Professional Documents
Culture Documents
SUBMIT BY :
Vivek Hans
Jiwateshwar Singh
NOC
A network operations center (NOC) is a place from which
administrators supervise, monitor and maintain a
telecommunications network. Large enterprises with large
networks as well as large network service providers typically
have a network operations center, a room containing
visualizations of the network or networks that are being
monitored, workstations at which the detailed status of the
network can be seen, and the necessary software to manage the
networks.
WHY NOC???
Increase Network Availability
Decrease Staffing & Training Requirements
Optimize your Network’s Bandwidth Utilization
and Performance
Improve Productivity while Decreasing
Operational Costs
WHAT IT PROVIDES….
24x7x365 Monitoring
Problem Detection, Resolution and Notification
Performance Management
Network Optimization
Software Maintenance Upgrades
Configuration Backups
Trouble Tickets, Status, Performance & Utilization
Reports are all available via the Internet
Additional Services
Configuration management
The main objective of configuration management is to ensure the
continuous enforcement of firewall rules tailored to customer needs. It
applies to all equipment managed by the SOC and includes data
packet discard / acceptance rules between an external source and an
internal destination (or vice versa) based on:
– Source address.
– Destination address.
– Network protocol.
– Service protocol.
– Traffic log.
Configuration management may be performed remotely (remote
configuration management)
Reporting
It Includes :-
Vulnerability assessment
– The vulnerability assessment searches for known vulnerabilities of
systems and software installed. This is carried out through specific
technologies that are configured and customized for each
assessment
Penetration test
– The penetration test is performed to isolate and exploit known or
unknown vulnerabilities of systems, services and installed web
applications. It attempts to quantify the threat level represented on
each system and the impact. This activity is carried out either
through a number of technologies that are configured and
customized per assessment, or manually for each service, system,
and application.
Distributed denial of service (DDOS) mitigation