Infrastructure Services


Network

1.1 NS (Authoritative DNS)

Description

The Domain Name System (DNS) translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.

The authoritative name servers provide these services for BFH owned domains.

Details


1.2 DNS (DNS Resolver)

Description

The Domain Name System (DNS) translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.

The DNS resolver provide name resolution for systems without their own resolver.

Details


1.3 DHCP

Description

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol, whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks.

Details


1.4 NDP

Description

The Neighbor Discovery Protocol (NDP) is a protocol used with Internet Protocol suite, Version 6 (IPv6). It is responsible for gathering various information required for internet communication, including the configuration of local connections and the domain name servers and gateways used to communicate with more distant systems.

Details


1.5 NTP

Description

The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

Details


1.6 PTP

Description

The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems.

Details


1.7 IP (Firewall)

Description

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Details


Access

2.1 SSH

Description

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.

Details


2.2 VPN

Description

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Details


Authentication and Authorization

3.1 LDAP

Description

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an IP network.

Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.

Details


3.2 MFA

Description

Details

3.3 NAC

Description

Details

3.4 RADIUS

Description

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service.

Details


Storage

4.1 NFS (Ceph)

Description

Details

4.2 RBD (Ceph)

Description

Details

4.3 S3 (Ceph)

Description

Details

4.4 SMB (Ceph)

Description

Details

4.5 Backup (Ceph)

Description

Details


Monitoring

5.1 Icinga

Description

Details

5.2 TICK

Description

Details

5.5 Netdata

Description

Details

5.6 LibreNMS

Description

Details

5.7 AKCP

Description

Details


Logging

6.1 Elastic

Description

Details

6.2 Elastiflow

Description

Details


Mail

7.1 SMTP

Description

Details


Web

8.1 Domains

Description

Wir bieten an, fuer bestimmte Zwecke Domains und die dazugehorigen Nameserver-Eintraege mit voller Kostenuebernahme aus unserem Budget zu registrieren und zu betreiben.

Dazu sind folgende Voraussetzungen kumulativ zu erfuellen:

Sind obige Anforderungen erfuellt, erfolgt eine Registration und Setup in der Regel innerhalb von 1h nach Einreichung des Tickets, spaetestens aber nach 24h.

Details

8.2 Redirects

Description

Details

8.3 Proxies

Description

Details

8.4 Load balancer

Description

Details


Security

9.1 WAF

Description

Details

9.2 X509 Certificates

Description

Details

9.3 SSH Certificate Authority

Description

Details

9.4 Vulnerability Scans

Description

Details


Support

10.1 Git

Description

Details

10.2 Sphinx

Description

Details

10.3 PXE

Description

Details

10.4 ZTP

Description

Details

10.5 WOL

Description

Details

10.6 IPAM

Description

Details