
-
High availability (HA) - includes many different components working together; higher costs.
-
NIC teaming - LBFO (Load Balancing/Fail Over); multiple network adapters; port aggregation; fault tolerance.
-
UPS (Uninterruptible Power Supply) - short-term backup power; can be offline, line-interactive or online.
-
Generators - long-term power backup; power an entire building
-
Dual-power supplies - redundant; hot-swappable.
-
Recovery sites:
- Cold site - no hardware, data, people.
- Warm site - only hardware available.
- Hot site - exact replica; stocked with hardware, updated.
-
Full backups - all selected data backup; takes a lot of time.
-
Incremental backups - all files changed since last incremental backup.
-
Differential backups - all files changed since the last full backup.
-
Snapshots - capture current configuration and data in cloud; revert to known state or rollback to known configuration.
-
Process monitoring:
- Log management
- Data graphing
- Port scanning
- Vulnerability scanning
- Patch management
- Baseline review
- Protocol analyzers
-
Event management:
- Interface monitoring
- SIEM (Security Information and Event Management)
- Syslog
- SNMP (Simple Network Management Protocol)
-
Remote access protocols:
- IPSec (IP Security) - security for OSI layer 3; confidentiality, integrity, standardized; AH (Authentication Header) and ESP (Encapsulation Security Payload).
- Site-to-Site VPNs - encrypt traffic between sites through public Internet.
- SSL VPN (Secure Sockets Layer VPN) - uses SSL/TLS protocol (tcp/443); authenticate users.
- Client-to-Site VPNs - remote access VPN.
- DTLS VPN (Datagram Transport Layer Security VPN) - transport using UDP instead of TCP.
- Remote desktop access - RDP (Microsoft Remote Desktop Protocol), VNC (Virtual Network Computing).
- SSH (Secure Shell) - encrypted console communication (tcp/22).
- File transferring - FTP (File Transfer Protocol), FTPS (FTP over SSL), SFTP (SSH FTP), TFTP (Trivial FTP).