A Brief Note On Peer And Peer ( P2p ) Applications Have No Knowledge Of The Underlying Network Topology
1473 Words6 Pages
10. Peer to Peer (P2P) applications have no knowledge of the underlying network topology. They also generate large amounts of undesired traffic. All P2P traffic must be policed and limit to eliminate network performance degradation caused by them.
11. QoS Policing must be configured for the undesired traffic and scavenger traffic classes over the WAN links.
12. Figures below depict the recommended classification and queuing methods for different traffic types. 13. Below table depict the recommended classification and queuing of different application traffic classes on DFS wide area network. D8. Data Replication
With the significant growth of data replication requirements between field missions and FTOC, and the associated WAN…show more content… 3. Applications for data replication over the VPN must include (but are not limited to) OnCourse, DataDomain, and Mail backups. Any other data replication related traffic should also be examined for feasibility of replicating over the VPN link.
4. The VPN between the mission and FTOC must be established using secure and strong encryption methods.
5. The maximum transmit/receive bandwidth limit parameters for VPN tunnels must comply with the FTOC’s recommendation. In general, the outbound traffic from the mission towards FTOC over the site-to-site VPN should not exceed more than 5-10mbps.
6. If it is required, Email routing to FTOC should be routed over the VPN not only to improve operational and performance related issues, but also to free up bandwidth from the primary WAN links for other business applications.
7. Establishment of VPN and data replication traffic related matters must be liaison with FTOC network managers.
D9. Event Logging
1. All the network devices must be configured with the centralized logging mechanisms and the active logs must be available at least for 90 days and the older logs must be archived and stored securely for later analysis requirements.
2. The logs from network infrastructure devices must be proactively monitored and analysed for any possible threats or attacks and must be addressed immediately for the threat mitigation and