Network Security Checklist

The following is a list of best practices for network design and configuration.

Consider the following when designing your network:
  • Ensure a minimum of three zones available: outer zone for web servers and load balancers, middle tier for application servers and buses, inner tier for databases and network systems.
  • Configure network using VLAN to separate for security and bandwidth isolation.
  • Configure different networks to use separate virtual network interfaces and/or VLANs where possible. You can also use service mesh configurations or Kubernetes network policies.
  • Place firewalls between each network zone.
  • Separate test and production networks.
  • Set network parameters for hosts only.
  • Set up firewall allow list ports.
    Note: MATRIXX requires that you include several ports in firewall allow lists to allow specific communications. This includes Diameter traffic, 5G SBA traffic, traffic for other MATRIXX gateways and web apps, SNMP traffic, and inter-engine traffic for geo-redundancy. For more information, see the discussion about the firewall allow list ports.