Document Tag: network

G535 – Firewall Configuration

ITA Guideline G535 mandates firewall mechanisms in the DMZ to control access, ensuring secure routing, authentication, and traffic control for state networks.

Read Full Article

G530 – Wireless Local Area Network (LAN) Security

ITA Guideline G530 outlines measures for security of wireless LANs for state agency networks.

Read Full Article

S3550 – Network Connectivity and Transport – Structured Cabling

ITA Standard S3550 establishes guidelines for structured cabling systems in state agencies, ensuring reliable and efficient network connectivity and transport.

Read Full Article

S3540 – Network Connectivity and Transport – LAN Backbone

ITA Standard S3540 mandates robust LAN backbone connectivity for state agencies, ensuring secure and efficient network transport.

Read Full Article

S3530 – Network Connectivity and Transport – Wireless LAN

ITA Standard S3530 ensures secure and efficient Wireless LAN connectivity for state agencies, ensuring robust network transport and data integrity.

Read Full Article

S3520 – Network Connectivity and Transport – Local Area Network

ITA Standard S3520 mandates secure and efficient LAN connectivity within state agencies, ensuring robust network transport and data integrity.

Read Full Article

S3510 – Network Connectivity and Transport – Transport

ITA Standard S3510 outlines the requirements for secure and efficient network transport, ensuring reliable data transmission.

Read Full Article

S3131 – Network Services – Video Conference Dialing Plan

ITA Standard S3130 mandates security and operational protocols for video conferencing services to ensure secure and reliable communication.

Read Full Article

S3130 – Network Services – Video Conferencing

ITA Standard S3130 mandates security and operational protocols for video conferencing services to ensure secure and reliable communication.

Read Full Article

S3120 – Network Services – Data/Network Integrity

ITA Standard S3120 mandates measures to ensure the integrity and reliability of data and network services, preventing unauthorized alterations.

Read Full Article