Network Design Configuration and Security
Added on 2022-11-13
19 Pages3997 Words243 Views
Running head: NETWORK DESIGN CONFIGURATION AND SECURITY
Network Design Configuration and Security
Name of the Student
Name of the University
Author Note
Network Design Configuration and Security
Name of the Student
Name of the University
Author Note
NETWORK DESIGN CONFIGURATION AND SECURITY1
Summary
The board members of Talon Textile Fasteners (TTF) have realised that in order to continue
progressing the company needs a major upgrade of their network infrastructure. The report
analyses the network requirements of TTF and proposes the upgraded network design to meet
the various demands of their business expansion. First the report provides a summary of
requirements and presenting the device needs in a tabular format. Then this report jumps to
the network proposal section and suggests the design with the help of a design diagram while
also explaining the network configuration and addressing. Thereafter the various components
of TTF network’s active directory get discussed according to the user groups, the Sites and
the Organizational Units with careful attention given towards role of users as per their
respective domains and organizational units. Then this report describes the server roles and
their layouts along with the necessary project related documents as in user sign off, server
task lists and the server test plan. Following that, the report provides the plans for
maintenance and afterwards lists down the specifications for the routers and servers installed.
Then, after talking about the security policies and measures of the network, the report ends
with observations in the conclusions section.
Summary
The board members of Talon Textile Fasteners (TTF) have realised that in order to continue
progressing the company needs a major upgrade of their network infrastructure. The report
analyses the network requirements of TTF and proposes the upgraded network design to meet
the various demands of their business expansion. First the report provides a summary of
requirements and presenting the device needs in a tabular format. Then this report jumps to
the network proposal section and suggests the design with the help of a design diagram while
also explaining the network configuration and addressing. Thereafter the various components
of TTF network’s active directory get discussed according to the user groups, the Sites and
the Organizational Units with careful attention given towards role of users as per their
respective domains and organizational units. Then this report describes the server roles and
their layouts along with the necessary project related documents as in user sign off, server
task lists and the server test plan. Following that, the report provides the plans for
maintenance and afterwards lists down the specifications for the routers and servers installed.
Then, after talking about the security policies and measures of the network, the report ends
with observations in the conclusions section.
NETWORK DESIGN CONFIGURATION AND SECURITY2
Table of Contents
Introduction................................................................................................................................4
Requirements Summary.............................................................................................................4
Proposed Design of the Network...............................................................................................5
Network Addressing Details..................................................................................................6
Virtual Computing Environment for TTF..................................................................................6
Virtual machines an Operating System..................................................................................6
Configuration.........................................................................................................................7
Security..................................................................................................................................7
Active Directory Configuration.................................................................................................7
AD Site...................................................................................................................................7
AD Organizational Unit.........................................................................................................7
AD Grouping..........................................................................................................................8
Data Entry Officer (Domain User).........................................................................................8
Manufacturing Supervisor (Global Administrator)................................................................8
Sales Manager (Domain User)...............................................................................................8
Operations Manager (Domain User)......................................................................................9
CEO, CFO, CIO (Global User)..............................................................................................9
IT Administrator (Global Administrator)...............................................................................9
Server Specifications..................................................................................................................9
Count and Placement..............................................................................................................9
Server Roles...........................................................................................................................9
Table of Contents
Introduction................................................................................................................................4
Requirements Summary.............................................................................................................4
Proposed Design of the Network...............................................................................................5
Network Addressing Details..................................................................................................6
Virtual Computing Environment for TTF..................................................................................6
Virtual machines an Operating System..................................................................................6
Configuration.........................................................................................................................7
Security..................................................................................................................................7
Active Directory Configuration.................................................................................................7
AD Site...................................................................................................................................7
AD Organizational Unit.........................................................................................................7
AD Grouping..........................................................................................................................8
Data Entry Officer (Domain User).........................................................................................8
Manufacturing Supervisor (Global Administrator)................................................................8
Sales Manager (Domain User)...............................................................................................8
Operations Manager (Domain User)......................................................................................9
CEO, CFO, CIO (Global User)..............................................................................................9
IT Administrator (Global Administrator)...............................................................................9
Server Specifications..................................................................................................................9
Count and Placement..............................................................................................................9
Server Roles...........................................................................................................................9
NETWORK DESIGN CONFIGURATION AND SECURITY3
Approval Sign-off Document...............................................................................................10
Server Task List...................................................................................................................10
Server Test Plan...................................................................................................................11
Server maintenance plan......................................................................................................11
Router Specifications...............................................................................................................12
Security plan and policy...........................................................................................................12
Perimeter Design..................................................................................................................12
Remote Access.....................................................................................................................13
Site to Site Links..................................................................................................................13
Defence in Depth..................................................................................................................13
Security Auditing and Monitoring.......................................................................................14
Threat Identification.............................................................................................................14
Risk Analysis.......................................................................................................................14
Response Procedure.............................................................................................................15
Conclusion................................................................................................................................15
Bibliography.............................................................................................................................16
Approval Sign-off Document...............................................................................................10
Server Task List...................................................................................................................10
Server Test Plan...................................................................................................................11
Server maintenance plan......................................................................................................11
Router Specifications...............................................................................................................12
Security plan and policy...........................................................................................................12
Perimeter Design..................................................................................................................12
Remote Access.....................................................................................................................13
Site to Site Links..................................................................................................................13
Defence in Depth..................................................................................................................13
Security Auditing and Monitoring.......................................................................................14
Threat Identification.............................................................................................................14
Risk Analysis.......................................................................................................................14
Response Procedure.............................................................................................................15
Conclusion................................................................................................................................15
Bibliography.............................................................................................................................16
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Network Design and Directory Structure of TTFlg...
|16
|2928
|115
Network Design and Implementation Plan.lg...
|19
|3503
|206
IT Networking in Talon Textilelg...
|10
|2476
|148
Assignment on Network Design and Implementationlg...
|18
|3281
|32
Network Design Assignment (Doc)lg...
|20
|5604
|583
Network Infrastructure Upgrade for TTFlg...
|14
|1973
|98