logo

Network Design Configuration and Security

   

Added on  2022-11-13

19 Pages3997 Words243 Views
Running head: NETWORK DESIGN CONFIGURATION AND SECURITY
Network Design Configuration and Security
Name of the Student
Name of the University
Author Note
Network Design Configuration and Security_1
NETWORK DESIGN CONFIGURATION AND SECURITY1
Summary
The board members of Talon Textile Fasteners (TTF) have realised that in order to continue
progressing the company needs a major upgrade of their network infrastructure. The report
analyses the network requirements of TTF and proposes the upgraded network design to meet
the various demands of their business expansion. First the report provides a summary of
requirements and presenting the device needs in a tabular format. Then this report jumps to
the network proposal section and suggests the design with the help of a design diagram while
also explaining the network configuration and addressing. Thereafter the various components
of TTF network’s active directory get discussed according to the user groups, the Sites and
the Organizational Units with careful attention given towards role of users as per their
respective domains and organizational units. Then this report describes the server roles and
their layouts along with the necessary project related documents as in user sign off, server
task lists and the server test plan. Following that, the report provides the plans for
maintenance and afterwards lists down the specifications for the routers and servers installed.
Then, after talking about the security policies and measures of the network, the report ends
with observations in the conclusions section.
Network Design Configuration and Security_2
NETWORK DESIGN CONFIGURATION AND SECURITY2
Table of Contents
Introduction................................................................................................................................4
Requirements Summary.............................................................................................................4
Proposed Design of the Network...............................................................................................5
Network Addressing Details..................................................................................................6
Virtual Computing Environment for TTF..................................................................................6
Virtual machines an Operating System..................................................................................6
Configuration.........................................................................................................................7
Security..................................................................................................................................7
Active Directory Configuration.................................................................................................7
AD Site...................................................................................................................................7
AD Organizational Unit.........................................................................................................7
AD Grouping..........................................................................................................................8
Data Entry Officer (Domain User).........................................................................................8
Manufacturing Supervisor (Global Administrator)................................................................8
Sales Manager (Domain User)...............................................................................................8
Operations Manager (Domain User)......................................................................................9
CEO, CFO, CIO (Global User)..............................................................................................9
IT Administrator (Global Administrator)...............................................................................9
Server Specifications..................................................................................................................9
Count and Placement..............................................................................................................9
Server Roles...........................................................................................................................9
Network Design Configuration and Security_3
NETWORK DESIGN CONFIGURATION AND SECURITY3
Approval Sign-off Document...............................................................................................10
Server Task List...................................................................................................................10
Server Test Plan...................................................................................................................11
Server maintenance plan......................................................................................................11
Router Specifications...............................................................................................................12
Security plan and policy...........................................................................................................12
Perimeter Design..................................................................................................................12
Remote Access.....................................................................................................................13
Site to Site Links..................................................................................................................13
Defence in Depth..................................................................................................................13
Security Auditing and Monitoring.......................................................................................14
Threat Identification.............................................................................................................14
Risk Analysis.......................................................................................................................14
Response Procedure.............................................................................................................15
Conclusion................................................................................................................................15
Bibliography.............................................................................................................................16
Network Design Configuration and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Design and Directory Structure of TTF
|16
|2928
|115

Network Design and Implementation Plan.
|19
|3503
|206

IT Networking in Talon Textile
|10
|2476
|148

Assignment on Network Design and Implementation
|18
|3281
|32

Network Design Assignment (Doc)
|20
|5604
|583

Network Infrastructure Upgrade for TTF
|14
|1973
|98