Setup a Sandbox environment with servers

Assignment Help Computer Networking
Reference no: EM133148409

Project

Your company has received a new contract to plan and configure their new office structure, and you have been tasked to setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network infrastructure. You will be creating Several virtual machines to run in the Sandbox.

Part 1: IP Structure

1. You will be subnetting 10.0.0.0/24 for the Sandbox network.
2. The first usable IP address of the "Servers and Workstations" subnet will be used as the gateway IP addressfor the Servers and Workstations
3. You will need to subnet your network with the following information, please create a VLSM structure for your Sandbox:

Infrastructure: 9
Servers and Workstations: 120
Printers: 15
Wireless Aps: 32

Question 1 If the population of the network doubles, what will the Network ID and CIDR be?

Part 2: Virtualization
1. Create a switch labelled WSS3-Proj-YOURFIRSTNAME-SW, on the Windows 10 Host machine (Please be sure to change "YOURFIRSTNAME" to your first name
2. Run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then
Get-VMSwitch -Name "WSS3Project*"
3. Take a screenshot and paste it here:

<Provide a screenshothere>

4. Create 3 virtual machines connected to the WSS3-Proj-YOURFIRSTNAME-SWswitch with 2048 MB RAM on each, and labelled as follows, replacing "YOURFIRSTNAME" with your first name:

WSS3 Project DC1.YOURFIRSTNAME.com
WSS3 Project SVR1.YOURFIRSTNAME.com
WSS3 Project WS1.YOURFIRSTNAME.com

5. On your Windows 10 workstation, run the PowerShell cmdlets

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then

Get-VM -Name "*Project*"
6. Take a screenshot and paste it here:

Question 2 What full Powershell command will create the virtual switch in this section?

Question 3 When should you use the .vhdx format instead of .vhd format?

Part 3: Installation and Configuration
1. Installthe operating systems with the following common configurations:
a. Subnet Mask: of the Servers and Workstations Subnet
b. DNS: Second IP of the Servers and Workstations subnet
c. Gateway: First IP of the Servers and Workstations subnet
d. Enable: Remote desktop without network level authentication
e. Change: the time zone and time settings so the time is correct
f. Local Administrator account: "LocalYOURFIRSTNAME" replace "YOURFIRSTNAME" with your first name *** Make sure it has the same privileges as the Default Administrator Account, and so the password never expires

2. Setup the VIRTUAL MACHINE: WSS3 Project DC1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Second IP of the Servers and Workstations subnet
• Change: The hostname of the server to DC1
• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it here:

<Provide a screenshot here>

b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then

Get-NetIPConfiguration

Then

Get-NetIPAddress | Format-Table
c. Take a screenshot and paste the output here:

<Paste Output Here>

3. Setup the VIRTUAL MACHINE: WSS3 Project SVR1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Server 2016 Datacenter with GUI
• IP: Third IP of the Servers and Workstations subnet
• Change: The hostname of the server to SVR1
• As a security measure log into the Local Administrator account you created in step 1

a. In Server Manager take a screenshot of the properties area of the local server and paste it here:

<Provide a screenshot here>

b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then

Get-NetIPConfiguration

then

Get-NetIPAddress | Format-Table

c. Take a screenshot and paste the output here:

<Paste Output Here>

4. Setup theVIRTUAL MACHINE: WSS3 Project WS1.YOURFIRSTNAME.com with the following information:
• OPERATING SYSTEM: Windows 10 Pro
• IP: Fourth IP of the Servers and Workstations subnet
• Change: The hostname of the server to WS1
• As a security measure log into the Local Administrator account you created in step 1

a. In System Properties take a screenshot showing that Remote desktop is enabled, and paste it here:
<Provide a screenshot here>
b. Open an administrative PowerShell prompt and type the following PowerShell cmdlets:

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Hostname
Then
Get-timezone

Then
Get-NetIPConfiguration
Then

Get-NetIPAddress | Format-Table

c. Take a screenshot of all three commands and paste the output here:

Question 4 A user returning from holidays has attempted to login 6 times, the account is locked out. Which powershell command will you need to execute to allow the user to log into the domain again?

Question 5 What Powershell cmdlet would you use to start an interactive session with a remote computer by the name of WS1?

Part 4: DNS
1. Install the DNS role on DC1
2. Create the Domain called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with your first name
3. Make sure that you allow both secure and nonsecure dynamic updates
4. Enable Reverse lookup zone for your domain
5. Make sure that you allow both secure and nonsecure dynamic updates
6. Create zone records:
An A record for DNS1 pointing to the IP if DC1
An A record for RTR1 which points to the first IP address of the Servers and Workstations subnet
7. Open an administrative PowerShell prompt
a. Type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-DnsServerResourceRecord -ZoneName YOURFIRSTNAME.com
Then
Get-DnsServerResourceRecord -ComputerName DC1 -ZoneName "0.0.10.in-addr.arpa"
b. Take a screenshot and paste the output here:

Question 6 List 2 record types that are found on an AD DS integrated DNS that you wouldn't find on a public DNS server

Part 5: AD DS
1. Install the ADDS role on DC1
a. Log into the DC1 as the local administrator account
b. Promote to be a domain controller
c. Create a Domain in a new forest called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with your first nameusing integrated DNS
d. Use theAdministrator account for Delegation
e. Login as YOURFIRSTNAME\Administrator (replacing "YOURFIRSTNAME" with your first name)
f. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-WindowsFeature | Where-Object {$_. name -eq "DNS"} | Format-List Name,Installstate
Then
Get-WindowsFeature | Where-Object {$_. name -eq "AD-Domain-Services"} | Format-List Name,Installstate
g. Take a screenshot and paste the output here:
<Paste Output Here>
2. Create an OU called IT
a. Create your own Administrative account in the IT OU called YOURFIRSTNAME-IT replacing "YOURFIRSTNAME" with your first name, with the same memberships as the administrator account
b. Log into the domain controller with your YOURFIRSTNAME-IT account you created
c. You must only use this account for the remainder of the project
d. Create the OUs in the root of the domain: Administration, Shipping, Finance, and Sales
e. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName
f. Take a screenshot and paste the output here:
<Paste Output Here>
3. Create a Global Security group for each OU
a. Use the name of the OU and add "Group" to the end of the group name (IT Group")
b. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADGroup -Filter 'Name -like "*Group"' | Format-Table Name, Distinguishedname
c. Take a screenshot and paste the output here:
<Paste Output Here>

4. Create a template account for each of the OU's you have created starting with the unique characters: --
a. Each must be labelled -OUNAME-Template (Replace OUNAME with the name of the OU)
b. Each must be added as a member of the OU's group
c. The template accounts must be disabled
d. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADUser -Filter 'Name -like "--*"' | Format-Table Name, Distinguishedname,Enabled

e. Take a screenshot and paste the output here:

Question 7 When is a user's access token created?

Question 8 What is the interface within Active Directory Administrative Center that simplifies the delegation of permissions for domains, OUs, or containers?

Question 9 Which term is described as the process of configuring one or more groups as members of another group?

Part 6: Join Computers to the domain 16 pts
1. Create an OU called Servers, and one called Workstations
2. Join SVR1 and WS1 to the Domain
3. Move SVR1 to the Servers OU
4. Move WS1 to the Workstations OU
5. Log into DC1 with your YOURFIRSTNAME-IT account you created
6. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
get-adcomputer -filter 'Name -like "*"' | FT DNSHostName,Enabled,DistinguishedName,SID
Take a screenshot and paste the output here:

Question 10 What is the syntax command-line utility for joining a domain using Netdom.exe?

Question 11 List an example of two graphical tool in Windows Server 2016 that can create user objects.

Part 7: Group Policy
1. Create a Group Policy Object called "Workstations":
a. Folder Redirection
i. Redirect all users' Documents folder to their own folder on a hidden share called Staff on SVR1's C:\ drive
2. Modify the Default Domain Policy with the following settings:
a. Password Policy:
i. Enforce Password History: 12 passwords remembered
ii. Max Password Age: 32 Days
iii. Minimum Password Age: 10 Days
iv. Minimum Password Length: 10 Characters
v. Complexity requirements: Enabled
b. Account Lockout policy
i. Threshold: 5 Attempts
ii. User will be locked out until manually reset
3. Log into WS1 as your YOURFIRSTNAME-IT account you created
4. Take a screenshot of:
a. The Default Domain Policy GPO displaying the Password Policy, and Account Lockout Policy
b. The Workstations GPO displaying the Folder Redirection Policy

Question 12 The Group Policy templates (GPT) folder structure is located in the shared ________ folder on a domain controller.

Question 13 What is the setting on an individual GPO link that forces the GPO's settings to flow down through the AD DS hierarchy, without being blocked by child OUs?

Question 14 Describe Group Policy Preferences (GPPs).

Part 8: AD CS
1. Install the ADCSCertification Authority Role on SVR1
a. Key Length 4096
b. SHA256 Hash Algorithm
c. Leave the default for the Common Name for this CA
2. Open an administrative PowerShell prompt, and type the following Powershell cmdlets:
- function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}
Then:
- Get-CACrlDistributionPoint

Question 15 A __________ is an electronic document that contains an identity, such as a user or organization name, along with a corresponding public key.

Question 16 Which PKI-related service is used for network devices such as switches and routers to enroll for an X.509 digital certificate from a CA?

Part 9: IPv6 Subnetting
1. The Sandbox network will also require the use of IPv6 for future use when the company transitions to it. Using the standard IPv6 addressing and its built in subnets, create a subnetting scheme for future use with the Sandbox. Use ULA addresses for this IP architecture.

Attachment:- Project - The Sandbox.rar

Reference no: EM133148409

Questions Cloud

Compute the anticipated break-even number of barrels : In addition, assume that Anheuser-Busch InBev sold 44,000 barrels of beer during the year. Compute the anticipated break-even number of barrels
Cultural differences in different parts of the country : Does anyone know of any other cultural differences in different parts of the country, other than the highway salute or insulting someone else?
Identify two strategies discussed by chip heath : Identify two strategies discussed by Chip Heath that will help you make better career decisions?
Mention two characteristics of employees : -As an employee, explain two benefits and two disadvantages of being part of the in-group and the out-group.
Setup a Sandbox environment with servers : Setup a Sandbox environment with servers and a workstation to begin testing Proof of Design network infrastructure
Corporate social responsibilities in the long run : Explain how the BSC approach can help sustain Corporate social responsibilities in the long run?
What is the lump sum you would expect to receive today : Given these data, what is the lump sum you would expect to receive today? Also discuss the pros and cons of receiving a lump sum or monthly payments
Describe the aspects of the organization culture : Describe the aspects of the organization's culture that support those financial practices (whether good or bad)
What the amount of direct labor and factory overhead : Wilturner Company incurs $81,000 of labor related directly to the product in the Assembly Department, What the amount of direct labor and factory overhead

Reviews

Write a Review

Computer Networking Questions & Answers

  What are best practices for working effectively

What are best practices for working effectively and efficiently in a project team environment?

  Explain the end-to-end process of how voip works

Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure..

  Question 1abriefly explain how the suspect dobson in utah

question 1abriefly explain how the suspect dobson in utah has been intercepting his ex-employer email.baccording to the

  Examine the major difficulties that users have encountered

From the first e-Activity, examine the major difficulties that users have encountered throughout IPv6's widespread acceptance and implementation.

  Calculate the network address of block

COIT20261 Network Routing and Switching - Calculate the network address of block and how many addresses including special addresses this block can

  In the early years of web authoring websites commonly

in the early years of web authoring websites commonly posted operating system browser and even resolution

  Evaluate various wireless networks performance

MN603 - Wireless Networks and Security - Wireless networks performance evaluation - Critical analysis of the results of the two routing protocols

  Telecommunications-networking routing algorithms

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each?

  Virtual infrastructure design

Founded in 1990, Century Pharmaceuticals Ltd is a regional Australian pharmaceutical company that delivers pharmaceutical supply chain services to a number of nursing care facilities in regional Australia.

  Athe keyspace for a cipher is the set all of possible keys

athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56

  Mitigating dos attacks against broadcast authentication in

mitigating dos attacks against broadcast authentication in wireless sensor networksbroadcast authentication is the most

  What is the purpose of the dlci tag

Draw a picture of a point-to-point connection to the Frame Relay cloud.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd