没有合适的资源?快使用搜索试试~ 我知道了~
某大型集团园区信息化基础设施改造总承包项目技术解决方案
需积分: 10 9 下载量 118 浏览量
2022-07-15
09:09:27
上传
评论 1
收藏 13.76MB DOCX 举报
温馨提示
某大型集团公司计划对园区网络进行改造,旨在建设一套灵活方便、安全先进、涵盖全面的专业信息化基础设施,用于支撑集团整体信息化系统架构,以达到提高企业生产运营效率,降低运营风险和成本,从而提高企业整体管理水平和持续经营的能力。包括园区光缆布线、数据中心机房系统、网络和安全系统。 项目主要包括,园区数据中心机房设计建设、园区网络改造、安全系统建设及网络安全等保2.0认证,设计施工及实施。 项目计划根据园区地形情况,进行园区星型结构环形布缆,起点从办公楼数据中心机房,经过不同的分厂节点,终点回到办公楼数据中心机房,避免光缆被挖断或不可控因素造成的通信中断,影响业务正常运行。
资源详情
资源评论
资源推荐

某大型集团
园区信息化基础设施改造总承包项目
技术方案
编制人:
审核人:
批准人:

目录
1 项目概述 ......................................................................................................................................5
1.1 项目背景 ...........................................................................................................................5
1.2 项目建设目标 ...................................................................................................................6
2 项目建设总体设计 ......................................................................................................................7
2.1 方案设计标准及规范 .......................................................................................................7
2.2 方案设计原则 ...................................................................................................................8
2.3 方案总体设计 .................................................................................................................10
3 数据中心机房建设 ....................................................................................................................10
3.1 模块化数据中心 .............................................................................................................15
3.1.1 微模块数据中心结构 ..........................................................................................16
3.1.2 微模块系统特点 ..................................................................................................17
3.1.3 模块化数据中心优势.........................................................................................19
3.2 数据中心布局规划 .........................................................................................................19
3.2.1 机房平面布局图 ..................................................................................................20
3.2.2 机房照明布局图 ..................................................................................................21
3.2.3 机房墙板大样图 ..................................................................................................21
3.2.4 机房截面和吊顶节点示意图...............................................................................22
3.2.5 机房接地示意图 ..................................................................................................22
3.2.6 机房防静电地板布局图.......................................................................................23
3.2.7 机房吊顶安装示意图 ..........................................................................................23
3.2.8 机房防静电地板安装示意图...............................................................................24
3.2.9 机房安防设备布局图 ..........................................................................................24
3.2.10 机房等电位连接图 ............................................................................................25
3.3 机房配电工程 .................................................................................................................25
3.3.1 精密列头柜说明 ..................................................................................................25
3.3.2 小母线配电方案 ..................................................................................................26
3.3.3 供配电及 UPS 系统设计 ......................................................................................29
3.3.4 供电配电构架 ......................................................................................................31
3.3.5 机房制冷系统设计 ................................................................................................2
3.3.6 密闭通道系统 ........................................................................................................5
3.4 综合监控管理平台 ...........................................................................................................7
3.4.1 系统架构 ................................................................................................................7
3.4.2 监控软件功能介绍 ................................................................................................8
3.4.3 监控可视化 ............................................................................................................9
3.5 机房天面工程.................................................................................................................10
3.6 机房墙面工程.................................................................................................................11
3.7 机房地面工程.................................................................................................................13
3.8 静电地板.........................................................................................................................14
3.9 机房照明系统.................................................................................................................16
3.10 防雷接地系统...............................................................................................................16
3.11 机房隔断.......................................................................................................................17

3.12 机房消防系统设计说明 ...............................................................................................18
3.13 机房门禁控制系统设计说明........................................................................................19
3.14 机房监控系统设计说明 ...............................................................................................20
4 网络安全建设 ............................................................................................................................21
4.1 物理环境安全 .................................................................................................................22
4.2 通信网络安全 .................................................................................................................22
4.2.1 安全区域划分 ......................................................................................................22
4.2.2 关键网络设备冗余 ..............................................................................................23
4.2.3 通信链路加密 ......................................................................................................23
4.3 区域边界安全 .................................................................................................................23
4.3.1 跨边界通信访问控制 ..........................................................................................23
4.3.2 入侵防范 ..............................................................................................................23
4.3.3 非法外联监控 ......................................................................................................23
4.3.4 全流量威胁感知系统 ..........................................................................................24
4.3.5 Web 攻击检测与防御...........................................................................................24
4.3.6 上网行为管理 ......................................................................................................24
4.4 计算环境安全 .................................................................................................................24
4.4.1 主机身份鉴别 ......................................................................................................24
4.4.2 访问控制 ..............................................................................................................25
4.4.3 系统安全审计 ......................................................................................................25
4.4.4 用户数据完整性保护 ..........................................................................................25
4.4.5 日志统一收集与分析 ..........................................................................................26
4.4.6 恶意代码防范 ......................................................................................................26
4.5 数据安全 .........................................................................................................................26
4.5.1 数据库防护与审计 ..............................................................................................26
4.6 安全运营中心建设 .........................................................................................................26
4.6.1 指挥运营中心 ......................................................................................................27
4.6.2 安全态势 ..............................................................................................................27
4.6.3 安全事件管理 ......................................................................................................29
4.6.4 ATT&CK 攻击热力图 ............................................................................................30
4.6.5 威胁溯源 ..............................................................................................................30
4.6.6 资产风险评估 ......................................................................................................30
4.6.7 自动化报告 ..........................................................................................................31
4.6.8 安全知识库 ..........................................................................................................31
4.6.9 持续评估 ..............................................................................................................31
4.6.10 预案编排与自动化响应 ....................................................................................32
4.6.11 指挥调度 ............................................................................................................32
4.6.12 检测分析中心 ....................................................................................................33
4.6.13 情报检测分析 ....................................................................................................33
4.6.14 样本查杀检测 ....................................................................................................34
4.6.15 关联分析 ............................................................................................................35
4.6.16 终端行为分析 ....................................................................................................36
4.6.17 网络行为分析 ....................................................................................................36
4.6.18 APT 检测 ..............................................................................................................36

4.6.19 大数据中心 ........................................................................................................37
4.6.20 多样化异构数据采集 ........................................................................................37
4.6.21 数据解析与标准化 ............................................................................................38
4.6.22 多种类数据丰富化 ............................................................................................38
4.6.23 海量数据存储 ....................................................................................................38
4.6.24 全方位数据检索与分析 ....................................................................................39
4.7 安全管理体系 .................................................................................................................39
4.7.1 安全策略和管理制度 ..........................................................................................39
4.7.2 安全管理机构和人员 ..........................................................................................41
4.8 安全建设管理 .................................................................................................................43
4.8.1 系统规划设计阶段 ..............................................................................................43
4.8.2 系统开发阶段 ......................................................................................................43
4.8.3 系统发布阶段 ......................................................................................................43
4.9 安全运维管理 .................................................................................................................44
4.9.1 安全管理中心 ......................................................................................................44
4.9.2 漏洞和风险管理 ..................................................................................................45
4.9.3 外包运维管理 ......................................................................................................45
4.9.4 配置及变更管理 ..................................................................................................46
4.10 安全等保测评 ...............................................................................................................47
4.10.1 系统定级 ............................................................................................................47
4.10.2 测评依据 ............................................................................................................47
4.10.3 测评范围 ............................................................................................................48
4.10.4 安全要求 ............................................................................................................48
4.10.5 测评内容要求 ....................................................................................................48
4.10.6 测评方法 ............................................................................................................49
4.10.7 测评服务成果 ....................................................................................................49
5 园区光缆施工 ............................................................................................................................49
5.1 园区管道光缆敷设 .........................................................................................................49
5.2 园区直埋光缆敷设 .........................................................................................................52
5.3 回填土要求 .....................................................................................................................54
5.4 架空光缆敷设 .................................................................................................................55
5.5 引上光缆敷设 .................................................................................................................58
5.6 墙壁光缆敷设 .................................................................................................................59
5.7 楼道光缆敷设 .................................................................................................................60
5.8 光缆接续 .........................................................................................................................62
5.9 光缆成端 .........................................................................................................................65
5.10 光交箱施工 ...................................................................................................................67
5.11 光分纤箱施工 ...............................................................................................................69
5.12 光分路箱施工 ..............................................................................................................69
5.13 光纤资源标签 ...............................................................................................................73
6 园区骨干网络建设 ....................................................................................................................74
6.1 升级网络架构,简化网络拓扑......................................................................................74
6.2 简化网络管理运维 .........................................................................................................74

6.3 厂区网络设计 .................................................................................................................74
6.4 核心环网 .........................................................................................................................75
6.5 汇聚层 .............................................................................................................................75
6.6 接入层 .............................................................................................................................76
6.7 网络管理区 .....................................................................................................................76
6.8 服务器区 .........................................................................................................................76
6.9 5G 接入区.........................................................................................................................77
6.10 网络区域划分 ...............................................................................................................77
6.11 地址资源规划设计 .......................................................................................................77
1 项目概述
1.1 项目背景
随着企业行业信息化建设的迅猛发展,信息系统系统在日常工作中的基础性、
全局性作用日益突出。但与此同时,随着全球网络安全态势的日趋严峻,各类新
型网络攻击形式层出不穷,信息系统的业务运行、数据资产的安全防护等也面临
着巨大的网络安全风险与挑战。
近几年来,网络信息安全事件频繁发生。从企业遭遇网络安全事件泄露用户
数据,到个人因垃圾短信、诈骗信息、信息泄露等造成经济损失,对网络信息的
攻击、侵入、干扰、破坏和非法使用的案例层出不穷。在这一背景下,国家制定
了《网络安全法》,从网络产品、服务、运营、信息安全以及检测、早期诊断、
应急响应和报告等方面提出了较全面的要求。通观《网络安全法》,其对“网络
运营者”的定义几乎适用于所有拥有或管理网络的企业。换而言之,在等保制度
被提升到法律层面后,开展网络安全等级保护成为了企业义不容辞的信息安全义
剩余109页未读,继续阅读

















军哥系统集成号
- 粉丝: 580
- 资源: 153
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 直齿轮裂纹对摩擦时变啮合刚度的影响:基于Matlab程序的研究分析,直齿轮裂纹与摩擦影响下时变啮合刚度仿真分析算法matlab实现,直齿轮裂纹,摩擦时变啮合刚度matlab程序 ,直齿轮裂纹; 啮合刚
- 3步集成DeepSeek搜索API:从RESTful调用到结果优化全流程.pdf
- 5分钟搞定DeepSeekAPI密钥申请与OpenAISDK无缝迁移指南.pdf
- 5分钟快速入门:DeepSeek私有化部署与GPU资源分配指南.pdf
- 5分钟快速上手:DeepSeekAPI调用全流程详解.pdf
- 10倍效率提升!DeepSeek多Token预测功能的代码级优化.pdf
- 10分钟掌握DeepSeekAPI调用:从注册到第一个请求的完整流程解析.pdf
- 10分钟掌握DeepSeekAPI核心调用:从密钥获取到Python、Node.js实战示例.pdf
- 13个场景化案例:用DeepSeekAPI实现代码生成与文本改写.pdf
- 10个DeepSeekAPI必知技巧:从鉴权到流式处理的开发全指南.pdf
- 128Ktokens长上下文处理:DeepSeek-R1打破行业限制的技术突破.pdf
- 64K上下文长度压测:DeepSeek-V3模型Token消耗优化全解析.pdf
- 128k超长文本处理:DeepSeekV3技术白皮书核心能力解密.pdf
- API成本直降95%!DeepSeek缓存机制与批量请求实战.pdf
- API安全攻防战:DeepSeek接口鉴权漏洞扫描与OAuth2.0加固方案.pdf
- 2025年人工智能变革元年-DeepSeek引领AI算法与应用新时代
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0