SlideShare a Scribd company logo
1 of 31
2799 Capstone Project
Chanthee Vong, Matt Barrett & Mike Valente
Page1
TABLE OF CONTENTS
PROJECT CHARTER…………………………………………………………..……3-4
 Project Description…………………………………………………………………….3
 Team Code of Conduct………………………………………………………………...3
 Project Team…………………………………………………………………………...4
PROJECT COMPONENTS…………………………………………………………..5-9
 Project Objectives……………………………………………………………………....5
 Deliverables…………………………………………………………………………….5
 Requirements…………………………………………………………………………...5
 Scope…………………………………………………………………………………....6
 Stakeholders…………………………………………………………………………….7
 Acceptance Criteria……………………………………………………………………..8
 Project Assumptions…………………………………………………………………….8
 Project Risks…………………………………………………………………………….8
 Project Constraints………………………………………………………………………8
 Project Dependency……………………………………………………………………..8
 Project Approach………………………………………………………………………..9
PROJECT ORGANIZATION……………………………………………………….9-11
Page2
 Communication Plan………………………………………………………………….9
 Project Approvals……………………………………………………………………..9
 Change Management Plan…………………………………………………………….9
I. Change Management Approach………………………………………………10
II. Project Member Standing……………………………………………………..10
III. Change Control Process………………………………………………………10
PROJECT SCHEDULE………………………………………………………….11-13
 Project Overview……………………………………………………………………...11
 Bill of Materials……………………………………………………………………….11
 Gantt Chart………………………………………………………………………….....12
NETWORK DESIGN……………………………………………………………..14-17
 Network Diagram……………………………………………………………………...14
 Floor Plans……………………………………………………………………………..15
 IP Scheme……………………………………………………………...………………17
SERVER CONFIGURATION……………………………………………………18-22
 Dynamic Host Configuration Protocol (DHCP)/Firewall/Virtual Private Network
Controller………………………………………………………………………………18
 Edge/Hub Server……………………………………………………………………….18
 Demilitarized Zone (DMZ) server……………………………………………………..19
 Microsoft Exchange Server…………………………………………………………….19
 Active Directory………………………………………………………………………..19
 Domain Name System Server………………………………………………………….20
 Windows Deployment Services (WDS) server…………………………………...……20
 Active Directory Schema………………………………………………………………21
 Basic Group Policies…………………………………………………………………...22
CLIENT CONFIGURATION……………………………………………………23-24
 Windows 10…………………………………………………………………………….23
 Windows Server 2012…………………………………………………………………..23
Page3
 Microsoft Office 365 Business…………………………………………………………23
 VMWare Virtual Machine……………………………………………………………...24
CONTINGENCIES…………………………………………………………………24-28
 Disaster Recovery Plan…………………………………………………………………24
 Risk Management Plan…………………………………………………………………26
I. Purpose…………………………………………………………….……………26
II. Scope……………………………………………………………………………26
III. Risk Plan Objectives……………………………………………………………26
IV. Deliverables………………………………………………………………….….27
V. Disaster Recovery Plan……………………………………………………....…29
WBS DICTIONARY…………………………………………………………….…29-30
CONCLUSION…………………………………………………………………………30
PROJECT CHARTER
This project is a business network infrastructure and two software development labs. This
network encompasses a Local Area Network &Wireless Area Network for the new Orange
Creek facility. Implementation of this network is to enable employees’ access to the corporate
and lab computers. Implementation of Email is also required for communication between
employees and management in a controlled environment to be accessible from inside or outside
the Lexington facility.
Team Code of Conduct
In order to ensure a cohesive and efficient team, each member will need to agree to and comply
with the following code of conduct:
 Each team member will provide a minimum of one phone number and email address so
the team can remain in contact whenever needed.
 Each team member will make themselves reasonably available and reply to phone calls
and emails in a timely manner.
Page4
 Team members will complete all assigned tasks in the time frame allotted for them. If
assistance is needed from another team member or the task is the unachievable for any
reason, the team member responsible must inform the team leader as soon as possible.
 All members of the project team are expected to be prompt and present at the jobsite on
required work days. If this is not going to be possible, the absent team member must
inform the supervisor as soon as possible.
 All team members will be required to conduct themselves in a professional manner at all
times.
Project Team
Project Manager & Budget Analysis Director: Matt Barrett
Client-Server Specialist & Server Developer: Chanthee Vong
Web Developer& Network Developer: Mike Valente
Page5
PROJECT COMPONENTS
Project Objectives
I. Design and implement district network with unique logons for employees, managers,
administrators, and a guest login.
II. Enable individual email inboxes for all employees, managers and administrators.
III. Design and deploy a web page for use in accessing email from an external or internal
network device.
IV. Install two wired lab rooms for use in Software development.
V. Implement Wireless Area Network.
VI. Ensure all systems are secure and able to communicate.
VII. Train bank personnel in use of the new network systems.
VIII. Turn over control of network to Orange Creek, Inc.
Deliverables
a) Wireless Network Access
b) Email for all employees, managers & administrators
c) Two software development labs.
d) Network printing capabilities building-wide.
e) External website & internal intranet.
Requirements
The project will comply with all Federal and State requirements including:
 TIA/EIA-568B: Commercial Building Telecommunications Wiring Standard.
 TSB-36: Technical Systems Bulletin: Additional Cable Specifications for Unshielded
Twisted-Pair Cables.
Page6
 TSB-40: Technical Systems Bulletin: Additional Transmission Specifications for
Unshielded Twisted-Pair Connecting Hardware.
 TIA/EIA-569: Commercial Building Standard for Telecommunication Pathways and
Spaces.
 EIA-570: Residential and Light Commercial Telecommunications Wiring Standard.
 EIA-606: The Administration Standard for the Telecommunications Infrastructure of
Commercial Buildings.
Scope
In Scope Out of Scope
Cabling Install Network Maintenance
Wireless Access Points Signal Integrity Actual ISP Cost
Firewall Install & Configuration Hardware Maintenance
Patch Panel Install Software Updating
Patch Cable Creation Issues Caused by Improper Use of Software
Active Directory Install & Configuration Actual Power Usage Cost
Cabling Signal Integrity Testing Hardware Failures
Group Policy Objects Developments &
Implementation
Issues Caused by Improper Use of Network
Server Hardware Install
Backup Systems Install
Email Services Install & Configuration
Router and Switch Install & Configuration
Web Site Configuration & Deployment
Wireless Access Points Install &
Configuration
Page7
Server Configuration
Physical Security for Network Devices
Installation Network Security Configuration
Network Security Testing
Software Licensing Acquisition
Network Administrator Training
Employee Network Use Training
Acceptable Use Policy Development &
Training for Employees
Stakeholders
Stakeholder Participation
