Create virtual machines connected

Assignment Help Computer Networking
Reference no: EM133230235

Case: Your company has received a new contract to plan and configure their new office structure, and you have been tasked to setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network infrastructure. You will be creating Several virtual machines to run in the Sandbox.

Part 1: IP Structure
1. You will be subnetting 10.0.0.0/24 for the Sandbox network.
2. The first usable IP address of the "Servers and Workstations" subnet will be used as the gateway IP addressfor the Servers and Workstations
3. You will need to subnet your network with the following information, please create a VLSM structure for your Sandbox:

Infrastructure: 9
Servers and Workstations: 120
Printers: 15
Wireless Aps: 32

Question 1 If the population of the network doubles, what will the Network ID and CIDR be?

Part 2: Virtualization
1. Create a switch labelled WSS3-Proj-YOURFIRSTNAME-SW, on the Windows 10 Host machine (Please be sure to change "YOURFIRSTNAME" to your first name
2. Run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then
Get-VMSwitch -Name "WSS3Project*"
3. Take a screenshot and paste it here:

<Provide a screenshothere>

4. Create 3 virtual machines connected to the WSS3-Proj-YOURFIRSTNAME-SWswitch with 2048 MB RAM on each, and labelled as follows, replacing "YOURFIRSTNAME" with your first name:

WSS3 Project DC1.YOURFIRSTNAME.com
WSS3 Project SVR1.YOURFIRSTNAME.com
WSS3 Project WS1.YOURFIRSTNAME.com

5. On your Windows 10 workstation, run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then

Get-VM -Name "*Project*"
6. Take a screenshot and paste it here:

Question 3 When should you use the .vhdx format instead of .vhd format?

Part 3: Installation and Configuration
1. Installthe operating systems with the following common configurations:
a. Subnet Mask: of the Servers and Workstations Subnet
b. DNS: Second IP of the Servers and Workstations subnet
c. Gateway: First IP of the Servers and Workstations subnet
d. Enable: Remote desktop without network level authentication
e. Change: the time zone and time settings so the time is correct
f. Local Administrator account: "LocalYOURFIRSTNAME" replace "YOURFIRSTNAME" with your first name *** Make sure it has the same privileges as the Default Administrator Account, and so the password never expires

2. Setup the VIRTUAL MACHINE: WSS3 Project DC1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Second IP of the Servers and Workstations subnet
• Change: The hostname of the server to DC1
• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it here:

<Provide a screenshot here>

b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then

Get-NetIPConfiguration

Then

Get-NetIPAddress | Format-Table
c. Take a screenshot and paste the output here:

<Paste Output Here>

3. Setup the VIRTUAL MACHINE: WSS3 Project SVR1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Third IP of the Servers and Workstations subnet
• Change: The hostname of the server to SVR1
• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it here:

<Provide a screenshot here>

b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then

Get-NetIPConfiguration

then

Get-NetIPAddress | Format-Table

c. Take a screenshot and paste the output here:

<Paste Output Here>

4. Setup theVIRTUAL MACHINE: WSS3 Project WS1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Windows 10 Pro
• IP: Fourth IP of the Servers and Workstations subnet
• Change: The hostname of the server to WS1
• As a security measure log into the Local Administrator account you created in step 1

a. In System Properties take a screenshot showing that Remote desktop is enabled, and paste it here:
<Provide a screenshot here>
b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Hostname
Then
Get-timezone

Then
Get-NetIPConfiguration
Then

Get-NetIPAddress | Format-Table

c. Take a screenshot of all three commands and paste the output here:

Question 4 A user returning from holidays has attempted to login 6 times, the account is locked out. Which powershell command will you need to execute to allow the user to log into the domain again?

Question 5 What Powershell cmdlet would you use to start an interactive session with a remote computer by the name of WS1?

