NIT3122 Enterprise Network Management: Network Design & Implementation

Verified

Added on  2023/03/31

|29
|1240
|429
Project
AI Summary
This project solution outlines the design and implementation of an enterprise network using Windows Server 2012, based on a provided scenario involving ActiveDirectoryxx.com. The project covers computer preparation with VMware, including the configuration of four virtual machines (Root-DC, Com-A, Com-B, and Com-C). It details the design of an Active Directory infrastructure, including IP address setup, domain controller configuration (including a Read-Only Domain Controller), and a child domain (Syd.ActiveDirectoryxx.com). The solution further explains Active Directory management, covering group management, user account management (creation and policy enforcement), and policies applications such as automatic deletion of temp folder contents and software restriction policies using group policies to manage user access to applications like Internet Explorer. Connectivity verification between servers using ping tests is also demonstrated.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ENTERPRISE NETWORK MANAGEMENT
Network Design and Implementation
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
ENTERPRISE NETWORK MANAGEMENT
Task 1: Computer Preparation
The four virtual machine are installed and configured in VMWare and shown in the above
screenshot. VMWare 15 is used for the configuration of the server and 2 GB of memory and
60 GB of hard drive space is allocated for each of the virtual machine for management of the
operations.
Document Page
2
ENTERPRISE NETWORK MANAGEMENT
The above screenshot shows that the server is named as Root-DC
The above screenshot shows the output of the ipconfig /all command
Document Page
3
ENTERPRISE NETWORK MANAGEMENT
The above screenshot shows that the server is named as Com-A
The above screenshot shows the output of the ipconfig /all command
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
ENTERPRISE NETWORK MANAGEMENT
The above screenshot shows that the server is named as Com-B
The above screenshot shows the output of the ipconfig /all command
Document Page
5
ENTERPRISE NETWORK MANAGEMENT
The above screenshot shows that the server is named as Com-C
The above screenshot shows the output of the ipconfig /all command
Document Page
6
ENTERPRISE NETWORK MANAGEMENT
Task 2: Designing Active directory and Initial Setup
Network topology created for setting up the network
Setting up of IP address meeting the organisation requirement
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
ENTERPRISE NETWORK MANAGEMENT
Document Page
8
ENTERPRISE NETWORK MANAGEMENT
Configuration Verification
Document Page
9
ENTERPRISE NETWORK MANAGEMENT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
ENTERPRISE NETWORK MANAGEMENT
For the verification of the connectivity between the servers each of the server are pinged for
identification of the connectivity between the servers deployed in the network. The
screenshot of the ping test are given below.
Document Page
11
ENTERPRISE NETWORK MANAGEMENT
Document Page
12
ENTERPRISE NETWORK MANAGEMENT
Task 3: Active Directory Installation
The active directory is installed in all the server from the add roles and features present in
server manager. The screenshot of each of the steps performed for the installation of active
directory in each of the server is given below:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
ENTERPRISE NETWORK MANAGEMENT
Document Page
14
ENTERPRISE NETWORK MANAGEMENT
The configuration of the active directory is made by adding a new Forest to the domain name
and selecting it as the root domain.
The screen capture above shows the Root-DC configuration as activedirectory23.com and
creation of members under it.
Task 4: Active Directory Management
A – Group Management
Group management is necessary for managing different services for the different level of
users connected in different network or subnet of the organization. The screen shot below
shows the steps taken for the management of group and users for meeting the requirement of
the organization.
Document Page
15
ENTERPRISE NETWORK MANAGEMENT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the steps for creating a new group under the domain name
activedirectory23.com.
The above screen capture demonstrates the information details and that are utilized for
creating the group for the activedirectory23.com. For the creation of the group scope and type
is needed to be defined.
B – User Account Management
The user account management is necessary for managing the accessibility of existing users
and management of the new users under the group named “Melbourne_Group”. The user
account management helps in managing the access of the resources for the domain named
“activedirectory23.com”.
Document Page
17
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the steps followed for creating the new user account with the
name “ADTest_User” with the option for changing the password of the account when the
user signs in to the account for the first time.
The above screen capture demonstrates the user account settings are verified such that the
user changes the password of the account at the time of signing in and use the services and
files in Root_DC server.
Document Page
18
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the message for the unknown user when it tried to sign in
into the server since configuration is made for the server for enabling new account login.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
ENTERPRISE NETWORK MANAGEMENT
The screen capture above is used for demonstrating the steps that are followed for allowing
user to sign in to the server account and login with the user named ADTest_User.
The screen capture above shows the configuration of a new group named
“Melbourne_Group” and adding the new user “ADTest_User” into the group.
Document Page
20
ENTERPRISE NETWORK MANAGEMENT
The screen capture shows the steps for group policy update and helping to log into the local
property for ADTest_User.
The screen capture shown above is used for updating group policy that is defined for the user
and enabling the user for logging with the server account.
Document Page
21
ENTERPRISE NETWORK MANAGEMENT
C – Policies Applications
The screen capture shows the policy and addition of the windows batch script with the profile
such that the content of the temp folder is automatically deleted each time the user named
“ADTest_User” signs to their respective account. For allowing access of windows batch
script it is stored in a shared folder and the user profile is configured such that the script runs
automatically when the user signs in.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
ENTERPRISE NETWORK MANAGEMENT
The above screen capture shows the script created for automatically deleting the content of
the c:\Windows\Temp folder when the user named ADTest_User signs on to the computer.
Document Page
23
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows that a folder named Delete is created in the temp directory
along with a text file for testing that the script prepared in the above step is working
successfully.
The screen capture above shows the files and folders has been deleted successfully after
logging with the new user account on the server and accessing the files residing in the
directory of the server.
D – Software Restriction
For the management of software or application restriction in the windows server a user
named “ADTest_User” account is created and the group policy is configured for the
management of access of the user to the application and service enabled for the different
group of users.
Document Page
24
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the configuration made for the configuration of the group
policy and only enable access of administrator or root user to have access of all the service
and application configured in the server.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the setting made in the server for restricting the user named
ADTest_User for making any action and managing the access of the resources available in
the server.
Document Page
26
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows the steps that is taken for browsing the application for its
restriction and access control of the user named ADTest_User.
The screen capture above shows the execution rules creation that is used for restricting the
access of internet explorer to the user
The screen capture above shows the step that is taken for manging the identity of the user and
blocking the user for accessing a definite application service.
Document Page
27
ENTERPRISE NETWORK MANAGEMENT
The screen capture above shows that the access of internet explorer is available for the
administrator account
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
28
ENTERPRISE NETWORK MANAGEMENT
Bibliography
"PERFORMANCE EVALUATION OF SERVER VIRTUALIZATION WITH DIFFERENT
PARAMETERS IN WINDOWS HOST SERVER" (2015) 2(01)
López, Gabriel R., Danny S. Guamán and Julio C. Caiza, "Vulnerabilidades Y Seguridad De
Windows Server 2012" (2015) 6(3) Enfoque UTE
Panek, William. MCSA Windows Server 2012 R2 installation and configuration study guide:
exam 70-410. John Wiley & Sons, (2015).
Sarma, Gautam Kumar. "Web-OPAC in the University Libraries in Guwahati City: a Study."
National Seminar on Comparative Librarianship (NSCL), Department of Library and
Information Science, Gauhati University, (2017).
chevron_up_icon
1 out of 29
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]