Orange Creek, Inc. As the project requesters, they will take
ownership of the network & labs once the
project is completed; including maintenance
and oversite.
Hawks Networking Developers and designers of the project. Will
complete hardware and software
implementation as requested. Once
completed, ownership of the network will be
given to Orange Creel, Inc.
Employees These will be the primary users of the
network and sole users of the labs. The
network and workstations will be designed to
optimize their ability to develop new baking
software.
Customers Ultimately these will be the end users of the
software developed in Lexington. This group
will consist, not only of the banking
customers, but also branch employees.
Page8
Acceptance Criteria
The Stakeholders will accept this proposal if it meets all requirements. Upon acceptance,
an initial payment or retainer will be made to Hawks Networking to begin working on the
project.
Project Assumptions
 The project will take place in Lexington, KY
 There will be two computer labs in the new structure, both on different floors.
 The labs will utilized for software development.
 VPN Tunneling will be contracted through the local ISP.
 All ISP Traffic will be on Fiber Optic Lines.
 The project will have an established budget and timeline.
Project Risks
 There are safety concerns with the installation & cabling portions of the project. All
installers will be provided with, and expected to use, Personal Protective Equipment and
comply with OSHA regulations.
 Data integrity and security shall be a priority in accordance with FDIC regulations.
Project Constraints
Data Security and Internet access must comply with FDIC.
All wiring will comply with NEC.
Project Dependencies
As this will be a backbone project that can be built upon after completion, there will be
no dependencies.
Page9
Project Approach
A modular approach will be best for this project. Each lab will be worked on and
completed separately. Quality checks will be conducted at each intermediate stage before
moving on to the next step. This will help to ensure the integrity and quality of the network.
Constructing this network in a modular fashion allows us to maximize our effort on each site. If
the problems occur on at a lab, they will be solved before undertaking more work or moving on
the next lab.
PROJECT ORGANIZATION
Communication Plan
All communication between the stakeholders and the project team will be done via the
Project Manager. Communications between stakeholders and any other project team member
should be kept at a minimum. All communication between stakeholders and the Project Manager
should be conducted, whenever possible, via email to maintain a written record of the
conversation.
Project Approvals
All approvals for this project must be agreed upon by both Orange Creek, Inc. and the
Project Manager of Hawks Networking.
Change Management Plan
This is the official change management plan for Hawks Networking, for the Orange
Creek Project. This is a formal plan of action to execute changes within the agreed parameters.
This plan will cover the purpose of any changes, how a change will be managed, and the change
management process. All project team members and the project manager will be required to
adhere to the plan if they wish to make a change to the project, and all change requests during the
project will be submitted to the project manager.
Page10
Change Management Approach
It is the purview of the project manager to review all requests for change submitted, and
to ensure that they have been formatted properly, and that all parties concerned in the project are
in agreement as to the changes requested. This is to ensure optimum efficiency and fairness for
all proposed project changes. There will be a threefold approach a change request:
 Verify that the proposed change adheres to the guidelines of the scope, and that the
changes will be beneficial to the project.
 Draw up a plan to incorporate the change into the schedule and execute it.
 Manage and document the changes as it is being incorporated.
Ultimate responsibility for any implemented changes will reside with the Project Manager.
Any team member wishing to make a change to their assigned area must first receive the Project
Manager’s approval. Any proposed changes outside one team member’s assignment must receive
the approval of both the Project Manager and the team member responsible for the
aforementioned assignment.
Project Member Standing
Each team member is responsible for his/her individual role/assignments within the
project. They will also be responsible to make certain that any changes to their assignments are
approved by the Project Manager. Other team members are also responsible for contacting the
specific employee if they want to make changes to a specific assignment not associated with
them, as well as getting approval from the project manager.
Change Control Process
The following will lay out the order and process of how each change to the project will
be handled and implemented to ensure and maintain optimum efficiency when incorporating the
required changes for specific assignments within the project. The Project Manager oversee each
change and ensure it is implemented as requested per the Change Control process of the Change
Management Plan. The change control process is stated as follows:
Page11
1) Properly identify the need for the change, and ensure that the proposal is beneficial to all
parties involved with the project
2) Meticulously log every change request and implementation to the project. The Project
Manager will be responsible for all change proposals submitted for the duration of the
project.
3) The Project Manager will make sure that the approved change is properly implemented
within the project, and that everyone involved properly implements the change.
4) All parties involved will implement the change, and report all progress to the Project
Manager for evaluation and quality control.
5) Once the change has been implemented, the previous version will be logged for security
and backup purposes.
PROJECT SCHEDULE
Project Overview
Phase Date of Completion Deliverable
Design Dec 10th 2015 Project Charter
Build Mar 4th 2016 Hardware installed on site
Software Configuration Mar 10th 2016 All software configured
Completion Mar 17th 2016 Personnel trained & network
handover
Bill of Materials
Item Cost per
Unit
Qty Total
Cost
HP Proliant BL460c Gen9 Server Blade $3,271.49 12 $39,257.88
Cisco RV220W Wireless Network Security Firewall Router $655.10 4 $2,620.40
Sangoma Vega 5000 20 FXS +2 FXO Gateway $2,627.30 1 $2,627.30
NETGEAR 16 Port Gigabit Business Class Desktop Switch $98.99 4 $395.96
Cisco SPA512g VoIP Phone $144.99 200 $28,998.00
Dell Precision T1700 Mini Tower (Intel Core i7-4790)* $1,705.04* 200 $341,008.00
Page12
Dell B237DNF Mono Printer $269.99 8 $2,159.92
50 Pair CAT3 Cable PVC (1 Ft) $2.34 20 $46.80
Belden/CDT Bulk Cable CAT5e (1000 Ft) $197.95 1 $197.95
Microsoft Windows Professional $199.00 200 $39,800.00
Microsoft Windows Server 2012 R2 Standard (64 Bit License + 5 CALs) $544.96 2 $1,089.92
