Provide secure remote access solution that utilizes network

Assignment Help Computer Network Security
Reference no: EM131099689

Network Proposal

Overview

EchoSoft is an educational software developer that provides software and cloud computing solutions to private and public educational institutions throughout North America and Europe. The organization currently has four major offices located in Vienna, Virginia, San Jose, California and Dublin, Ireland. A sales team of more than a hundred work across the United States and Europe, primarily from their own homes. EchoSofthas experienced a combination of growth and disaster in the last 3 years and plans to add an additional 130+ employees, including opening a new office in Austin Texas in the next 6 months. To meet these growth challenges,EchoSoftis in the process of upgrading the network environment from the current adhoc design,comprised of Windows 2003, 2008 and *NIX systems, to Windows 2012R2 Active Directory. Steps have already been taken to improve the network infrastructure. The Vienna Virginia location has replaced all 2008 Domain Controllers with Windows 2012 Servers. However, the San Joseand Dublinlocationsare still running a single Windows 2008 Domain Controller at each site. Currently all server and workstation IP addresses are statically assigned. DNS is hosted on an older generation UNIX server that has been hacked several times due to faulty security. Remote users currently connect via VPN, which has caused numerous security incidents due to missing antivirus software, outdated AV signatures and missing OS patches on workstations and laptops.

Although the Austin location has not officially opened there are six users currently deployed to that location. There are currently no domain controllers or qualified personal to support them at this location. This site needs to be incorporated into the EchoSoftActive Directory ASAP. Austin users must be able to authenticate and access EchoSoftActive Directory services. EchoSofthas recently acquired another company EduTech Inc. The existing EduTechActive Directory Domain needs to be integrated into the existing EchoSoftActive Directory forest. The EchoSoftdata center is located at the Vienna and Dublin locations. This is where EchoSofthosts and maintains its cloud computing services. Due to increased demand for its cloud services EchoSofthas experienced difficulty getting servers and services deployed in time due to the lack of an efficient and cost-effective deployment process. The current Active Directory is a single domain. It is up to you finish the network design and improve the server infrastructure.

Current Physical Locations

1716_Current Physical Locations.jpg

Current Logical Design

414_Current Logical Design.jpg

Required Proposal Responses

Executive Overview - Provide an executive overview for Infrastructure proposal. How will your proposal help EchoSoft? What are the key aspects of your design? Why should EchoSoftselect your proposal over your competitors' proposals?

Develop a Windows Deployment Design and plan an automated client workstation and server installation strategy. This objective can include but is not limited to: images and bare metal/virtual deployment; plan for multicast deployment and plan for Windows Deployment Services (WDS).This solution should enable EchoSoftto deploy client and server operating systems in a timely and cost-effective manner.

Plan and deploy Virtual Machine Manager Services. This objective may include but is not limited to: Design Virtual Machine Manager service templates; plan and deploy profiles including operating system profiles, hardware and capability profiles, application profiles, plan and manage services including scaling out, updating, and servicing services; configure Virtual Machine Manager libraries. This solution should enable EchoSoftto deploy servers in a timely and cost-effective manner.

Windows Server Design - Vienna has two Domain Controllers. All other locations have single Domain Controllers. Vienna's domain controllers are running Windows Server 2012, but the other sites are running Windows Server 2008 Domain Controllers. All other services on the network are running on either older UNIX or Windows Server 2008 and 2003 servers. These legacy servers should be replaced as part of this project. Describe your recommendations for the server environment, focusing on any needed upgrades and the number of servers needed at each location to handle key network infrastructure services and roles (DNS, DHCP, File, Print, RRAS, etc.) You can make any recommendation for the server environment but explain how it will benefit your design.

Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution. This objective may include but is not limited to the following: Design considerations including a highly available DHCP solution including split scope, DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCP filtering. Describe how you will provide fault tolerance in the event that a primary DHCP server should fail. How will you handle remote users, network devices and printers?

DNS - Design a name resolution strategy. This objective may include but is not limited to: Design considerations, including Active Directory-integrated zones, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation.

Implement a scalable Remote Access solution. This objective may include but is not limited to: Configure site-to-site VPN; configure packet filters; implement packet tracing; implement multisite Remote Access and a DirectAccess solution.

Design an Active Directory topology. This objective may include but is not limited to: Design considerations including read-only domain controllers (RODCs), proximity of domain controllers, replication optimization, and site link; Group Policy, monitor and resolve Active Directory replication conflicts.

Your proposal must incorporate the following items

1. All Domain Controllers must be Windows 2012 2R2 Active Directory.
2. All sites must have Active Directory services available even if a single Domain Controller fails.
3. Client IP address assignment must be automated and manageable for all sites and locations.
4. DNS must be manageable and secure. Clients must be able to resolve DNS even if a single DNS server fails or during aninternet connection outage.
5. DHCP should be designed with fault tolerance in mind.
6. Provide secure remote access solution that utilizes Network Access Policy controls.
7. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.
8. Provide easy and manageable server image and software deployments. All servers should be Windows Server 2012 R2.
9. EduTech and EchoSoftActive Directory forests must be able to trust each other.
10. The Austin location needs be integrated into the EchoSoftActive Directory. This solution must cost-effective, manageable and secure.

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

• At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.

• The submission must cover all of the major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the topics required, as well as a summary.

• At least two non-Lab, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with"Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it.

Reference no: EM131099689

Questions Cloud

Find the z score corresponding to a woman : Women's heights have a mean of 63.6 in. and a standard deviation of 2.5 inches.  Find the z score corresponding to a woman with a height of 70 inches and determine whether the height is unusual.
Determine the output impedance of the emitter follower : Sketch |Zout| as a function of frequency. Assume VA = ∞.
Probability that out of the next : A particular department store knows from past experience that 35% of their customers have the store's credit card. What is the probability that out of the next 13 customers that exactly 6 have the store's credit card? (please express your answer u..
Comparison of the costs of debt and preferred stock : The treasurer of Riley Coal Co. is asked to compute the cost of fixed income securities for her corporation. Even before making the calculations, she assumes the aftertax cost of debt is at least 1 percent less than that for preferred stock.
Provide secure remote access solution that utilizes network : Provide secure remote access solution that utilizes Network Access Policy controls. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.
Develop and share your own personal theory of leadership : Briefly summarize the theories you analyzed in Part I, focusing on an overview of the key aspects from that analysis that will inform the discussion of your personal leadership style and its application.
Question regarding the child percentile rank : A fifth grader takes a standardized achievement test (mean = 125, standard deviation = 15) and scores a 148. What is the child's percentile rank?
Accumulated in his retirement account : b. In addition to this, 10 years ago Nick received an inheritance check for $30,000 from his beloved uncle. He decided to deposit the entire amount into his retirement fund. What is his current balance in the fiord?
Have the parties committed violation of any anti-trust laws : Have the parties committed a violation of any anti-trust laws? What laws may apply in this situation, and is the fact that BWC agreed to consider the plan significant? In answering this question, make sure that you fully explain your answers.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is a proxy firewall and how is it different

COIS23001 - Network Security - What is a proxy firewall and how is it different from a network (or transparent) firewall and what does NAT stand for, and how does the mechanism work? Describe what, if any, security NAT provides (or fails to provide).

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Draw the protocol layers of the gateway

1. An IP network is connected to a Novell IPX via a gateway as shown below. Draw the protocol layers of the gateway.

  Concentrate on the digital signatures and certificate chain

You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..

  Design a modern network for a private high school

Design a Modern Network for a Private High School. The network is proposed to achieve the above objectives considering the school's following business and technical goals.

  Case study - asymmetric and symmetric encryption

Case Study - Asymmetric and Symmetric Encryption, ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics

  How to protect a computer and business against their threat

Security goes hand-in-hand with developing effective Excel applications. As an Excel user, it is necessary to learn more about macro viruses and how to protect a computer and business against their threat

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  The six principles of nclb

The six principles of NCLB

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Explain a technique used by hackers to cover their tracks

describe a technique used by hackers to cover their tracks after a network attack. this may take a little bit of

  Describe ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd