logo

Network Infrastructure Security and Configuration

   

Added on  2022-09-17

17 Pages2196 Words46 Views
Running head: NETWORK INFRASTRUCTURE SECURITY AND CONFIGURATION
Network Infrastructure Security and Configuration
Name of the Student
Name of the University
Author Note

NETWORK INFRASTRUCTURE SECURITY AND CONFIGURATION
1
Summary
As per multiple researches of this decade, network topology design, routing
protocols and access restrictions along with VLANs and how network
infrastructures of organizations can benefit from them. This report is tasked with
proposal of a configured network for Coles. First the report lists the requirements
and scope of the project that has been derived based on the component
workflow requirements which have been acquired from the site visit conducted
on the Coles supermarkets in Melbourne and their headquarters. Thereafter, the
logical design diagram of the proposed network gets presented and appropriate
justification is also provided as per requirements of the business. Next the IP
address details of various subnets are provided in tabular format. After that the
routing protocol used by the network is mentioned and discussed before talking
about the access privileges configured with ACL commands. Then the report
presents the timeline as well as budgeting estimates and ends with concluding
notes.

NETWORK INFRASTRUCTURE SECURITY AND CONFIGURATION
2
Table of Contents
Introduction........................................................................................................... 4
Requirement Summary.......................................................................................... 4
Network Design and Explanation...........................................................................5
Logical Design Diagram..................................................................................... 5
IP Address Table................................................................................................. 5
Routing Protocol used and Network Security.....................................................7
Routing Protocol................................................................................................. 7
Access Restrictions with ACL commands...........................................................8
Configuring the Network........................................................................................ 9
Configuring the Router....................................................................................... 9
Configuring the Switch....................................................................................... 9
Configuring the Host........................................................................................ 11
Configuring the Access points and Servers......................................................12
Configuring the Wireless Access Point..........................................................12
Configuring the Server IP Addressing...........................................................13
Timeline and Budget............................................................................................ 13
Schedule of Activities....................................................................................... 13
Budgeting Table............................................................................................... 14
Conclusion........................................................................................................... 14
Bibliography......................................................................................................... 16
Appendix A.......................................................................................................... 17
Industry Visit........................................................................................................................17
Coles.........................................................................................................................................17
..................................................................................................................................................17

NETWORK INFRASTRUCTURE SECURITY AND CONFIGURATION
3
Introduction
The report below makes an attempt to highlight the purpose of network
designs, routing protocols and access restrictions with the help of VLANs and
how network infrastructures of organizations can benefit from them. This report
proposes a configured network for the company Coles. The report starts with
listing the requirements and scope of the project that has been derived based on
the component workflow requirements which have been acquired from the site
visit conducted on the Coles supermarkets in Melbourne and their headquarters.
Thereafter, the logical design diagram of the proposed network gets presented
and appropriate justification is also provided as per requirements of the
business. Next the IP address details of various subnets are provided in tabular
format. After that the routing protocol used by the network is mentioned and
discussed before talking about the access privileges configured with ACL
commands. Then the report presents the timeline as well as budgeting estimates
and ends with concluding notes.
Requirement Summary
The network of Coles Supermarkets needs to be built upon computerised
infrastructure that use remotely controlled components.
The network segment of supermarket is primarily meant to serve the controlled
components like air conditioners, heaters, lighting, cooling units and data
collection from cooling counters provided by LINDE Gas.
The remote access takes place through web access made available over wireless
intranet of the company, web access via modem, maintenance access via Wi-Fi.
The overall netwok is supposed to present an organized WAN infrastructure
comprising of network segments for both the supermarket located in Melbourne
and the company office.
The network segment of the office building is meant to serve the workstations,
servers and various wireless devices that are being used.
The departments of the office building is supposed to be prohibited from
accessing the departments of the supermarket.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Infrastructure and Configuration Report 2022
|18
|2381
|22

Network Configuration and Design setup
|21
|2810
|19

Network Routing and Security Summary 2022
|21
|2260
|12

Network Infrastructure and Routing Configuration Report 2022
|20
|2757
|20

Network Security and Infrastructure Setup
|21
|2833
|94

Network Security and Infrastructure Setup Report 2022
|19
|2423
|25