Professional Documents
Culture Documents
There is also a monthly fee of around 15KM while the ATM is connected to the national
network system.
This would be the architecture of ATM connections:
Headquarters to ATM
ATM Switch Hos --> ATM Gateway -->Internet Cloud--->Bank Router ---> Firewall-->Layer Switch->Distribution Switch --->Access Switch ---> ATM Machine
Branch Office to ATM
ATM Switch Hos --> ATM Gateway -->Internet Cloud--->Bank Router ---> Firewall--->HO
VPN Router-->VPN Cloud ---> Branch VPN Router --->Branch ATM Machine
Today, a bank must keep up with current trends toward automation, mobility, and improved
online services. Any performance hit or service outage cannot be tolerated. When migrating a
service to a hybrid cloud or monitoring one which is already hosted here, I consider
implementing performance based management to measure and ensure customer service levels.
Any delay, loss, or outage will be quickly alerted and identified to IT, enabling them to begin
the path to resolution before there is a huge impact to customers. Instead of reactive analysis
after a problem strikes, banks need to implement proactive analysis with reaction models in
place in the event of an issue. This architecture will be covered by monitoring tools that will
allow you detailed performance and usage of the banking system all over Bosnia and
Herzegovina.
Bank Data Center Protection
All devices are secured for both primary and optional disaster recovery data centers and will
be hosted in the bank itself. For that purpose we will be using Border guards grouped in pools
to provide remote access connections. Border guards will be extended to all 5 branches and 20
ATM machines and compact Border Guards will enable secure sessions between headquarter
servers and other branches.
As a solution for this, we would propose Blue Ridge architecture, already tested and repeated
no vulnerabilities which include cyber security architecture locks down networks:
-
preventing unauthorized access and protecting against malicious code (malware), data
leakage, and network attacks
The Blue Ridge security approach establishes trust in a companys core infrastructure and
then extends that trust to each network tunnel, LAN, remote device, computer, employee, and
authorized agent.
Total price for installing the network (Computers and other IT equipment are not included):
-
My conclusion is that ATM machines are not bringing money to banks directly, but they are
necessary for successful business and in the end, this high price will pay off.
Literature:
1. http://searchnetworking.techtarget.com/news/541675/VPN-security-via-ATMbackbone
2. https://community.spiceworks.com/topic/243372-remote-atm-network-connections
3. http://www.ping.ba/proizvodi/bankarski-proizvodi/
4. http://www.safesystems.com/blog/2016/02/three-different-approaches-to-managingyour-banks-wan/
5. https://www.bhtelecom.ba/pregled_stanja_mreze+M5405c9ee95f.html
6. https://www.tieto.com/industries/financial-services/it-solutions-banks-and-financialinstitutions