Kaspersky End Point Security for Business License (25 Nodes/3 Years) $1,729.95 8 $13,839.60
Carbonite Server Pro Bundle (3 Year Subscription) $2,159.99 1 $2,159.99
Tripp Lite Smart Rack Standard $1,124.00 2 $2,248.00
Trilogy T2 DL2700 Multi User Commercial Lock $501.00 2 $1,002.00
Technician Labor Wages $60,000.00 3 $180,000.00
*Cost of item incudes 200 each of: Dell Quietkey USB Keyboard, Dell Optical Scroll USB Mouse & Dell P2414H
24” Monitor
Total: $657,451.72
Gantt Chart
Task Name Duration Start Finish
Orange Creek Network 0 days Wed
2/18/15
Wed
2/18/15
Initialization 2 days Mon
12/7/15
Tue
12/8/15
Identify Stakeholders
Quiz Stakeholders 2 days Tue
12/8/15
Wed
12/9/15
Adjust Design 2 days Wed
12/9/15
Thu
12/10/15
Installation 60 days Mon
12/14/15
Fri 3/4/16
Page13
Hardware 1 day Mon
12/14/15
Mon
12/14/15
Servers
Work Stations
Cables
Security
Configure Network
Settings on Switches &
Routers
Switches & Routers
Install Windows &
Update Drivers &
Patches
Software 6 days Mon
12/14/15
Mon
12/21/15
Install Active
Directory
Install & Configure
Authentication Methods
(LDAP)
Active Directory
Configuration
Email Server
Configuration
Create Domains
Page14
Join Computer &
Devices to Domains
Add Client
Configuration
Add Users
Configure IP
Addresses
Configure VoIP
Telephones
Test Infrastructure &
Login User
7 days Mon
2/8/16
Tue
2/16/16
Improvements &
Calibrations
14 days Mon
2/22/16
Thu
3/10/16
Quiz Stakeholders
Make Adjustments
Compile
Documentation &
Deliver Product
Thu
3/17/16
Page15
NETWORK DESIGN
Network Diagram
Page16
Floor Plans
Floor #1
Page17
Floor #2
IP Scheme
Server Farm IP Addressing 172.16.99.0-172.16.99.254
1st Floor Workstations & Peripherals 172.16.88.0-172.16.88.254
2nd Floor Workstations & Peripherals 172.16.77.0-172.16.77.254
1st Floor VoIP Addresses 172.16.66.0-172.16.66.254
2nd Floor VoIP Addresses 172.16.55.0-172.16.55.254
Page18
SERVER CONFIGURATION
Dynamic Host Configuration Protocol (DHCP)/Firewall/Virtual
Private Network Controller
Dynamic Host Configuration Protocol is a service provided by Windows Server that
allows client computers to obtain a random IP address from the server, based on a preconfigured
subnet map. This server is important in order for a client to communicate between the server and
other clients on the network, as well as gaining access to the internet.
A firewall is a hardware or software program used to monitor the traffic incoming
between connections in the network. This is used to filter out spam, and potentially malicious
software, packets, or intruders. Firewalls can also be used to block certain ports on the network,
so that employees cannot access certain websites that could be deemed inappropriate for the
workplace.
Virtual private networks allow users on a private network to communicate to other
private networks over a public network like the Internet. Virtual private networks can be used to
communicate information between separate sites and to the main server through a secure
channel. Virtual private networks can also allow remote logins to the network from outside of the
building, in case an employee is in the field. VPN networks will be monitored on the DHCP
server, and controlled through the use of hardware VPN controllers.
Edge/Hub Server
The Edge server is designed to stand between the local network and the internet. Edge is
used by Microsoft Exchange and has an added measure of security between two separate
networks, such as the local network and the internet. Edge servers are useful for handling and
monitoring both mail and traffic incoming and outgoing between the local network and the
internet. This can prevent spam and provide protection against viruses through the mail service.
Page19
The Hub server is similar to the Edge server, except it resides within the internal
network, and sends mail to the Edge server to be processed and sent to the internet. When the
Edge server receives mail, it transmits it to the Hub server, to be processed, and then released to
the internal network. Both the Hub and Edge servers are required for proper security of the mail
server.
Demilitarized Zone (DMZ) server
A DMZ server, AKA a honey pot, is used as a decoy to deter hackers from locating and
harming the main servers on the network. These servers are essentially used as sacrifices to fool
hackers into thinking they have access to the network, while everything the hacker is does is
tracked and logged. DMZ servers can also be used for additional outgoing traffic control
between the local network and the internet. DMZ servers are important for an effective security
network, while also being cost-efficient.
Microsoft Exchange Server
With Microsoft Exchange, you can create and manage your own email server and
domain. In addition to the client access licenses, every employee will have access to their own
unique email that they can use to communicate amongst coworkers. Each email will have 1GB of
storage, so you can easily store many past messages for future use.
Active Directory
Active Directory is used to manage all users registered on the network. It is a tool used by
Windows Server to authenticate and authorize users, and assign them to specific groups within
the network, such as administrator and basic user. You can assign specific permissions to each
group, which can give authorization to users within the group to access specific information or
make changes to the network. All user authentication and authorization within the network will
be controlled by the Active Directory server.
Page20
Domain Name System Server
A Domain Name System is a hierarchical database used to track all domains within the
World Wide Web, and converts them to usable IP’s in order to communicate with other domains
on the World Wide Web. The DNS Server is essentially the ticket to gain access to the internet
through a domain, and the DNS Server will keep track of and maintain the domain of the bank’s
network. Both the Active Directory and the DNS will run on the same server.
Windows Deployment Services (WDS) server
Windows Deployment Services server is essential to maintain maximum efficiency in the
network. It is used to remotely install and update operating systems on desktops that are
connected to the network. This streamlines the maintenance process by keeping every lab
computer in each school site updated with the latest version of Windows 8.1, and any other
software that needs updating on the
computer, without having to individually
update each computer.
*NOTE*
All servers (excluding the DMZ
servers) will have their own backups
for quality assurance, so if something
goes wrong, we can keep the network
running until we figure out the
problem.
Page21
Active Directory Schema
I. Active Directory Root
A. Group Policy
1. Email
2. User Intranet
3. Management Intranet
4. Printers
5. Other Permissions
6. Client Configuration
B. Users
1. Employees
a. 1st Floor Lab
b. 2nd Floor Lab
2. Managers
a. 1st Floor Supervisor
b. 2nd Floor Supervisor
3. Guest
a. A single, shared account with a preset time limit and weekly
password changes
4. Other Employees
C. Secure Authentication OU
1. Employees
2. Management
3. Guest
4. Admin
D. Computers
1. 1st Floor Lab (1-90)
2. 2nd Floor Lab (91-180)
E. Domain Controllers
Page22
Basic Group Policies
I. Users
A. Main Policies
1. Cannot install ActiveX components
2. Cannot add or remove programs
3. Autoplay disabled
4. Assigned default domain to log in
5. Active Directory folder is hidden from desktop
6. Enable Disk Quota
7. Enforce Disk Quota
8. Disallow user override of locale settings
9. Configure folder options preference extension policy processing
10. Turn off Windows Updates
11. Configure local Users and Groups preference extension policy processing
12. Configure Network Shares preference extension policy processing
13. Configure Power Options preference extension policy processing
14. Configure shortcuts preference extension policy processing
15. Configure Start Menu preference extension policy processing
16. Restrict potentially unsafe HTML help functions to specified folders
17. Prevent Redirection of USB device
18. Slow link threshold for employees looking at unsolicited media 500 kb
II. Managers
A. Main Policy
1. Allow non-administrators to install drivers
Page23
CLIENT CONFIGURATION
Windows 10
The latest version of Microsoft’s PC operating system, Windows 10 improves upon
Windows 7 & 8 with better start-up time and faster processing. Windows 10 Enterprise comes
with built in file encrypting, for better security of important files. Windows 10 has kept most of
the innovations for 8 but redesigns it for the PC as opposed to touchscreen devices.
Windows Server 2012
The latest version of Windows Server allows you to take control of your network with the
newest in innovative technology. Windows Server 2012 has enhanced support for open
framework tools, so you can build, deploy, and scale applications with more flexibility.
Windows Server 2012 has improved performance and can scale capacity more efficiently, so you
can run your largest workloads, with powerful recovery tools to protect against sudden system
failures and outages. With Windows Server 2012, you have full control over your network with
the use of DNS, DHCP, Hub/Edge, Active Directory, and Exchange mail servers, with built-in
state of the art firewalls and malware/virus protection. With seven thousand Client Access
Licenses, you can be ensured that every employee will have their own unique license that can be
used to access each server’s features, such as email services, Wi-Fi access, virtual machines, and
more.
Microsoft Office 365 Business
Office 365 Business allows you the opportunity to get the latest versions of all Microsoft
Office programs for a monthly fee. Microsoft Office 365 provides you with Word, Excel,
PowerPoint, Outlook, OneNote, Publisher, Skype, and Access. Microsoft Office 365 comes with
extensive IT tools used for security, user management, and user credentials. Each employee will
Page24
have a Microsoft Office 365 user license, so they can install Microsoft Office on up to five
devices.
VMWare Virtual Machine
VMWare is a powerful and indispensable tool for software developers, used to simulate a
desktop environment in order to test, or learn about certain programs in a virtual environment.
VMWare provides the opportunity to add, alter or delete programs without risk of causing
system failure.
CONTINGENCIES
Disaster Recovery Plan
Having a recovery plan is one of the most important things to have on a daily basis. In
Information technology, disaster recovery plan may include restoring servers or mainframes with
backups, re-establishing private branch exchanges or provisioning local area networks immediate
business needs.
In this project, we have identified and prepare all the steps that are required to respond to
each type of disaster. The recovery steps are tested to make sure that when something wrong
happens you will be able to recover all the data that will be at risk. Any threat to the server; be it
either a technical disaster, such as circuit trips, and natural disaster, such as fire or flood, it would
risk all the files and data stored in the server.
Since these are servers for two separate floors it was decided to add a recovery plan for
both of them. The purpose of the disaster recovery plan is to enable us to recover a damaged
databases that are important. A well-designed and tested backup and restore plan is made so that
if a disaster occurs you will be able to maximize the data availability and minimize the data loss.
There are three types of Recovery model; Simple, Full, Bulk logged. Simple is riskier
than the other two models. When under the Simple recovery model you cannot restore the point
of failure data that is lost and can only recover the most recent backup made. While Full and
bulk logged recovery models allows recovery from the point of failure. Below is a chart for the
three different type of recovery models:
Page25
Recovery Model Description Work Loss
Exposure
Recovery to Point in
Time
Simple No log backups.
Automatically reclaims
log space to keep space
requirements small,
essentially eliminating
the need to manage the
transaction log space
Changes since the
most recent backup
are unprotected. In
the event of a
disaster, those
changes must be
redone
Can recover only to
the end of a backup.
Full Requires log backups.
No work is lost due to a
lost or damaged data file.
Can recover to an
arbitrary point in time.
Normally none.
If the tail of the log is
damaged, changes
since the most recent
log backup must be
redone.
Can recover to a
specific point in time,
assuming that your
backups are complete
up to that point in
time
Bulk Logged Requires log backups.
An adjunct of the full
recovery model that
permits high performance
bulk copy operations.
Reduces log space usage
by using minimal logging
for most bulk operations
If the log in damaged
or bulk-logged
operations occurred
since the most recent
log backup, changes
since that last backup
must be redone.
Otherwise, no work is
lost.
Can recover to the
end of any backup.
Point-in-time recover
is not supported.
For this project it was decided to go for Full recovery model. Important data and files are
going to be stored in the servers and because of that we need to make sure that all of that data
and files are safe.
When any type of disaster occurs and shuts the servers down, the first goal is to restore
the whole database from the point of failure. In the duration of the restoration the whole server
will be offline. Before any of the database can come online, all data will be restored to any point
before the servers goes down.
Page26
Risk Management Plan
Purpose
The purpose of a Risk Management Plan is to list potential risks and threats to the project
as well as the network, and infrastructure. The main risk to the network is from attacks by
malicious software and hackers who want to steal data or harm the company. The next likeliest
risk to the network is data loss from a lack of retention from hardware leakage or failure. This
document will outline the risks and methods to reduce the damage.
Scope
I. Viruses
II. Infected Software