Part 4: DNS
1. Install the DNS role on DC1
2. Create the Domain called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with your first name
3. Make sure that you allow both secure and nonsecure dynamic updates
4. Enable Reverse lookup zone for your domain
5. Make sure that you allow both secure and nonsecure dynamic updates
6. Create zone records:
An A record for DNS1 pointing to the IP if DC1
An A record for RTR1 which points to the first IP address of the Servers and Workstations subnet
7. Open an administrative PowerShell prompt
a. Type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-DnsServerResourceRecord -ZoneName YOURFIRSTNAME.com
Then
Get-DnsServerResourceRecord -ComputerName DC1 -ZoneName "0.0.10.in-addr.arpa"
b. Take a screenshot and paste the output here:

Question 6 List 2 record types that are found on an AD DS integrated DNS that you wouldn't find on a public DNS server

Part 5: AD DS
1. Install the ADDS role on DC1
a. Log into the DC1 as the local administrator account
b. Promote to be a domain controller
c. Create a Domain in a new forest called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with your first nameusing integrated DNS
d. Use theAdministrator account for Delegation
e. Login as YOURFIRSTNAME\Administrator (replacing "YOURFIRSTNAME" with your first name)
f. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-WindowsFeature | Where-Object {$_. name -eq "DNS"} | Format-List Name,Installstate
Then
Get-WindowsFeature | Where-Object {$_. name -eq "AD-Domain-Services"} | Format-List Name,Installstate
g. Take a screenshot and paste the output here:
<Paste Output Here>
2. Create an OU called IT
a. Create your own Administrative account in the IT OU called YOURFIRSTNAME-IT replacing "YOURFIRSTNAME" with your first name, with the same memberships as the administrator account
b. Log into the domain controller with your YOURFIRSTNAME-IT account you created
c. You must only use this account for the remainder of the project
d. Create the OUs in the root of the domain: Administration, Shipping, Finance, and Sales
e. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName
f. Take a screenshot and paste the output here:
<Paste Output Here>
3. Create a Global Security group for each OU
a. Use the name of the OU and add "Group" to the end of the group name (IT Group")
b. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADGroup -Filter 'Name -like "*Group"' | Format-Table Name, Distinguishedname
c. Take a screenshot and paste the output here:
<Paste Output Here>

4. Create a template account for each of the OU's you have created starting with the unique characters: --
a. Each must be labelled -OUNAME-Template (Replace OUNAME with the name of the OU)
b. Each must be added as a member of the OU's group
c. The template accounts must be disabled
d. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADUser -Filter 'Name -like "--*"' | Format-Table Name, Distinguishedname,Enabled

e. Take a screenshot and paste the output here:

Question 7 When is a user's access token created?

Question 8 What is the interface within Active Directory Administrative Center that simplifies the delegation of permissions for domains, OUs, or containers?

Question 9 Which term is described as the process of configuring one or more groups as members of another group?

Part 6: Join Computers to the domain
1. Create an OU called Servers, and one called Workstations
2. Join SVR1 and WS1 to the Domain
3. Move SVR1 to the Servers OU
4. Move WS1 to the Workstations OU
5. Log into DC1 with your YOURFIRSTNAME-IT account you created
6. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
get-adcomputer -filter 'Name -like "*"' | FT DNSHostName,Enabled,DistinguishedName,SID
Take a screenshot and paste the output here:

Question 10 What is the syntax command-line utility for joining a domain using Netdom.exe?

Question 11 List an example of two graphical tool in Windows Server 2016 that can create user objects.

Part 7: Group Policy
1. Create a Group Policy Object called "Workstations":
a. Folder Redirection
i. Redirect all users' Documents folder to their own folder on a hidden share called Staff on SVR1's C:\ drive
2. Modify the Default Domain Policy with the following settings:
a. Password Policy:
i. Enforce Password History: 12 passwords remembered
ii. Max Password Age: 32 Days
iii. Minimum Password Age: 10 Days
iv. Minimum Password Length: 10 Characters
v. Complexity requirements: Enabled
b. Account Lockout policy
i. Threshold: 5 Attempts
ii. User will be locked out until manually reset
3. Log into WS1 as your YOURFIRSTNAME-IT account you created
4. Take a screenshot of:
a. The Default Domain Policy GPO displaying the Password Policy, and Account Lockout Policy
b. The Workstations GPO displaying the Folder Redirection Policy

Question 12 The Group Policy templates (GPT) folder structure is located in the shared ________ folder on a domain controller.

Question 13 What is the setting on an individual GPO link that forces the GPO's settings to flow down through the AD DS hierarchy, without being blocked by child OUs?

Question 14 Describe Group Policy Preferences (GPPs).

Part 8: AD CS
1. Install the ADCSCertification Authority Role on SVR1
a. Key Length 4096
b. SHA256 Hash Algorithm
c. Leave the default for the Common Name for this CA
2. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-CACrlDistributionPoint
3. Take a screenshot and paste the output here:

Question 15 A __________ is an electronic document that contains an identity, such as a user or organization name, along with a corresponding public key.
Question 16 Which PKI-related service is used for network devices such as switches and routers to enroll for an X.509 digital certificate from a CA?

Part 9: IPv6 Subnetting
1. The Sandbox network will also require the use of IPv6 for future use when the company transitions to it. Using the standard IPv6 addressing and its built in subnets, create a subnetting scheme for future use with the Sandbox. Use ULA addresses for this IP architecture.

Attachment:- Project - The Sandbox.rar

Reference no: EM133230235

Questions Cloud

Corrupt behavior with significant consequences : Detailed description of events that took place in Bangladesh as an example of corrupt behavior with significant consequences.
Write the program without macros : Computing Machinery - Write the program without macros (i.e. don't use m4), and use only the mul, add, and mov instructions to do your calculations
Why the catastrophe occurred-perspective of your role : How would you respond to the question of why the catastrophe occurred and how it might have been avoided from the perspective of your role?
Outside entertainer required to accept services : Is a person who hires an outside entertainer required to accept services of a substitute if it is impossible for the original party to perform?
Create virtual machines connected : Project Create a switch labelled WSS3-Proj-YOURFIRSTNAME-SW, on the Windows 10 Host machine (Please be sure to change "YOURFIRSTNAME" to your first name
Sustainable design in ferrero group supply chain : Is there explicit evidence of Sustainable Design in Ferrero Group supply chain? Which global industry codes of conduct are guiding Ferrero Group supply chain.
Difficult task requiring sensitivity and compassion : Making death notifications is a difficult task requiring sensitivity and compassion. How many training programs are there?
Require fundamental changes to football program : Do you agree that Class's proposed accommodations would require fundamental changes to the football program? Why or why not?
Describe the financial considerations associated : Explain a summary of the obesity and diabetes epidemic in the U.S. Then describe the financial considerations associated with the obesity and diabetes epidemic

Reviews

len3230235

9/28/2022 12:18:43 AM

Your company has received a new contract to plan and configure their new office structure, and you have been tasked to setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network infrastructure. You will be creating Several virtual machines to run in the Sandbox.

Write a Review

Computer Networking Questions & Answers

  Benefits and drawbacks of mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion

  Find laptop models which have internal networking capability

Many desktop computers and laptop computers now include automatic built-in network connectivity. Find and name specific desktop and laptop models which have internal networking capability.

  Write the values in the version and time to live

Examining the Internetwork Layer Time Required: 10 minutes Objective: Capture packets and view the Internetwork layer.

  Discuss the tcp and the udp application layer protocol

Discuss the TCP and the UDP application layer protocol. (the differences, advantages and disadvantages, services provided)

  Summarize the roles and responsibilities

Summarize the roles and responsibilities that the U.S. government, court system, and law enforcement agencies in combating computer crime.

  Write down the network prefix of each subnetwork

Of the 5 subnets, select the 1st one and write down the first usable address, the last usable address, and the broadcast address.

  The learning objectives of the security plan assignment are

the learning objectives of the security plan assignment are for you to recognise the threats to information assets that

  Identity recognizer tool and stanford ner tool

Provide deep comparison of Spacy with NLTK(Why Spacy is better then NLTK) and provide the deep comparison of Standford with Spacy (Why Standford

  What are the four primary factors described

What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today?

  Describe in detail all issues associated with layer 2 loops

after evaluating and completing support for high-definition ip cameras to enhance security for devry university you

  Write a plan like digital evidence for investigation

You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report.

  Create and apply an addressing scheme to a network

ICTNWK404 Assignment - Install, operate and troubleshoot a small enterprise branch network. Create and apply an addressing scheme to a network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd