Develop the data center design and security plan

Assignment Help Computer Network Security
Reference no: EM131856542

Assignment

Develop the data center design and security plan.

Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.

The design must include the following:

A logically separated WLAN infrastructure that can be integrated into the existing enterprise network

Data flows between segments of the enterprise network - public (outside), DMZ, private, and data center

Incorporate feedback you received from your instructor on the diagram from the Week Two Individual Assignment, "West Consulting Modular Design Proposal." Use this revised diagram, and the information from all previous assignments, as the basis for this diagram.

Create a high-level network security policy that identifies key network security measures.

Include the following components:

List of network assets and their use(s)

Potential threats and vulnerabilities in which assets need to be protected from including; open ports, malware, viruses, and specific types of attacks

Detailed security methods you will use to protect these assets and how they will be implemented

A high-level incident handling process for two of the network attacks you identified, including whom to contact (by role), what should happen to the asset, and how to protect data

Diagram your data center design in Microsoft Visio

West Consulting Network Design Summary

West Consulting Business Description

West Consulting is a graphic design and printing company. It is growing in consumer and sales volume and therefore, is expanding its local campus in Houston, Texas and adding a test location in China.

Business Problem

As a graphics design and printing company, West Consultingruns bandwidth-intensive applications from servers housed at their headquarters in Houston, Texas. IT leadership has determined that the current network continuously runs in a degraded state and users experience heavy latency when accessing the servers that house their customer Computer Aided Design (CAD) software.

Due to increased sales of their CAD designs, they need to expand their facilities. The company headquarters currently has 1,000 unique users amongst their two buildings and has decided to add another building and 500 users.

In addition, leadershiphas decided to expand into China to enable them to test their designs in a new and growing market. The footprint in China will be relatively small; approximately 30 people.

Solution

You are a Network Consultant for West Consulting. You are tasked with proposing an improved network design to support their growth and expansion plans.

Requirements

1. A secure WLAN solution in the new building for half of the users and recommendations to upgrade their existing WLAN infrastructure to keep wiring costs down.

2. Recommendations on a Unified Communications system that meets traffic demands, with minimal interruptions, due to the frequency of international videoconferencing calls that will occur.

3. An IP solution that can accommodate the new users in all locations.

4. Recommendations to upgrade their switch bandwidth to 10GB fiber uplinks between backbone switches,a 10GB connection to each of the servers, and add-in options for redundancy. High availability access to these critical servers is a must because of the expected traffic increase and load on the servers.

5. Proposal for a data center solution that takes advantage of both network and server virtualization technologies to reduce their costs in acquiring and maintaining hardware.

6. Improvements to the link speed to the internet.

7. Options for implementing greater security for their Intranet servers that their partners and employees heavily use and for their overall network infrastructure, as they have had attacks on their DMZ.

8. Have proof thatthese improvementswill be completed within a 4- to 6-month timeline.

Network Configuration Details

The Network Engineer verbally shared the configuration details of their network, as follows:

Headquarters:

• Bldg. 1 and Bldg. 2 are located about 1000 ft. apart.

Switches:

• Bldg. 1 has one 6500 backbone switch installed; which supports users from both buildings.

• Bldg. 2 has a connection to the backbone switch via a 10GB fiber connection (10G Base LR) from uplink port on a Cisco 3850.

• To support the users, each floor contains three Cisco Catalyst 48-port 100Mbps Ethernet switches; which are each cabled to the backbone switch via a 1GB uplink port.

Routers:

• Each floor represents a different subnet and therefore one Cisco router 2610, configured with EIGRP, is cabled to backbone switch (1GB connection) to provide routing for each subnet and provides a WAN interface to the Internet via a T-1 link.

• Each switch also has a link to an access point that uses WPA encryption and 802.11b wireless standard to support users who are in conference/meeting rooms that want to connect to the internet.

Servers:

• 5x Windows Server 2012 R2 (RAID 5) application servers that support the CAD.
• 1 DHCP and FTP server

IP Configuration (DHCP-based)

Building

Floor

Servers

Clients

IP Network

1

1

5

100

194.100.1.0/24

 

2

 

100

194.100.2.0/24

 

3

 

100

194.100.3.0/24

 

4

 

100

194.100.4.0/24

 

5

 

100

194.100.5.0/24

2

1

5

100

195.100.1.0/24

 

2

 

100

195.100.2.0/24

 

3

 

100

195.100.3.0/24

 

4

 

100

195.100.4.0/24

 

5

 

100

195.100.5.0/24

Attachment:- West-Consulting-Modular-Design-Proposal.rar

Reference no: EM131856542

Questions Cloud

Types of meat snacks : Qi is having a Super Bowl party. He will offer the following refreshments: 4 different types of chips, 3 types of meat snacks
Find a confidence interval for a proportion p : Use the normal distribution to find a confidence interval for a proportion P given the relevant sample results.
What inconsistency in hardwig thinking : What do you think was Cohn & Lynn's most important point about Hardwig failing to consider the full impact of a duty to die on a person nearing the end of life?
Research study still be beneficial : If a research study is found to not be clinically significant, can the research study still be beneficial and if so why would it be beneficia
Develop the data center design and security plan : Develop the data center design and security plan. Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.
Confidence interval for proportions : Of the Internet users, 1054 use a social networking site.1 Find a 90% confidence interval for each of the following proportions.
What is the bond annual yield to maturity : What is the bon's annual yield to maturity? YOU MUST SHOW ALL WORK AND USE AT LEAST 4 DECIMAL PLACES.
What makes an ideal society : What makes an ideal society? What are some components that create a society? (Ideas to consider: sociological theories, socialization, social control.
What taxable gain must be reported on the sale : The truck was sold yesterday for $19,000. What taxable gain must be reported on the sale of the truck?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cryptography problem

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret

  How bitlocker and bitlocker to go protect data

Discuss how BitLocker and BitLocker To Go protect data using the text Internet and/or your job as reference for full credit.

  Analyze in the context of what you have learned

Consider a recent (2014, 2015 or 2016) security breach popular in the media. Analyze in the context of what you have learned. You can review "The six dumb ideas" http://www.ranum.com/security/computer_security/editorials/dumb/

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures

  What are the different places an ips can be based

What are the different places an IPS can be based? How can an IPS attempt to block malicious activity? How does a UTM system differ from a firewall?

  Write paper on cyber chatter

Write paper on cyber chatter

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Describe approaches to computer security

Describe approaches to computer security? Describe steps that organizations can take to improve their security

  Create checklist of steps you should take to secure computer

Create a checklist of steps you should take to secure your computer from Internet based intrusions, and discuss the steps in some detail.

  What are some of the concerns of mobile device users

Microsoft has announced its Surface tablets, due out late this year, at a time when security is a growing concern for users of mobile devices. What are some of the concerns of mobile device users? What are some of their options to ease their con..

  Describe difference between open and hybrid cloud topologies

Describe the differences between open, private, and hybrid cloud topologies and make sure to consider emerging technology that could impact cloud topologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd