logo

Network Security and Infrastructure Setup

   

Added on  2022-12-29

21 Pages2833 Words94 Views
 | 
 | 
 | 
Running head: NETWORK SECURITY AND INFRASTRUCTURE SETUP
Network Security and Infrastructure Setup
Name of the Student
Name of the University
Author Note
Network Security and Infrastructure Setup_1

NETWORK SECURITY AND INFRASTRUCTURE SETUP1
Summary
As of several research papers published in recent times, the real benefits of
efficient network designs and effective network configuration like routing
protocols and ACL restriction commands are only being realized today. First the
report is to provide the summary of requirements where the network goals are to
be listed. Then the report is to present the network design and discuss it.
Thereafter the IP addressing is details are to be mentioned in the IP table before
explaining the routing protocol and ACL commands. The report then is to give
the full configuration of the router and switch along with details of host, access
point, server. After that the report is to provide the task schedule and budgeting
and end with concluding notes.
Network Security and Infrastructure Setup_2

NETWORK SECURITY AND INFRASTRUCTURE SETUP2
Table of Contents
Introduction........................................................................................................... 4
Summary of Requirements.................................................................................... 4
Network Design Diagram and Discussion..............................................................5
Logical Design.................................................................................................... 5
Subnet Classifications and IP Addressing...........................................................5
Routing Configuration and Network Security.....................................................7
Protocol used for Routing...................................................................................7
Access Restrictions using ACL commands..........................................................8
Configuration commands used in the Network......................................................9
Routing Configurations....................................................................................... 9
Configuring the Switch..................................................................................... 10
Host IP Configurations...................................................................................... 13
Configuration of Access points and Servers.....................................................14
Settings for Wireless Access Point................................................................14
IP configuration of Server.............................................................................15
Estimations for Timeline and Budget...................................................................15
Scheduling........................................................................................................ 15
Budgeting......................................................................................................... 16
Conclusion........................................................................................................... 16
Bibliography......................................................................................................... 17
Appendix A.......................................................................................................... 18
OHC Industry Visit............................................................................................ 18
Network Information........................................................................................ 19
Network Security and Infrastructure Setup_3

NETWORK SECURITY AND INFRASTRUCTURE SETUP3
Introduction
The following report tries to present the real benefits of efficient network
designs and effective network configuration like routing protocols and ACL
restriction commands in setting up networks. The report is to present the
configuration of such configurations and design for a client named OHC. The
report starts by providing the summary of requirements where the network goals
are listed. Then the report presents the network design and discusses it.
Thereafter, the IP addressing is details get mentioned in the IP table before
explaining the routing protocol used and the ACL commands for imposing
restrictions. The report then gives all configuration details of the router and
switch along with details of host, access point and server. After which the report
provides the task schedule and budgeting before ending with conclusions.
Summary of Requirements
The network infrastructure of OHC is to consist of the network segment of OHC
headquarters, its different branches and the sites of the data centres.
The wireless services of the network is also supposed to serve wireless devices
installed in the headquarters, branches as well as those used around the data
centres.
The network of the online backup and retrieval organization OHC is comprise of
both wired as well as wireless network connectivity for providing secured
network access to the respective devices.
Since the network segments for the different branches and locations are
interconnected through the internet, for security reasons these segments should
be prohibited from communicating with host devices of other networks.
To ensure effective wireless network connectivity, the wireless access points are
supposed to have routing capability to provide dedicated subnets for the wireless
services they are to provide.
Dedicated servers need to be used for making the services available as well as
processing the requests of end users.
Network Security and Infrastructure Setup_4

NETWORK SECURITY AND INFRASTRUCTURE SETUP4
Network Design Diagram and Discussion
Logical Design
Figure 1: Logical Network Design of OHC network
The logical design of the network infrastructure for the company OHC is
presented in the diagram above. It can be clearly seen that the organization
servers its consumers the und users through the internet. Thus, to enable
services to and from different branches OHC needs to use routing through the
internet. The server located at the head office is used as the application server
that is for hosting the Web Access application for making the online backup and
retrieval services available for the end users.
Subnet Classifications and IP Addressing
Subnet
Names
Requi
red
Addr
ess
Spac
e
Alloca
ted
Addre
ss
Space
Networ
k
Address
es
CID
R /
Mas
k
Subnet
Masks
Host IP
Ranges
Broadca
st
Address
es
Heado
ffice 7 14 10.170.6
0.64 /27 255.255.25
5.224
10.170.6
0.65 -
10.170.1
0.94
10.170.6
0.95
Branch 7 14 10.170.6
1.64
/27 255.255.25
5.224
10.170.6
1.65 -
10.170.6
10.170.6
1.95
Network Security and Infrastructure Setup_5

NETWORK SECURITY AND INFRASTRUCTURE SETUP5
1.94
DataCe
ntre
South
7 14 10.170.6
2.64 /27 255.255.25
5.224
10.170.6
2.65 -
10.170.6
2.94
10.170.6
2.95
DataCe
ntre
North
7 14 10.170.6
3.64 /27 255.255.25
5.224
10.170.6
3.65 -
10.170.6
3.94
10.170.6
3.95
End
Users 7 14 10.170.6
4.64 /27 255.255.25
5.224
10.170.6
4.64 -
10.170.6
4.94
10.170.6
4.95
Office-
Internet 2 2 192.170.
66.0 /30 255.255.25
5.252
192.170.
66.1 -
192.170.
66.2
192.170.
66.3
DCS-
Internet 2 2 192.170.
67.0 /30 255.255.25
5.252
192.170.
67.1 -
192.170.
67.2
192.170.
67.3
DCN-
Internet 2 2 192.170.
68.0 /30 255.255.25
5.252
192.170.
68.1 -
192.170.
68.2
192.170.
68.3
Internet
-Users 2 2 192.170.
69.0 /30 255.255.25
5.252
192.170.
69.1 -
192.170.
69.2
192.170.
69.3
The above IP table shows in detail the subnet classifications that
have been used to implement the network for OHC to facilitate the online
backup and retrieval services by OHC. The organization for their offices in
the headquarters and branches as well as for the two data centres make
use of the networks 10.170.60.0, 10.170.61.0, 10.170.62.0, 10.170.63.0
Network Security and Infrastructure Setup_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents