{"id":85,"date":"2016-10-13T08:36:04","date_gmt":"2016-10-13T06:36:04","guid":{"rendered":"https:\/\/www.informatique-chambery.fr\/?page_id=85"},"modified":"2021-07-02T16:12:01","modified_gmt":"2021-07-02T14:12:01","slug":"reseaux-et-securite","status":"publish","type":"page","link":"https:\/\/www.informatique-chambery.fr\/?page_id=85","title":{"rendered":"R\u00e9seaux et s\u00e9curit\u00e9"},"content":{"rendered":"<p>La s\u00e9curit\u00e9 de vos r\u00e9seaux d\u00e9pend de tous les \u00e9l\u00e9ments qui y sont connect\u00e9s. Un audit de vos syst\u00e8mes permettra de d\u00e9celer les points faibles de vos installations, et de d\u00e9finir les am\u00e9liorations \u00e0 r\u00e9aliser.<\/p>\n<p>Vos postes clients et serveurs sont interconnect\u00e9s sur un r\u00e9seau d&rsquo;entreprise, ils doivent pouvoir communiquer sans faille ni interruption de service. Ces \u00e9l\u00e9ments mat\u00e9riels (routeurs, commutateurs, serveurs, ordinateurs&#8230;) ne doivent pas \u00eatre la source d&rsquo;erreurs ou de d\u00e9faillance.<\/p>\n<div id=\"attachment_112\" style=\"width: 613px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-112\" class=\"wp-image-112\" src=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg\" alt=\"wan-diagram\" width=\"603\" height=\"426\" \/><p id=\"caption-attachment-112\" class=\"wp-caption-text\">Diagramme installation de mat\u00e9riels sur les r\u00e9seaux<\/p><\/div>\n<p>Tout ces mat\u00e9riels doivent \u00eatre administr\u00e9 de fa\u00e7on optimale pour stabiliser et s\u00e9curiser vos r\u00e9seaux. Il faudra limiter les acc\u00e8s aux seuls machines, services ou personnes reconnus, cr\u00e9er des \u00ab\u00a0zones\u00a0\u00bb DMZ pour les services accessibles via internet, param\u00e9trer et administrer au plus juste le routage et transferts de ports&#8230;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 de vos r\u00e9seaux d\u00e9pend de tous les \u00e9l\u00e9ments qui y sont connect\u00e9s. Un audit de vos syst\u00e8mes permettra de d\u00e9celer les points faibles de vos installations, et de d\u00e9finir les am\u00e9liorations \u00e0 r\u00e9aliser. Vos postes clients et serveurs sont interconnect\u00e9s sur un r\u00e9seau d&rsquo;entreprise, ils doivent pouvoir communiquer sans faille ni interruption de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-85","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry<\/title>\n<meta name=\"description\" content=\"Nous vous proposons l&#039;installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.informatique-chambery.fr\/?page_id=85\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry\" \/>\n<meta name=\"twitter:description\" content=\"Nous vous proposons l&#039;installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg\" \/>\n<meta name=\"twitter:site\" content=\"@WwwMicrosystem\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85\",\"name\":\"R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/WAN-Diagram.jpeg\",\"datePublished\":\"2016-10-13T06:36:04+00:00\",\"dateModified\":\"2021-07-02T14:12:01+00:00\",\"description\":\"Nous vous proposons l'installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85#primaryimage\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/WAN-Diagram.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/WAN-Diagram.jpeg\",\"width\":1169,\"height\":826},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?page_id=85#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"R\u00e9seaux et s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\",\"name\":\"Microsystem : Informatique Chamb\u00e9ry\",\"description\":\"Installation | Maintenance  |  S\u00e9curit\u00e9 syst\u00e8mes et r\u00e9seaux | t\u00e9l : 09.72.57.79.25\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#organization\",\"name\":\"Informatique Pro\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Capture-du-2018-12-29-21-55-59.png\",\"contentUrl\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Capture-du-2018-12-29-21-55-59.png\",\"width\":747,\"height\":342,\"caption\":\"Informatique Pro\"},\"image\":{\"@id\":\"https:\\\/\\\/www.informatique-chambery.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/WwwMicrosystem\",\"https:\\\/\\\/fr.linkedin.com\\\/in\\\/michel-tepes-596759bb\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry","description":"Nous vous proposons l'installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.informatique-chambery.fr\/?page_id=85","twitter_card":"summary_large_image","twitter_title":"R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry","twitter_description":"Nous vous proposons l'installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...","twitter_image":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg","twitter_site":"@WwwMicrosystem","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85","url":"https:\/\/www.informatique-chambery.fr\/?page_id=85","name":"R\u00e9seaux et s\u00e9curit\u00e9 | Microsystem : Informatique Chamb\u00e9ry","isPartOf":{"@id":"https:\/\/www.informatique-chambery.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85#primaryimage"},"image":{"@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85#primaryimage"},"thumbnailUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg","datePublished":"2016-10-13T06:36:04+00:00","dateModified":"2021-07-02T14:12:01+00:00","description":"Nous vous proposons l'installation et la s\u00e9curisation de vos r\u00e9seaux informatiques : routage, param\u00e9trages, transfert de ports...","breadcrumb":{"@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.informatique-chambery.fr\/?page_id=85"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85#primaryimage","url":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg","contentUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2016\/10\/WAN-Diagram.jpeg","width":1169,"height":826},{"@type":"BreadcrumbList","@id":"https:\/\/www.informatique-chambery.fr\/?page_id=85#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.informatique-chambery.fr\/"},{"@type":"ListItem","position":2,"name":"R\u00e9seaux et s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.informatique-chambery.fr\/#website","url":"https:\/\/www.informatique-chambery.fr\/","name":"Microsystem : Informatique Chamb\u00e9ry","description":"Installation | Maintenance  |  S\u00e9curit\u00e9 syst\u00e8mes et r\u00e9seaux | t\u00e9l : 09.72.57.79.25","publisher":{"@id":"https:\/\/www.informatique-chambery.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.informatique-chambery.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.informatique-chambery.fr\/#organization","name":"Informatique Pro","url":"https:\/\/www.informatique-chambery.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2019\/01\/Capture-du-2018-12-29-21-55-59.png","contentUrl":"https:\/\/www.informatique-chambery.fr\/wp-content\/uploads\/2019\/01\/Capture-du-2018-12-29-21-55-59.png","width":747,"height":342,"caption":"Informatique Pro"},"image":{"@id":"https:\/\/www.informatique-chambery.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/WwwMicrosystem","https:\/\/fr.linkedin.com\/in\/michel-tepes-596759bb"]}]}},"_links":{"self":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/pages\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=85"}],"version-history":[{"count":7,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/pages\/85\/revisions"}],"predecessor-version":[{"id":114,"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=\/wp\/v2\/pages\/85\/revisions\/114"}],"wp:attachment":[{"href":"https:\/\/www.informatique-chambery.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}