Design and draw the network topology

Assignment Help Computer Networking
Reference no: EM132300395

Assignment - Network Design and Implementation

Scenario A

You are a network specialist for ActiveDirectoryxx.com (where xx is the number of your assigned account student-xx to login to VSphere Client). You company have 4 servers running window server 2012 (Root-DC, Com-A, Com-B and Com-C). You are given a subnet 50.50.xx.0 (the value of xx is the same as above), mask 255.255.255.0. You are required to design and configure a network with active directory according to the following requirement:

Two server computers must act as active directory domain controller for the ActiveDirectoryxx.com, to support the high volume of user for your company. Among them, one should be configured as Read Only Domain Controller which does not allow modification of the active directory database. The root Domain Controller is located in Melbourne. Your company opens one branch in Sydney and takes the child domain name as Syd.ActiveDirectoryxx.com. Another computer should be configured as a member computer of the root domain.

Note: You can use the VMware provided in the Labs on campus or setting up your own VWware on your PC for this assignment.

If you choose to use the Labs' computers, before attempting the assignment tasks, you should take a Snapshot of the VMware DC, SYD-A, SYD-B and SYD-Core for backup.

If you choose to use your own PC, you are responsible for installation and maintenance of your own systems.

Task 1: Computer Preparation

If you use your own PC:

• Install fresh window server 2012 R2 on your VMware platform.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly.

If you use the VMware in computer labs:

• Take snapshots of your VMware for backup.
• Remove all Active Directory Installation from all computers.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly, and computers are not in any domain.

Task 2: Active Directory Design and Initial Setup

• Design and draw the network topology based on the above requirement. Clearly label the server computer names, assigned IP addresses, assigned domains, and DNS IP addresses.
• Set up the computers IP address and DNS IP address according to the proposed design.
• Use commands ipconfig /all to verify the configurations and ping to verify connection between computers, take screenshots of the computer information and pings.

Task 3: Active Directory Installation

• Configure the active directory following the proposed design.
• Capture necessary screenshots to demonstrate the steps taken to configure the network, and provide some explanation for your steps.
• After completed the configuration, take screenshot of Computers and Domain Controllers folder in Active Directory User and Computers of the root domain controller to verify the existing domain controllers and member computer in the network.

Task 4: Active Directory Management A - Group Management
• Create a security group named Melbourne_Group. Create a new group Managed Service Account named Sydney. Configure the group Managed Service Account to be used by computers that are members of the Melbourne_Group.

B - User Account Management:

• Create a new user named ADTest_User, and request user must change password at the first logon. Log on using a member computer to verify the setting is working. (Take screenshots of the account creation and log in process)
• Try to logon to the root domain controller using ADTest_User account. Why can't you login? Perform necessary configuration to enable ADTest_User to be able to login onto the root domain controller.

C - Policies Applications:

• Use Group Policy preferences to automatically delete the contents of the c:\Windows\Temp folder each time user ADTest_User signs on to a computer. Create some text files in the Temp folder, then log off and log in again using ADTest_User to verify the policy has been applied.

D - Software Restriction:

• Use a software restriction policy to block ADTest_User from opening iexplore.exe on any computer in the domain ActiveDirectoryxx.com.
• Log into a computer using ADTest_User and verify that ADTest_User cannot open iexplore.exe
• Log on to any computer using Administrator account and verify that iexplore.exe can be opened.

Assignment Specific Requirements

• You are required implement the active directory according to the tasks specified above.
• You will prepare a documentation that provides the network design and describes the steps taken and the screenshots of the system.
• The description of steps does not need to be as detailed as in the lab manual, but it should provide enough information for reader to understand what you did to achieve the desired outcome.
• Mark will be given to screenshot of the system and quality of the step description.

Reference no: EM132300395

Questions Cloud

What is your ultimate career goal : Long-Term Goals: What is your ultimate career goal (e.g., I would like to run my own manufacturing company)? Short-Term Goals: What is your immediate career.
Define what did willy believe was key to successful selling : What did Willy believe was the key to successful selling? Do you agree? Does Willy's brother Ben fit into this? Has the play added anything to how you view.
Impact of two distinctively different styles of management : This case shows the impact of two distinctively different styles of management. describe their impact on the hospital’s effectiveness.
What course of action will benefit company in the long-term : What course of action will benefit the company in the long-term - eliminating all perks, retaining all perks, or eliminating some perks while keeping others?
Design and draw the network topology : NIT3122 - Enterprise Network Management - Victoria University - Network Design and Implementation - Active Directory Design and Initial Setup
Manufactures two types of wooden toys : Giapetto’s Woodcarving, Inc., manufactures two types of wooden toys: soldiers and trains.
How a diverse workforce drives economic growth : The Evolution of HR's Role outsourcing personnel management, (c) repatriating employees from foreign assignments, (d) ethical leadership methods and corporate.
A customer service experience : A lady gets her car serviced at the dealership where she bought it. Using what you know about QFD, what is the voice of the customer saying?
Find an example of bogus or less than credible web site : Find an example of a bogus or less than credible Web site. Indicate why you perceive it to be untrustworthy.

Reviews

len2300395

5/6/2019 11:30:31 PM

C-Policies Applications (4 Marks) + Use Group Policy preferences to automatically delete the contents of the c:\Windows\Temp folder each time user ADTest_User signs on to a computer. (Description of Steps is provided appropriately) + Create some text files in the Temp folder, then log off and log in again using ADTest_User to verify the policy has been applied (Description of verification is provided appropriately) D-Software Restriction (5 Marks) + Describle steps of setting up software restriction policy to block ADTest_User from opening iexplore.exe on any computer in the domain ActiveDirectoryxx.com + Login to a computer using ADTest_User and verify that ADTest_User cannot open iexplore.exe (Description of Steps are shown properly) + Log on to any computer using Administrator account and verify that iexplore.exe can be opened (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:24 PM

B-User Account Management (4 Marks) + Create a new user named ADTest_User, and request user must change password at the first logon. Log on using a member computer to verify the setting is working. (Description and screenshots of the account creation and log in process are provided appropriately) + Explain why you can not login to the root domain controller using ADTest_User account + Perform necessary configuration to enable ADTest_User to be able to login onto the root domain controller (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:16 PM

Task 3 (7 Marks): Active Directory Installation + Capture necessary screenshots to demonstrate the steps taken to configure the network, and provide some explanation for your steps + After completed the configuration, take screenshot of Computers and Domain Controllers folder in Active Directory User and Computers of the root domain controller to verify the existing domain controllers and member computer in the network. Task 4 (17 Marks): Active Directory Management A-Group Management (4 Marks) + Security group Melbourne_Group and group managed Service Account Sydney are created correctly (Description of Steps are shown properly) + Configure the group Managed Service Account to be used by computers that are members of the Melbourne_Group (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:08 PM

Marking Criteria Task 1 (3 Marks): Computer Preparation + Computers are with appropriate names and not apart of any domain. Verification information and description are appropriate. Task 2 (3 Marks): Active Directory Design and Initial Setup + network topology is correctly design according requirement. Labels are shown appropriately (server computer names, assigned IP addresses, assigned domains, and DNS IP addresses) + IP address and DNS IP address are set up correctly. Ping verification is shown and working properly

len2300395

5/6/2019 11:29:59 PM

Submission Requirements You are required to submit a word document containing Assignment Cover Sheet (provided on VU Collaborate) with your name and student ID, together with the screenshot and step description. The content in the document may be compared with the actual implementation. Therefore, you are required to maintain the system after completing and submitting your assignment. You may be requested to present your implementation to verify your work. Your assignment will be marked based on the functionality of the system after implementation and the quality of your documentation. Penalty of 5% will be applied for each day late.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd