Proof of design network infrastructure

Assignment Help Computer Network Security
Reference no: EM133546278

Project

Your company has received a new contract to plan and configure their new office structure, and you have been tasked to setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network infrastructure. You will be creating Several virtual machines to run in the Sandbox.

Part 1: IP Structure
1. You will be subnetting 10.0.0.0/24 for the Sandbox network.
2. The first usable IP address of the "Servers and Workstations" subnet will be used as the
gateway IP address for the Servers and Workstations
3. You will need to subnet your network with the following information, please create a VLSM structure for your Sandbox:

Task 1. Enter your VLSM in the table provided in the workbook attached
Question 1: If the population of the network doubles, what will the Network ID and CIDR be? (Enter your answer in the workbook attached)

Part 2: Virtualization
4. Create a switch labelled WAS3-Proj-YOURFIRSTNAME-SW, on the Windows 10 Host machine (Please be sure to change "YOURFIRSTNAME" to your first name

5. Run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then
Get-VMSwitch -Name "WAS3-Proj*"
3. Take a screenshot and paste it in the workbook attached

Task 2. Provide the screenshot in the workbook attached

4. Create 3 virtual machines connected to the WAS3-Proj-YOURFIRSTNAME-SW switch with 2048 MB RAM on each, and labelled as follows, replacing "YOURFIRSTNAME" with your first name:
WAS3 Project DC1.YOURFIRSTNAME.com WAS3 Project SVR1.YOURFIRSTNAME.com WAS3 Project WS1.YOURFIRSTNAME.com
5. On your host machine, run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "} then
Get-VM -Name "*Project*"
6. Take a screenshot and paste it in the workbook attached

Task 3. Provide the screenshot in the workbook attached

Question 2: What full Powershell command will create the virtual switch in this section? (Enter your answer in the workbook attached)

Question 3: When should you use the .vhdx format instead of .vhd format? (Enter your answer in the workbook attached)

Part 3: Installation and Configuration

6. Subnet Mask: of the Servers and Workstations Subnet
7. DNS: Second IP of the Servers and Workstations subnet
8. Gateway: First IP of the Servers and Workstations subnet
9. Enable: Remote desktop without network level authentication
10. Change: the time zone and time settings so the time is correct
11. Local Administrator account: "LocalYOURFIRSTNAME" replace "YOURFIRSTNAME" with your first name *** Make sure it has the same privileges as the Default Administrator Account, and so the password never expires.

2. Setup the VIRTUAL MACHINE: WAS3 Project DC1.YOURFIRSTNAME.com with the following information:

• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Second IP of the Servers and Workstations subnet
• Change: The hostname of the server to DC1

• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it in the workbook attached

Task 4. Provide the screenshot in the workbook attached

b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-NetIPConfiguration Then

Get-NetIPAddress | Format-Table

c. Take a screenshot and paste it in the workbook attached

Task 5. Provide the screenshot in the workbook attached

3. Setup the VIRTUAL MACHINE: WAS3 Project SVR1.YOURFIRSTNAME.com with the following information:

• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Third IP of the Servers and Workstations subnet
• Change: The hostname of the server to SVR1
• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it in the workbook attached

Task 6. Provide the screenshot in the workbook attached
b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}
then

Get-NetIPConfiguration then
Get-NetIPAddress | Format-Table
c. Take a screenshot and paste it in the workbook attached

Task 7. Provide the screenshot in the workbook attached

4. Setup the VIRTUAL MACHINE: WAS3 Project WS1.YOURFIRSTNAME.com with the following information:

• OPERATING SYSTEM: Windows 10 Pro
• IP: Fourth IP of the Servers and Workstations subnet
• Change: The hostname of the server to WS1
• As a security measure log into the Local Administrator account you created in step 1

a. In System Properties take a screenshot showing that Remote desktop is enabled, and paste it in the workbook attached

Task 8. Provide the screenshot in the workbook attached

5. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Hostname
Then
Get-timezone

Then
Get-NetIPConfiguration

Then

Get-NetIPAddress | Format-Table

c. Take a screenshot of all three commands and paste it in the workbook attached

Task 9. Provide the screenshot in the workbook attached
Question 4: A user returning from holidays has attempted to login 6 times, the account is locked out. Which Powershell command will you need to execute to allow the user to log into the domain again? (Enter your answer in the workbook attached)
Question 5: What Powershell cmdlet would you use to start an interactive session with a remote computer by the name of WS1? (Enter your answer in the workbook attached)

Part 4: DNS
12. Install the DNS role on DC1
13. Create the Domain called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with
your first name
14. Make sure that you allow both secure and nonsecure dynamic updates
15. Enable Reverse lookup zone for your domain
16. Make sure that you allow both secure and nonsecure dynamic updates
17. Create zone records:
An A record for DNS1 pointing to the IP if DC1
An A record for RTR1 which points to the first IP address of the Servers and Workstations subnet
7. Open an administrative PowerShell prompt
a. Type the following Powershell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-DnsServerResourceRecord -ZoneName YOURFIRSTNAME.com

Then

Get-DnsServerResourceRecord -ComputerName DC1 -ZoneName "0.0.10.in- addr.arpa"

b. Take a screenshot and paste it in the workbook attached

Task 10. Provide the screenshot in the workbook attached
Question 6: List 2 record types that are found on an AD DS integrated DNS that you
wouldn't find on a public DNS server (Enter your answer in the workbook attached)

Part 5: AD DS
a. Install the AD DS role on DC1

a. Log into the DC1 as the local administrator account
b. Promote to be a domain controller
c. Create a Domain in a new forest called YOURFIRSTNAME.com replacing "YOURFIRSTNAME"
with your first name using integrated DNS
d. Use the Administrator account for Delegation
e. Login as YOURFIRSTNAME\Administrator (replacing "YOURFIRSTNAME" with your first name)
f. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-WindowsFeature | Where-Object {$_. name -eq "DNS"} | Format-List Name,Installstate
Then
Get-WindowsFeature | Where-Object {$_. name -eq "AD-Domain-Services"}
| Format-List Name,Installstate
g. Take a screenshot in the workbook attached

Task 11. Provide the screenshot in the workbook attached

2. Create an OU called IT
a. Create your own Administrative account in the IT OU called YOURFIRSTNAME-IT replacing "YOURFIRSTNAME" with your first name, with the same memberships as the administrator account
b. Log into the domain controller with your YOURFIRSTNAME-IT account you created
c. You must only use this account for the remainder of the project
d. Create the OUs in the root of the domain: Administration, Shipping, Finance, and Sales
e. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:


function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName
f. Take a screenshot in the workbook attached

Task 12. Provide the screenshot in the workbook attached
3. Create a Global Security group for each OU

a. Use the name of the OU and add "Group" to the end of the group name (IT Group")
b. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADGroup -Filter 'Name -like "*Group"' | Format-Table Name,
Distinguishedname
c. Take a screenshot in the workbook attached

Task 13. Provide the screenshot in the workbook attached


4. Create a template account for each of the OU's you have created starting with the unique
characters: --
a. Each must be labelled -OU NAME-Template (Replace OU NAME with the name of the OU)
b. Each must be added as a member of the OU's group
c. The template accounts must be disabled
d. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:


function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADUser -Filter 'Name -like "--*"' | Format-Table Name,
Distinguishedname,Enabled
e. Take a screenshot in the workbook attached

Task 14. Provide the screenshot in the workbook attached
Question 7: When is a user's access token created? (Enter your answer in the workbook attached)
Question 8: What is the interface within Active Directory Administrative Center that simplifies the delegation of permissions for domains, OUs, or containers? (Enter your answer in the workbook attached)
Question 9: Which term is described as the process of configuring one or more groups as members of another group? (Enter your answer in the workbook attached)

Part 6: Join Computers to the domain

18. Create an OU called Servers, and one called Workstations
19. Join SVR1 and WS1 to the Domain


20. Move SVR1 to the Servers OU
21. Move WS1 to the Workstations OU
22. Log into DC1 with your YOURFIRSTNAME-IT account you created
23. Open an administrative PowerShell prompt, and type the following Powershell cmdlets: function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
get-adcomputer -filter 'Name -like "*"' | FT DNSHostName,Enabled,DistinguishedName,SID
Take a screenshot in the workbook attached

Task 15. Provide the screenshot in the workbook attached
Question 10 What is the syntax command-line utility for joining a domain using Netdom.exe? (Enter your answer in the workbook attached)
Question 11 List an example of two graphical tool in Windows Server 2016 that can create user objects. (Enter your answer in the workbook attached)

Part 7: Group Policy
24. Create a Group Policy Object called "Workstations":

a. Folder Redirection
i. Redirect all users' Documents folder to their own folder on a hidden share called Staff on
SVR1's C:\ drive

2. Modify the Default Domain Policy with the following settings:
a. Password Policy:

i. Enforce Password History: 12 passwords remembered
ii. Max Password Age: 32 Days
iii. Minimum Password Age: 10 Days
iv. Minimum Password Length: 10 Characters
v. Complexity requirements: Enabled
b. Account Lockout policy
i. Threshold: 5 Attempts

ii. User will be locked out until manually reset

3. Log into WS1 as your YOURFIRSTNAME-IT account you created
4. Take a screenshot of:
a. The Default Domain Policy GPO displaying the Password Policy, and Account Lockout Policy
b. The Workstations GPO displaying the Folder Redirection Policy

Task 16. Provide the screenshot in the workbook attached

Part 8: AD CS
25. Install the AD CS Certification Authority Role on SVR1
a. Key Length 4096
b. SHA256 Hash Algorithm
c. Leave the default for the Common Name for this CA
2. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-CACrlDistributionPoint
3. Take a screenshot in the workbook attached

Task 17. Provide the screenshot in the workbook attached

Part 9: IPv6 Subnetting

26. The Sandbox network will also require the use of IPv6 for future use when the company transitions to it. Using the standard IPv6 addressing and its built in subnets, create a subnetting scheme for future use with the Sandbox. Use ULA addresses for this IP architecture.
27. fc00:db8:2:1a:20:ab00::

Task 18. Enter your subnets in the table provided in the workbook attached

Project Workbook

Part 1: IP Structure

Task 1: Enter your VLSM in the table below:

Question 1 If the population of the network doubles, what will the Network ID and CIDR be?

Part 2: Virtualization

Task 2. Provide the screenshot here

Task 3. Provide the screenshot here

Question 2 What full Powershell command will create the virtual switch in this section?

Question 3 When should you use the .vhdx format instead of .vhd format?

Part 3: Installation and Configuration

Task 4. Provide the screenshot here

Task 5. Provide the screenshot here

Task 6. Provide the screenshot here

Task 7. Provide the screenshot here

Task 8. Provide the screenshot here

Task 9. Provide the screenshot here

Question 4 A user returning from holidays has attempted to login 6 times, the account is locked out. Which powershell command will you need to execute to allow the user to log into the domain again?

Question 5 What Powershell cmdlet would you use to start an interactive session with a remote computer by the name of WS1?

Part 4: DNS

Task 10. Provide the screenshot here

Question 6 List 2 record types that are found on an AD DS integrated DNS that you wouldn't find on a public DNS server

Part 5: AD DS

Task 11. Provide the screenshot here

Task 12. Provide the screenshot here

Task 13. Provide the screenshot here

Task 14. Provide the screenshot here

Question 7 When is a user's access token created?

Question 8 What is the interface within Active Directory Administrative Center that simplifies the delegation of permissions for domains, OUs, or containers?

Question 9 Which term is described as the process of configuring one or more groups as members of another group?

Part 6: Join Computers to the domain

Task 15. Provide the screenshot here

Question 10 What is the syntax command-line utility for joining a domain using Netdom.exe?

Question 11 List an example of two graphical tool in Windows Server 2016 that can create user objects.

Part 7: Group Policy

Task 16. Provide the screenshot here

Question 12 The Group Policy templates (GPT) folder structure is located in the shared folder on a domain controller.

Question 13 What is the setting on an individual GPO link that forces the GPO's settings to flow down through the AD DS hierarchy, without being blocked by child OUs?

Question 14 Describe Group Policy Preferences (GPPs).

Part 8: AD CS

Task 17. Provide the screenshot here

Question 15 A is an electronic document that contains an identity, such as a user or organization name, along with a corresponding public key.

Question 16 Which PKI-related service is used for network devices such as switches and routers to enroll for an X.509 digital certificate from a CA?

Part 9: IPv6 Subnetting

Task 18: Enter your subnet in the table.

Attachment:- Project Workbook.zip

Reference no: EM133546278

Questions Cloud

What truly sets our team apart is our collective commitment : What truly sets our team apart is our collective commitment. This shared determination to be the best version of ourselves and to deliver outstanding results.
Develop at least five adaptive strategies for organization : Develop at least five adaptive strategies (with at least one strategy focused on information systems and/or technologies) for the organization.
How will you manage your emotion during the conversation : How will you manage your emotion during the conversation while still maintaining empathy and trust with the employee?
How are you defining team effectiveness : How are you defining team effectiveness? What has each team member learned that will be used in work teams in the future?
Proof of design network infrastructure : Creating Several virtual machines to run in the Sandbox - setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network
Which ratios will be affected and how by accelerating sales : Explain if you think there are ethical implications of Bill's actions. Which ratios will be affected, and how, by accelerating these sales?
Evaluates organizations external and internal environments : Evaluates the organization's external and internal environments. Includes a people plan and addresses achievement of a diverse workforce.
How does twitter internal environment compare to environment : How does Twitter's internal environment compare to the internal environment of one of its competitors?
Create required journal entries with one error : Define accounting terminology and its application to accounting principles. Create required journal entries with one error.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Information security vulnerabilities with related threats

Create a list of 50 information security vulnerabilities with related threats relevant to the organization

  Propose a detailed plan that focuses on password policies

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Under what conditions will there be equality

Suppose that the source X is mapped into the source Y having values yj = g(xi) for xi ∈ X. -  Show that H(Y) ≤ H(X). Under what conditions will there be equality? -  Under what conditions is H(X|Y) = 0?

  Is the system breakable if the language is standard english

What degree of redundancy rL of the language is necessary in order that this code system be breakable? - Is the system breakable if the language is standard English?

  Develop a security awareness training communication plan

CIS 110 Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO).

  Compare and contrast online analytic processing

Write a one page paper (250 words) on Compare and contrast Online Analytic Processing (OLAP) and Online Transaction Processing (OLTP); also discuss Codd's rules for TP databases and OLAP databases (New Times Roman, 12 pt, double spaced, Essay). Ci..

  Analyse a case study and identify issues associated

Analyse a case study and identify issues associated with the business - You will acquire a good understanding of smart application design in a cloud environment

  Analyze the network protocols and security mechanisms

Analyze the network protocols and security mechanisms in wireless networks. Evaluate the application of Wireless LANs, MANs, and PANs.

  Draw a network mode of the Quicken Bill Pay service

MSDL Security Architecture and Design- Consider an electronic bill paying system (such as Quicken Bill Pay), Draw a network mode of the Quicken Bill Pay service

  Develop curiosity to generate significant and problematic

Hopefully, this semester your accompanying research helped you to become more critical consumers of the material you read, and to develop the curiosity to generate significant and problematic questions.

  Cyber activity compromising national security information

Analyze the relationship between cyber activity compromising national security information and the social media response.

  Article review - hackers take aim at key u.s. infrastructure

You need to write paragraph on article - Hackers take aim at key U.S. infrastructure by Steve Hargreaves

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd