Solved

network core healthchecks

Posted on 2013-11-18
3
263 Views
Last Modified: 2013-12-02
Does anyone know of any organisations who do health-checks/reviews of your organisations core network infrastructure? I.e. routing out poor designs, disasters waiting to happen, non conformance to best practice etc etc etc. I am specifically only after the physical layer of the network core, not server applications. I wondered if its common to get such an independent review of your setup? Have you ever been involved in such an assessment -  or no people that are?
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 7

Expert Comment

by:valmatic
ID: 39657106
You can probably get better free advice on here if you posted a drawing or some info about your setup than paying a consultant a crap load of money who will either say something basic like its fine, or the opposite this is all junk here is what i can sell you. Here you will get some honest opinions for free.
0
 
LVL 3

Author Comment

by:pma111
ID: 39657124
Fair point valmatic. I am from a risk section not a network tech section, my main area of responsibility is doing assessments of ERP apps/access control. But I was just intrigued what:

Typically falls under the banner of "core network infrastructure", i.e. can it be broken down into relevant "components" of core network infrastructure.
Typically falls under the banner of non core network infrastructure
What types of thing should be looked at from a risk angle when reviewing core network infrastructure, i.e. if you looking at risks/poor design/disasters waiting to happen.
0
 
LVL 7

Accepted Solution

by:
valmatic earned 500 total points
ID: 39657141
to start a basic topology of the network, Lays out the incoming internet lines all the back to the switches. Also how are those switches connected.
How many servers are there
Where are those plugged into on the map
What and where are the firewalls
Wi-fi APs ad security types
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let’s list some of the technologies that enable smooth teleworking. 
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now