Provide secure remote access solution that utilizes network

Assignment Help Computer Network Security
Reference no: EM131099689

Network Proposal

Overview

EchoSoft is an educational software developer that provides software and cloud computing solutions to private and public educational institutions throughout North America and Europe. The organization currently has four major offices located in Vienna, Virginia, San Jose, California and Dublin, Ireland. A sales team of more than a hundred work across the United States and Europe, primarily from their own homes. EchoSofthas experienced a combination of growth and disaster in the last 3 years and plans to add an additional 130+ employees, including opening a new office in Austin Texas in the next 6 months. To meet these growth challenges,EchoSoftis in the process of upgrading the network environment from the current adhoc design,comprised of Windows 2003, 2008 and *NIX systems, to Windows 2012R2 Active Directory. Steps have already been taken to improve the network infrastructure. The Vienna Virginia location has replaced all 2008 Domain Controllers with Windows 2012 Servers. However, the San Joseand Dublinlocationsare still running a single Windows 2008 Domain Controller at each site. Currently all server and workstation IP addresses are statically assigned. DNS is hosted on an older generation UNIX server that has been hacked several times due to faulty security. Remote users currently connect via VPN, which has caused numerous security incidents due to missing antivirus software, outdated AV signatures and missing OS patches on workstations and laptops.

Although the Austin location has not officially opened there are six users currently deployed to that location. There are currently no domain controllers or qualified personal to support them at this location. This site needs to be incorporated into the EchoSoftActive Directory ASAP. Austin users must be able to authenticate and access EchoSoftActive Directory services. EchoSofthas recently acquired another company EduTech Inc. The existing EduTechActive Directory Domain needs to be integrated into the existing EchoSoftActive Directory forest. The EchoSoftdata center is located at the Vienna and Dublin locations. This is where EchoSofthosts and maintains its cloud computing services. Due to increased demand for its cloud services EchoSofthas experienced difficulty getting servers and services deployed in time due to the lack of an efficient and cost-effective deployment process. The current Active Directory is a single domain. It is up to you finish the network design and improve the server infrastructure.

Current Physical Locations

1716_Current Physical Locations.jpg

Current Logical Design

414_Current Logical Design.jpg

Required Proposal Responses

Executive Overview - Provide an executive overview for Infrastructure proposal. How will your proposal help EchoSoft? What are the key aspects of your design? Why should EchoSoftselect your proposal over your competitors' proposals?

Develop a Windows Deployment Design and plan an automated client workstation and server installation strategy. This objective can include but is not limited to: images and bare metal/virtual deployment; plan for multicast deployment and plan for Windows Deployment Services (WDS).This solution should enable EchoSoftto deploy client and server operating systems in a timely and cost-effective manner.

Plan and deploy Virtual Machine Manager Services. This objective may include but is not limited to: Design Virtual Machine Manager service templates; plan and deploy profiles including operating system profiles, hardware and capability profiles, application profiles, plan and manage services including scaling out, updating, and servicing services; configure Virtual Machine Manager libraries. This solution should enable EchoSoftto deploy servers in a timely and cost-effective manner.

Windows Server Design - Vienna has two Domain Controllers. All other locations have single Domain Controllers. Vienna's domain controllers are running Windows Server 2012, but the other sites are running Windows Server 2008 Domain Controllers. All other services on the network are running on either older UNIX or Windows Server 2008 and 2003 servers. These legacy servers should be replaced as part of this project. Describe your recommendations for the server environment, focusing on any needed upgrades and the number of servers needed at each location to handle key network infrastructure services and roles (DNS, DHCP, File, Print, RRAS, etc.) You can make any recommendation for the server environment but explain how it will benefit your design.

Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution. This objective may include but is not limited to the following: Design considerations including a highly available DHCP solution including split scope, DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCP filtering. Describe how you will provide fault tolerance in the event that a primary DHCP server should fail. How will you handle remote users, network devices and printers?

DNS - Design a name resolution strategy. This objective may include but is not limited to: Design considerations, including Active Directory-integrated zones, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation.

Implement a scalable Remote Access solution. This objective may include but is not limited to: Configure site-to-site VPN; configure packet filters; implement packet tracing; implement multisite Remote Access and a DirectAccess solution.

Design an Active Directory topology. This objective may include but is not limited to: Design considerations including read-only domain controllers (RODCs), proximity of domain controllers, replication optimization, and site link; Group Policy, monitor and resolve Active Directory replication conflicts.

Your proposal must incorporate the following items

1. All Domain Controllers must be Windows 2012 2R2 Active Directory.
2. All sites must have Active Directory services available even if a single Domain Controller fails.
3. Client IP address assignment must be automated and manageable for all sites and locations.
4. DNS must be manageable and secure. Clients must be able to resolve DNS even if a single DNS server fails or during aninternet connection outage.
5. DHCP should be designed with fault tolerance in mind.
6. Provide secure remote access solution that utilizes Network Access Policy controls.
7. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.
8. Provide easy and manageable server image and software deployments. All servers should be Windows Server 2012 R2.
9. EduTech and EchoSoftActive Directory forests must be able to trust each other.
10. The Austin location needs be integrated into the EchoSoftActive Directory. This solution must cost-effective, manageable and secure.

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

• At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.

• The submission must cover all of the major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the topics required, as well as a summary.

• At least two non-Lab, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with"Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it.

Reference no: EM131099689

Questions Cloud

Find the z score corresponding to a woman : Women's heights have a mean of 63.6 in. and a standard deviation of 2.5 inches.  Find the z score corresponding to a woman with a height of 70 inches and determine whether the height is unusual.
Determine the output impedance of the emitter follower : Sketch |Zout| as a function of frequency. Assume VA = ∞.
Probability that out of the next : A particular department store knows from past experience that 35% of their customers have the store's credit card. What is the probability that out of the next 13 customers that exactly 6 have the store's credit card? (please express your answer u..
Comparison of the costs of debt and preferred stock : The treasurer of Riley Coal Co. is asked to compute the cost of fixed income securities for her corporation. Even before making the calculations, she assumes the aftertax cost of debt is at least 1 percent less than that for preferred stock.
Provide secure remote access solution that utilizes network : Provide secure remote access solution that utilizes Network Access Policy controls. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.
Develop and share your own personal theory of leadership : Briefly summarize the theories you analyzed in Part I, focusing on an overview of the key aspects from that analysis that will inform the discussion of your personal leadership style and its application.
Question regarding the child percentile rank : A fifth grader takes a standardized achievement test (mean = 125, standard deviation = 15) and scores a 148. What is the child's percentile rank?
Accumulated in his retirement account : b. In addition to this, 10 years ago Nick received an inheritance check for $30,000 from his beloved uncle. He decided to deposit the entire amount into his retirement fund. What is his current balance in the fiord?
Have the parties committed violation of any anti-trust laws : Have the parties committed a violation of any anti-trust laws? What laws may apply in this situation, and is the fact that BWC agreed to consider the plan significant? In answering this question, make sure that you fully explain your answers.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available to the general public, is "128-bit encryption" the strongest

  Develop the issp for the organisation

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

  Recovering scrambled bits

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Pros and cons to the project using predictive sdlc

Write brief description of the Pros and Cons to approaching the project using the 'Predictive' SDLC, then the Pros and Cons to approaching the project using the 'Adaptive' SDLC.

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  Write down a 1000- to 1500-word paper on at least three

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Numbering system called hexadecimal

Programmers often use another numbering system called hexadecimal (hex). Briefly explain the base of this system, as well as the characters used to express numbers. What is the reasoning behind this choice for counting?

  Have you ever been the victim of a software error

Should the FBI be responsible for the accuracy of information about criminals and crime victims it enters into the National Crime Information Center database?

  Comprehensive analysis of the business needs

Identify network security measures needed and providing detailed information about them. Network security measures should also include preventative and maintenance measures.

  Explain in detail the security controls

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd