Difference between revisions of "Template:Network Architecture"

From IVS Wiki
Jump to: navigation, search
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
{{Section | title = <h1>Network Architecture</h1> | content =
 
{{Section | title = <h1>Network Architecture</h1> | content =
 
<div class="floating_card">The network architecture for a VALT solution can look different for many of our customers.</div>
 
 
Below is a typical standard suggested network architecture diagram.  We see this architecture often used in Law Enforcement & Simulation, as well as other environments, where security is important and segmenting access to only the necessary ports / devices is desired but in transit encryption is not a requirement.
 
 
{{img - no_click | file = specific-6.jpg}}
 
 
<hr>
 
 
If LDAP is being used, the server will also need access to the authentication server(s) as shown below.  For LDAP integration using our software, we will also need a bind account and password with read-only access to LDAP.
 
 
{{img - no_click | file = specific-7.jpg}}
 
 
<hr>
 
 
 
Below is a diagram of a sensitive network environment, where in-transit encryption is a requirement.  This type of network architecture is typical of environments that are using the system to capture / observe actual patient interactions within clinical training environments.
 
Below is a diagram of a sensitive network environment, where in-transit encryption is a requirement.  This type of network architecture is typical of environments that are using the system to capture / observe actual patient interactions within clinical training environments.
  
For SSL, we will need the customer to set up a DNS name for the server (example ivs-valt.mysite.edu).  We will also need a wildcard or generated signed certificate that is compatible with nginx and can be applied by an IVS engineer. LetsEncrypt may also be utilized.
+
{{img - resize| file = Network_testing_img.webp}}
 
 
{{img - no_click | file = specific-8.jpg}}
 
 
 
<hr>
 
  
If LDAP is being used, the server will also need access to the authentication server(s) as shown below.  For LDAP integration within our software, we will also need a bind account and password with read-only access to LDAP.
 
  
{{img - no_click | file = specific-9.jpg}}
+
{{Aside - Helpful | content = Want to see more information about our [[Network Requirements]]?}}
 
}}
 
}}

Latest revision as of 15:38, 23 January 2026

Network Architecture

Below is a diagram of a sensitive network environment, where in-transit encryption is a requirement. This type of network architecture is typical of environments that are using the system to capture / observe actual patient interactions within clinical training environments.

Network testing img.webp


🕮
Want to see more information about our Network Requirements?