Develop the data center design and security plan

Assignment Help Computer Network Security
Reference no: EM131856542

Assignment

Develop the data center design and security plan.

Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.

The design must include the following:

A logically separated WLAN infrastructure that can be integrated into the existing enterprise network

Data flows between segments of the enterprise network - public (outside), DMZ, private, and data center

Incorporate feedback you received from your instructor on the diagram from the Week Two Individual Assignment, "West Consulting Modular Design Proposal." Use this revised diagram, and the information from all previous assignments, as the basis for this diagram.

Create a high-level network security policy that identifies key network security measures.

Include the following components:

List of network assets and their use(s)

Potential threats and vulnerabilities in which assets need to be protected from including; open ports, malware, viruses, and specific types of attacks

Detailed security methods you will use to protect these assets and how they will be implemented

A high-level incident handling process for two of the network attacks you identified, including whom to contact (by role), what should happen to the asset, and how to protect data

Diagram your data center design in Microsoft Visio

West Consulting Network Design Summary

West Consulting Business Description

West Consulting is a graphic design and printing company. It is growing in consumer and sales volume and therefore, is expanding its local campus in Houston, Texas and adding a test location in China.

Business Problem

As a graphics design and printing company, West Consultingruns bandwidth-intensive applications from servers housed at their headquarters in Houston, Texas. IT leadership has determined that the current network continuously runs in a degraded state and users experience heavy latency when accessing the servers that house their customer Computer Aided Design (CAD) software.

Due to increased sales of their CAD designs, they need to expand their facilities. The company headquarters currently has 1,000 unique users amongst their two buildings and has decided to add another building and 500 users.

In addition, leadershiphas decided to expand into China to enable them to test their designs in a new and growing market. The footprint in China will be relatively small; approximately 30 people.

Solution

You are a Network Consultant for West Consulting. You are tasked with proposing an improved network design to support their growth and expansion plans.

Requirements

1. A secure WLAN solution in the new building for half of the users and recommendations to upgrade their existing WLAN infrastructure to keep wiring costs down.

2. Recommendations on a Unified Communications system that meets traffic demands, with minimal interruptions, due to the frequency of international videoconferencing calls that will occur.

3. An IP solution that can accommodate the new users in all locations.

4. Recommendations to upgrade their switch bandwidth to 10GB fiber uplinks between backbone switches,a 10GB connection to each of the servers, and add-in options for redundancy. High availability access to these critical servers is a must because of the expected traffic increase and load on the servers.

5. Proposal for a data center solution that takes advantage of both network and server virtualization technologies to reduce their costs in acquiring and maintaining hardware.

6. Improvements to the link speed to the internet.

7. Options for implementing greater security for their Intranet servers that their partners and employees heavily use and for their overall network infrastructure, as they have had attacks on their DMZ.

8. Have proof thatthese improvementswill be completed within a 4- to 6-month timeline.

Network Configuration Details

The Network Engineer verbally shared the configuration details of their network, as follows:

Headquarters:

• Bldg. 1 and Bldg. 2 are located about 1000 ft. apart.

Switches:

• Bldg. 1 has one 6500 backbone switch installed; which supports users from both buildings.

• Bldg. 2 has a connection to the backbone switch via a 10GB fiber connection (10G Base LR) from uplink port on a Cisco 3850.

• To support the users, each floor contains three Cisco Catalyst 48-port 100Mbps Ethernet switches; which are each cabled to the backbone switch via a 1GB uplink port.

Routers:

• Each floor represents a different subnet and therefore one Cisco router 2610, configured with EIGRP, is cabled to backbone switch (1GB connection) to provide routing for each subnet and provides a WAN interface to the Internet via a T-1 link.

• Each switch also has a link to an access point that uses WPA encryption and 802.11b wireless standard to support users who are in conference/meeting rooms that want to connect to the internet.

Servers:

• 5x Windows Server 2012 R2 (RAID 5) application servers that support the CAD.
• 1 DHCP and FTP server

IP Configuration (DHCP-based)

Building

Floor

Servers

Clients

IP Network

1

1

5

100

194.100.1.0/24

 

2

 

100

194.100.2.0/24

 

3

 

100

194.100.3.0/24

 

4

 

100

194.100.4.0/24

 

5

 

100

194.100.5.0/24

2

1

5

100

195.100.1.0/24

 

2

 

100

195.100.2.0/24

 

3

 

100

195.100.3.0/24

 

4

 

100

195.100.4.0/24

 

5

 

100

195.100.5.0/24

Attachment:- West-Consulting-Modular-Design-Proposal.rar

Reference no: EM131856542

Questions Cloud

Types of meat snacks : Qi is having a Super Bowl party. He will offer the following refreshments: 4 different types of chips, 3 types of meat snacks
Find a confidence interval for a proportion p : Use the normal distribution to find a confidence interval for a proportion P given the relevant sample results.
What inconsistency in hardwig thinking : What do you think was Cohn & Lynn's most important point about Hardwig failing to consider the full impact of a duty to die on a person nearing the end of life?
Research study still be beneficial : If a research study is found to not be clinically significant, can the research study still be beneficial and if so why would it be beneficia
Develop the data center design and security plan : Develop the data center design and security plan. Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.
Confidence interval for proportions : Of the Internet users, 1054 use a social networking site.1 Find a 90% confidence interval for each of the following proportions.
What is the bond annual yield to maturity : What is the bon's annual yield to maturity? YOU MUST SHOW ALL WORK AND USE AT LEAST 4 DECIMAL PLACES.
What makes an ideal society : What makes an ideal society? What are some components that create a society? (Ideas to consider: sociological theories, socialization, social control.
What taxable gain must be reported on the sale : The truck was sold yesterday for $19,000. What taxable gain must be reported on the sale of the truck?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd