ISOL 532 Network Design Case Study

Verified

Added on  2019/10/16

|2
|922
|242
Case Study
AI Summary
This case study for ISOL 532 involves designing a robust and secure network infrastructure for Patrician LLC, a wireless technology company. The company is establishing its headquarters in Tucson, Arizona, and a disaster recovery site in Cheyenne, Wyoming. The challenge lies in connecting these two locations with a minimum 32 Mbps throughput, ensuring high availability and redundancy for servers (file, database, web), and accommodating remote access for the secure microburst research team. The solution must address physical and logical security, including network topology, VPN setup, cable types, WAN/wireless technologies, server configurations, attack prevention and detection mechanisms, and security verification methods. The student needs to submit network diagrams illustrating the topology and VPN setup, along with a written report detailing the chosen technologies, security measures, and justifications for the recommendations. The report should also include a plan for verifying the implemented security measures.
Document Page
Case Study
ISOL 532
Your company, Patrician LLC, develops wireless transmission technology. Upper management has
decided to move the headquarters and primary operations to Tucson, Arizona and create a disaster
recovery site in a newly purchased building in Cheyenne, Wyoming.
Patrician, LLC, while most of its technology is for the civilian market, has one Research and Development
unit that is developing a secure microburst technology for use in the military market. This unit is made up
of many people that do not currently live in either Cheyenne or Tucson and the company has no plans to
force their relocation to Tucson.
Both buildings are 3 floors in height and have approximately 150,000 square feet. As the senior CISSP,
you have been tasked with designing the network solution with both functionality and usability in mind.
Further specifications\company requirements:
1. The two buildings will be considered identical. The Cheyenne, WY building does not have to be
described as it is a mirror hot site for business continuity\disaster recovery
2. There needs to be a constant connection between the buildings with no less than 32 Mbps
throughput
3. There will be a datacenter on the third floor
4. There will be 100 network connections on each floor
5. There are 4 primary divisions in the company: Headquarters\Administration, Sales\Customer
support, Research and Development (this division includes the secure microburst group) and
Information Technology
6. The members of the secure microburst research group that do not live in Tucson need to be able
to connect to the primary datacenter at any time
7. Physical security as well as logical must be considered
8. There are file servers, database servers, corporate webservers and external sales webservers
and all must have high-availability
9. All servers must have redundancy (both physical and how they are configured)
10. The solution should have a plan to verify security measures
Case requirements:
1. You should submit network drawings showing
a. the topology of the network
b. the topology of the VPN setup
They should include the hardware (and be labeled as such) but only generally – no brand names or
models, just “switch”, “firewall”, “router”, “server” and so on; any cabling differences should be noted
as well.
2. You should include a paper that contains the following:
a. List any recommended cable and where it will be used
b. List the type of connection you will utilize to ensure 32 Mbps connection between sites
(do not just give a medium, like fiber or copper, or just a protocol)
c. Recommend wiring closets wherever needed
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
d. Recommend any WAN or wireless technologies; mention and explain what topologies
you used and why
e. How you will set up the servers (both physical and logical should be explained) to have
i. redundancy
ii. high-availability
f. What logical protections you recommend
i. What measures you will take to protect against attack
ii. What measures you will take to prevent attacks
iii. What measures you will take to be notified that you are being attacked
g. Recommend and describe logical (i.e. network) traps to stop attackers
h. Any physical security measures you deem appropriate
i. What they are
ii. Where they are
i. How the remote users will connect
j. How will security measures be verified?
k. Justify your recommendations
Grading Criteria and Notes
1. APA or MLA style\formatting is acceptable.
2. Network diagrams must be your original work or they will not be accepted
3. Network Diagrams must show all network devices (workstations, since there are a large number,
can be grouped so that 1 icon can represent 10 or 100 or whatever number you want them to be);
the VPN diagrams only need to show the nodes involved in the VPN setup, including the remote
user.
4. Original written work is mandatory. Do not copy\paste directly from websites, ads, or any other
work that is not yours – unless it is cited as a quote - or it will not be accepted.
5. If you want to explain a common item – such as a particular topography (for example a Star
topography) it is acceptable to use a graphic from another source, but it must be cited in the
footnotes and works cited\bibliography page just as you would a quote from another source or
information received from an outside source
6. While there is no set budget, it is advisable to use solutions that are in line with common business
practices unless there is a reason to go above and beyond (i.e. fiber to every workstation would
be VERY expensive) and the reason should be fully explained.
7. If a specific software is to be utilized, list all aspects as to how it is to be used.
8. Recommendations must be specific – i.e. you cannot just say “protections will be in place\
utilized”; you have to explain what those protections are as well as their purpose
9. Each recommendation must be explained specifically and fully.
10. Do not neglect to do any part of the case.
11. Cases must be submitted through iLearn, not through email, and must be prior to the deadline.
12. The draft must be submitted or the final case submission grade will be reduced by 15%
If there are any questions, feel free to contact me.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]