Advanced Search
Search Results
178 total results found
PKI & SSL/TLS
Overview The fundamental Diffie-Hellman key exchange is susceptible to a Man-in-the-Middle (MITM) attack because it lacks a mechanism for participants to authenticate each other's identity, allowing an attacker to establish two separate secret keys and decrypt...
Architecture & Network
Infrastructure Management
Services Documentation
Operations & Maintenance
High-Level Overview
Network Topology
Subnets LAB Main Media 10.0.0.0/24 VLAN 50 192.168.0.1/24 VLAN 0 192.168.2.0/24 VLAN 20 DMZ VPN Security 192.168.4.0/24 192.168.3.0/24
Security Policies
Firewall Zone Definitions (e.g., DMZ, LAN, IoT) Core Access Rules (e.g., Management access allowed only from specific VLAN)
Virtualization Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Cloud Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Configuration Management
Repository Structure and Location New Deployment/Provisioning Process
Storage Systems
Pool Layout and Redundancy Level (e.g., RAIDZ2) Dataset/Share Mount Points
Core Services Index
Table of all running services (Name, IP, Port, Purpose)
Monitoring
Dashboard URLs and Authentication Notes Key Metrics Being Tracked
DNS & DHCP
Configuration details and upstream DNS providers
Backup and Recovery Strategy
What is backed up (config/data), frequency, and retention policy Location of backup storage
Disaster Recovery
Step-by-step procedure for recovering a core system (e.g., Firewall) Service restoration order
Standard Procedures
Patching and Update Schedule Adding a New VM or Container Checklist