1 Implementation Design
1.1 Topology
1.1.1 Current Topology
//Before you start implementation, you need to confirm with customer about topology to figure out some details, including change position, downlink/uplink devices, port links, and address table.
For example

1.1.2 Topology After Implementation
For example
This project focuses on replacing original Broder Router into 2 Sangfor NSF. The expected topology after implementation is as follows.

1.2 Traffic Specification
1.2.1 Current Traffic
For Example
This diagram is simple, since the traffic is clear.
1. Terminals ---> Internet
2. Internet ---> Data Center Server

1.2.2 Endpoint Protection Policy
For Example
According to confirmation with customer, we suggest that below security policies.
lTo All Users: Turn on botnet protection policy in order to cut off the traffic after terminals are infected.
lTo All Users: Turn on "Protection Endpoint" and "Anti-Malware" in IPS policy. Protect against risks caused by vulnerabilities in installed software being exploited or malware being installed.
lTo All Users: Turn on "URL Filter", for filtering illegal web sites.