Solved

network core healthchecks

Posted on 2013-11-18
3
261 Views
Last Modified: 2013-12-02
Does anyone know of any organisations who do health-checks/reviews of your organisations core network infrastructure? I.e. routing out poor designs, disasters waiting to happen, non conformance to best practice etc etc etc. I am specifically only after the physical layer of the network core, not server applications. I wondered if its common to get such an independent review of your setup? Have you ever been involved in such an assessment -  or no people that are?
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 7

Expert Comment

by:valmatic
ID: 39657106
You can probably get better free advice on here if you posted a drawing or some info about your setup than paying a consultant a crap load of money who will either say something basic like its fine, or the opposite this is all junk here is what i can sell you. Here you will get some honest opinions for free.
0
 
LVL 3

Author Comment

by:pma111
ID: 39657124
Fair point valmatic. I am from a risk section not a network tech section, my main area of responsibility is doing assessments of ERP apps/access control. But I was just intrigued what:

Typically falls under the banner of "core network infrastructure", i.e. can it be broken down into relevant "components" of core network infrastructure.
Typically falls under the banner of non core network infrastructure
What types of thing should be looked at from a risk angle when reviewing core network infrastructure, i.e. if you looking at risks/poor design/disasters waiting to happen.
0
 
LVL 7

Accepted Solution

by:
valmatic earned 500 total points
ID: 39657141
to start a basic topology of the network, Lays out the incoming internet lines all the back to the switches. Also how are those switches connected.
How many servers are there
Where are those plugged into on the map
What and where are the firewalls
Wi-fi APs ad security types
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now