III. Bringing viruses from home via USB thumb drives that can infect the entire network
IV. Antivirus software not installed.
V. Malware
VI. Firewall not installed
VII. Security Breaches
VIII. Security Failures
IX. Loss of confidentiality
X. Loss of integrity
XI. Loss of availability
XII. Natural Disaster
XIII. Any loss of data
XIV. Any loss of service
XV. An external attacker attempting to access data
XVI. An attacker defacing a website
Risk Plan Objectives
This project will meet the following objectives:
 Creating a security policy.
 Insurance.
 Use automation.
 Use antivirus software
 Protect the boundary
 Include input validation
Page27
Deliverables #1
 Users visiting risky website, downloading and executing infected software. They may
unknowingly bring viruses from home via USB thumb drives or other external memory
device. When the USB is plugged in the work computer becomes infected. This, in turn,
can infect other computers on the network.
 If antivirus software is not installed, the workstation is vulnerable. If a system is infected,
the malware can cause significant harm. Some malware infects a single system while
others release worms that can spread across the network
 The LAN (Local Area Network) Domain is the area that resides within the firewall. It can
consist of a few systems connected together in a small home office network or a large
network of a thousand or more machines. Each individual device on the network must be
protected or all devices are vulnerable. The LAN to WAN (Wide Area Network) Domain
connects the local network to the wide network. The LAN Domain is considered a trusted
zone since it is controlled by the owner. The WAN Domain is considered an untrusted
zone because it is not controlled and accessible to attackers.
 Remote access is granted to field workers so they may utilize the network resources.
Access can be granted via a VPN (Virtual Private Network) connection. The
vulnerabilities exist at two stages of the VPN connection. The first stage is
authentication. Authentication is when the user provides credentials to prove identity. If
these credentials can be discovered, the attacker can later use them to impersonate a
genuine user. The second stage is when data is passed between the user and the server. If
the data is sent in clear text, an attacker can capture and read the data.
 Natural disaster occurs such as a hurricane, flood, fire, tornado, or earthquake. These are
very unpredictable events and cannot be avoided.
 Downtime for the network. There will be times the network will fail such as power
outages or internet provider service is down. This will cause many problems for people in
Orange Creek. It will help to have a plan if and when this problem occurs.
Page28
Deliverables #2
 Any user downloading a virus onto a work computer will have an enormous impact. The
cost of such an act can range from the price of a single computer, if the virus is contained,
to considerable if the malware spreads into the network.
 Antivirus protection can be expensive but the price is negligible compared to the damage
that can be done without it. The more a company spends on antivirus the less it will have
to spend on repairing the network.
 The impact of a workstation lacking a firewall is very high. This would impact Orange
Creek significantly. A firewall protects a network by controlling incoming and outgoing
traffic based on established rules.
 The impact from remote access is considered medium. Generally remote access is
granted to IT professionals who are trusted to abide by password and encryption
protocols.
 The impact of a natural disaster can be considered high. Damage to the physical
components of the network would not only mean Orange Creek would need to replace
them but also cost them in downtime until the network is up and running again.
Risk Area Level (H/M/L) Risk Plan
Faulty Equipment M Troubleshoot or Replace
Hacking H Security Countermeasures
Exceeding Budget L Reduce Overhead
Misinformation Feed L Run fact check to ensure reliable coverage
DisasterRecovery Plan
1) Types of Teams:
 Operations Team
 Information Technology Team
Page29
 Facilities Team
2) In the Event of a Disaster:
 All employees will follow SOP (Standard Operations Procedure) for the
specific disaster.
 The first step should always be to account for all employees. For a natural
disaster follow SOP, for an immanent network attack sever all outside
connections and if needed shut down all servers.
3) Recovery Scenarios:
 Minor Damage Scenarios
 Normal hardware failure. Replace hardware and start recovery from last good
backup.
 Major Damage, data loss due to malware or hacker, natural disaster. This will
require the following specific SOP for the major disaster.
4) Recovery Activities:
 Operations Team Tasks: Manage, organize, and evaluate disaster recovery.
 Information Technology Team: Repair, replace, and recover from backups
 Facilities Team Tasks: Evaluate and repair structural damage
WBS DICTIONARY
1. Orange Creek Network
1.1 Initialization.
1.1.1 Identify Stakeholders. Compilation of a list of all stakeholders in the new
network.
1.1.2 Quiz Stakeholders. Once all stakeholders have been identified, they will be
asked a series of questions regarding their needs and expectations for the new
network.
1.1.3 Adjust Design. Results of the stakeholder quizzes will be reviewed and any
major discrepancies in the network’s design will be addressed.
1.2 Installation
1.2.1 Hardware. All physical needs of the network are put into place. Servers,
routers & switches, and workstations including computers, monitors, phones
Page30
and (where applicable) printers are placed according to the blueprints. The
cabling will then be measured, cut and installed. Finally, mundane security
measure (ex. server room door locks) need to be installed.
1.2.2 Software. Once the physical components are in place, the software can be
installed onto them. Software and drivers need to be installed, domains and
directories created. Then the work of creating user accounts, assigning roles
and configuring IP addresses. Finally, the Voice over IP phones configured.
1.2.3 Test Infrastructure. Once the network is fully functional, it to run a full
gamut of stress tests to ensure it will meet the requested specifications.
1.3 Improvements & Calibrations
1.3.1 Quiz Stakeholders. As the network’s users become familiar with the new
systems, careful notes of any comments, questions or concerns should be
taken for last-minute adjustments.
1.3.2 Make Adjustments. After a reasonable breaking in period, the necessary
adjustments should be made to accommodate any persistent complaints or
requests.
CONCLUSION
This document spells out what we at Hawks Networking believe to be the most advanced
and efficient lab designs for the given parameters. We pride ourselves on high quality service
and will apply the same attention to detail with building the labs as we have put into this
presentation.
Our team is always available to answer any questions or concerns whenever they arise.
Please feel free to contact us and we look forward to working closely with you in the future.

More Related Content

What's hot

PREETHI_4.5yrs Exp
PREETHI_4.5yrs ExpPREETHI_4.5yrs Exp
PREETHI_4.5yrs Exppreethi j
 
Joseph Kuttemperoor Jan2011 New
Joseph  Kuttemperoor Jan2011 NewJoseph  Kuttemperoor Jan2011 New
Joseph Kuttemperoor Jan2011 Newjtkuttem
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryGene Gotimer
 

What's hot (7)

PREETHI_4.5yrs Exp
PREETHI_4.5yrs ExpPREETHI_4.5yrs Exp
PREETHI_4.5yrs Exp
 
Lakshmi Narasimha Prasanna G - 2016--
Lakshmi Narasimha Prasanna G - 2016--Lakshmi Narasimha Prasanna G - 2016--
Lakshmi Narasimha Prasanna G - 2016--
 
Joseph Kuttemperoor Jan2011 New
Joseph  Kuttemperoor Jan2011 NewJoseph  Kuttemperoor Jan2011 New
Joseph Kuttemperoor Jan2011 New
 
Final package
Final packageFinal package
Final package
 
Mohan r resume
Mohan r resumeMohan r resume
Mohan r resume
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
QA_Tester
QA_TesterQA_Tester
QA_Tester
 

Viewers also liked

Cuppla overview 2016
Cuppla overview 2016Cuppla overview 2016
Cuppla overview 2016Cupplatech
 
The grand bay in bay crest at pelican landing naples florida
The grand bay  in bay crest at pelican landing naples floridaThe grand bay  in bay crest at pelican landing naples florida
The grand bay in bay crest at pelican landing naples floridaPelican Landing
 
AMC/MLF UPDATE AND RECENT BREAKTHROUGHS
AMC/MLF UPDATE AND RECENT BREAKTHROUGHSAMC/MLF UPDATE AND RECENT BREAKTHROUGHS
AMC/MLF UPDATE AND RECENT BREAKTHROUGHSDGFPublicAwareness
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORAlay Thakkar
 
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar Slides
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar SlidesPan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar Slides
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar SlidesCanadian Organization for Rare Disorders
 
Pharma funding of patient groups: the building blocks of ethical and appropri...
Pharma funding of patient groups: the building blocks of ethical and appropri...Pharma funding of patient groups: the building blocks of ethical and appropri...
Pharma funding of patient groups: the building blocks of ethical and appropri...Canadian Cancer Survivor Network
 
Ciências do Ambiente - Cap 1.1 - Conceitos básicos
Ciências do Ambiente - Cap 1.1 - Conceitos básicosCiências do Ambiente - Cap 1.1 - Conceitos básicos
Ciências do Ambiente - Cap 1.1 - Conceitos básicoselonvila
 

Viewers also liked (17)

Cbv
CbvCbv
Cbv
 
Cuppla overview 2016
Cuppla overview 2016Cuppla overview 2016
Cuppla overview 2016
 
The grand bay in bay crest at pelican landing naples florida
The grand bay  in bay crest at pelican landing naples floridaThe grand bay  in bay crest at pelican landing naples florida
The grand bay in bay crest at pelican landing naples florida
 
Culto
CultoCulto
Culto
 
Caixa la pervivència del mar
Caixa la pervivència del marCaixa la pervivència del mar
Caixa la pervivència del mar
 
AMC/MLF UPDATE AND RECENT BREAKTHROUGHS
AMC/MLF UPDATE AND RECENT BREAKTHROUGHSAMC/MLF UPDATE AND RECENT BREAKTHROUGHS
AMC/MLF UPDATE AND RECENT BREAKTHROUGHS
 
Caixa de poesia i música
Caixa de poesia i músicaCaixa de poesia i música
Caixa de poesia i música
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERROR
 
Who Created Donald Trump?
Who Created Donald Trump?Who Created Donald Trump?
Who Created Donald Trump?
 
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar Slides
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar SlidesPan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar Slides
Pan-Canadian Pharmaceutical Alliance – a Primer June 22, 2016 Webinar Slides
 
Innovative Medicines Canada (IMC) Consultations –
Innovative Medicines Canada (IMC) Consultations –Innovative Medicines Canada (IMC) Consultations –
Innovative Medicines Canada (IMC) Consultations –
 
Pharma funding of patient groups: the building blocks of ethical and appropri...
Pharma funding of patient groups: the building blocks of ethical and appropri...Pharma funding of patient groups: the building blocks of ethical and appropri...
Pharma funding of patient groups: the building blocks of ethical and appropri...
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Colorectal & Anal Cancer
Colorectal & Anal CancerColorectal & Anal Cancer
Colorectal & Anal Cancer
 
Ciências do Ambiente - Cap 1.1 - Conceitos básicos
Ciências do Ambiente - Cap 1.1 - Conceitos básicosCiências do Ambiente - Cap 1.1 - Conceitos básicos
Ciências do Ambiente - Cap 1.1 - Conceitos básicos
 
E business ppt
E business pptE business ppt
E business ppt
 
Nanomedicine
NanomedicineNanomedicine
Nanomedicine
 

Similar to Capstone Network Infrastructure

CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxmonicafrancis71118
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to solTatianaMajor22
 
181472589 basis project report
181472589  basis project report181472589  basis project report
181472589 basis project reportIsmailSaruar
 
Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answersccna4discovery
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final ppAlfonso Zamorano
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 
Network Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping QuarterNetwork Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping Quarterrichlan421
 
Capstone Final Project
Capstone Final ProjectCapstone Final Project
Capstone Final Projectchris odle
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxtodd271
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design Muhd Mu'izuddin
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
Overall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxOverall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxhoney690131
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
Adeel Technical Project management
Adeel Technical Project managementAdeel Technical Project management
Adeel Technical Project managementEngineer Adeel Ahmad
 
Table of Contents1.0 Business Need22.0 Project Definitio.docx
Table of Contents1.0 Business Need22.0 Project Definitio.docxTable of Contents1.0 Business Need22.0 Project Definitio.docx
Table of Contents1.0 Business Need22.0 Project Definitio.docxmattinsonjanel
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 

Similar to Capstone Network Infrastructure (20)

CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
Project Scope Statement
Project Scope StatementProject Scope Statement
Project Scope Statement
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
181472589 basis project report
181472589  basis project report181472589  basis project report
181472589 basis project report
 
Ccna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 AnswersCcna 4 Chapter 9 V4.0 Answers
Ccna 4 Chapter 9 V4.0 Answers
 
NSA Capstone Project III final pp
NSA Capstone Project III final ppNSA Capstone Project III final pp
NSA Capstone Project III final pp
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 
Network Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping QuarterNetwork Developement Capstone Project 2009 Sping Quarter
Network Developement Capstone Project 2009 Sping Quarter
 
Capstone Final Project
Capstone Final ProjectCapstone Final Project
Capstone Final Project
 
Arpan_CV
Arpan_CVArpan_CV
Arpan_CV
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docx
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Overall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docxOverall Project ScenarioCorporation Techs provides remote and on.docx
Overall Project ScenarioCorporation Techs provides remote and on.docx
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
SenthilkumarR
SenthilkumarRSenthilkumarR
SenthilkumarR
 
Adeel Technical Project management
Adeel Technical Project managementAdeel Technical Project management
Adeel Technical Project management
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Table of Contents1.0 Business Need22.0 Project Definitio.docx
Table of Contents1.0 Business Need22.0 Project Definitio.docxTable of Contents1.0 Business Need22.0 Project Definitio.docx
Table of Contents1.0 Business Need22.0 Project Definitio.docx
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 

Capstone Network Infrastructure

  • 1. 2799 Capstone Project Chanthee Vong, Matt Barrett & Mike Valente
  • 2. Page1 TABLE OF CONTENTS PROJECT CHARTER…………………………………………………………..……3-4  Project Description…………………………………………………………………….3  Team Code of Conduct………………………………………………………………...3  Project Team…………………………………………………………………………...4 PROJECT COMPONENTS…………………………………………………………..5-9  Project Objectives……………………………………………………………………....5  Deliverables…………………………………………………………………………….5  Requirements…………………………………………………………………………...5  Scope…………………………………………………………………………………....6  Stakeholders…………………………………………………………………………….7  Acceptance Criteria……………………………………………………………………..8  Project Assumptions…………………………………………………………………….8  Project Risks…………………………………………………………………………….8  Project Constraints………………………………………………………………………8  Project Dependency……………………………………………………………………..8  Project Approach………………………………………………………………………..9 PROJECT ORGANIZATION……………………………………………………….9-11
  • 3. Page2  Communication Plan………………………………………………………………….9  Project Approvals……………………………………………………………………..9  Change Management Plan…………………………………………………………….9 I. Change Management Approach………………………………………………10 II. Project Member Standing……………………………………………………..10 III. Change Control Process………………………………………………………10 PROJECT SCHEDULE………………………………………………………….11-13  Project Overview……………………………………………………………………...11  Bill of Materials……………………………………………………………………….11  Gantt Chart………………………………………………………………………….....12 NETWORK DESIGN……………………………………………………………..14-17  Network Diagram……………………………………………………………………...14  Floor Plans……………………………………………………………………………..15  IP Scheme……………………………………………………………...………………17 SERVER CONFIGURATION……………………………………………………18-22  Dynamic Host Configuration Protocol (DHCP)/Firewall/Virtual Private Network Controller………………………………………………………………………………18  Edge/Hub Server……………………………………………………………………….18  Demilitarized Zone (DMZ) server……………………………………………………..19  Microsoft Exchange Server…………………………………………………………….19  Active Directory………………………………………………………………………..19  Domain Name System Server………………………………………………………….20  Windows Deployment Services (WDS) server…………………………………...……20  Active Directory Schema………………………………………………………………21  Basic Group Policies…………………………………………………………………...22 CLIENT CONFIGURATION……………………………………………………23-24  Windows 10…………………………………………………………………………….23  Windows Server 2012…………………………………………………………………..23
  • 4. Page3  Microsoft Office 365 Business…………………………………………………………23  VMWare Virtual Machine……………………………………………………………...24 CONTINGENCIES…………………………………………………………………24-28  Disaster Recovery Plan…………………………………………………………………24  Risk Management Plan…………………………………………………………………26 I. Purpose…………………………………………………………….……………26 II. Scope……………………………………………………………………………26 III. Risk Plan Objectives……………………………………………………………26 IV. Deliverables………………………………………………………………….….27 V. Disaster Recovery Plan……………………………………………………....…29 WBS DICTIONARY…………………………………………………………….…29-30 CONCLUSION…………………………………………………………………………30 PROJECT CHARTER This project is a business network infrastructure and two software development labs. This network encompasses a Local Area Network &Wireless Area Network for the new Orange Creek facility. Implementation of this network is to enable employees’ access to the corporate and lab computers. Implementation of Email is also required for communication between employees and management in a controlled environment to be accessible from inside or outside the Lexington facility. Team Code of Conduct In order to ensure a cohesive and efficient team, each member will need to agree to and comply with the following code of conduct:  Each team member will provide a minimum of one phone number and email address so the team can remain in contact whenever needed.  Each team member will make themselves reasonably available and reply to phone calls and emails in a timely manner.
  • 5. Page4  Team members will complete all assigned tasks in the time frame allotted for them. If assistance is needed from another team member or the task is the unachievable for any reason, the team member responsible must inform the team leader as soon as possible.  All members of the project team are expected to be prompt and present at the jobsite on required work days. If this is not going to be possible, the absent team member must inform the supervisor as soon as possible.  All team members will be required to conduct themselves in a professional manner at all times. Project Team Project Manager & Budget Analysis Director: Matt Barrett Client-Server Specialist & Server Developer: Chanthee Vong Web Developer& Network Developer: Mike Valente
  • 6. Page5 PROJECT COMPONENTS Project Objectives I. Design and implement district network with unique logons for employees, managers, administrators, and a guest login. II. Enable individual email inboxes for all employees, managers and administrators. III. Design and deploy a web page for use in accessing email from an external or internal network device. IV. Install two wired lab rooms for use in Software development. V. Implement Wireless Area Network. VI. Ensure all systems are secure and able to communicate. VII. Train bank personnel in use of the new network systems. VIII. Turn over control of network to Orange Creek, Inc. Deliverables a) Wireless Network Access b) Email for all employees, managers & administrators c) Two software development labs. d) Network printing capabilities building-wide. e) External website & internal intranet. Requirements The project will comply with all Federal and State requirements including:  TIA/EIA-568B: Commercial Building Telecommunications Wiring Standard.  TSB-36: Technical Systems Bulletin: Additional Cable Specifications for Unshielded Twisted-Pair Cables.
  • 7. Page6  TSB-40: Technical Systems Bulletin: Additional Transmission Specifications for Unshielded Twisted-Pair Connecting Hardware.  TIA/EIA-569: Commercial Building Standard for Telecommunication Pathways and Spaces.  EIA-570: Residential and Light Commercial Telecommunications Wiring Standard.  EIA-606: The Administration Standard for the Telecommunications Infrastructure of Commercial Buildings. Scope In Scope Out of Scope Cabling Install Network Maintenance Wireless Access Points Signal Integrity Actual ISP Cost Firewall Install & Configuration Hardware Maintenance Patch Panel Install Software Updating Patch Cable Creation Issues Caused by Improper Use of Software Active Directory Install & Configuration Actual Power Usage Cost Cabling Signal Integrity Testing Hardware Failures Group Policy Objects Developments & Implementation Issues Caused by Improper Use of Network Server Hardware Install Backup Systems Install Email Services Install & Configuration Router and Switch Install & Configuration Web Site Configuration & Deployment Wireless Access Points Install & Configuration
  • 8. Page7 Server Configuration Physical Security for Network Devices Installation Network Security Configuration Network Security Testing Software Licensing Acquisition Network Administrator Training Employee Network Use Training Acceptable Use Policy Development & Training for Employees Stakeholders Stakeholder Participation Orange Creek, Inc. As the project requesters, they will take ownership of the network & labs once the project is completed; including maintenance and oversite. Hawks Networking Developers and designers of the project. Will complete hardware and software implementation as requested. Once completed, ownership of the network will be given to Orange Creel, Inc. Employees These will be the primary users of the network and sole users of the labs. The network and workstations will be designed to optimize their ability to develop new baking software. Customers Ultimately these will be the end users of the software developed in Lexington. This group will consist, not only of the banking customers, but also branch employees.
  • 9. Page8 Acceptance Criteria The Stakeholders will accept this proposal if it meets all requirements. Upon acceptance, an initial payment or retainer will be made to Hawks Networking to begin working on the project. Project Assumptions  The project will take place in Lexington, KY  There will be two computer labs in the new structure, both on different floors.  The labs will utilized for software development.  VPN Tunneling will be contracted through the local ISP.  All ISP Traffic will be on Fiber Optic Lines.  The project will have an established budget and timeline. Project Risks  There are safety concerns with the installation & cabling portions of the project. All installers will be provided with, and expected to use, Personal Protective Equipment and comply with OSHA regulations.  Data integrity and security shall be a priority in accordance with FDIC regulations. Project Constraints Data Security and Internet access must comply with FDIC. All wiring will comply with NEC. Project Dependencies As this will be a backbone project that can be built upon after completion, there will be no dependencies.
  • 10. Page9 Project Approach A modular approach will be best for this project. Each lab will be worked on and completed separately. Quality checks will be conducted at each intermediate stage before moving on to the next step. This will help to ensure the integrity and quality of the network. Constructing this network in a modular fashion allows us to maximize our effort on each site. If the problems occur on at a lab, they will be solved before undertaking more work or moving on the next lab. PROJECT ORGANIZATION Communication Plan All communication between the stakeholders and the project team will be done via the Project Manager. Communications between stakeholders and any other project team member should be kept at a minimum. All communication between stakeholders and the Project Manager should be conducted, whenever possible, via email to maintain a written record of the conversation. Project Approvals All approvals for this project must be agreed upon by both Orange Creek, Inc. and the Project Manager of Hawks Networking. Change Management Plan This is the official change management plan for Hawks Networking, for the Orange Creek Project. This is a formal plan of action to execute changes within the agreed parameters. This plan will cover the purpose of any changes, how a change will be managed, and the change management process. All project team members and the project manager will be required to adhere to the plan if they wish to make a change to the project, and all change requests during the project will be submitted to the project manager.
  • 11. Page10 Change Management Approach It is the purview of the project manager to review all requests for change submitted, and to ensure that they have been formatted properly, and that all parties concerned in the project are in agreement as to the changes requested. This is to ensure optimum efficiency and fairness for all proposed project changes. There will be a threefold approach a change request:  Verify that the proposed change adheres to the guidelines of the scope, and that the changes will be beneficial to the project.  Draw up a plan to incorporate the change into the schedule and execute it.  Manage and document the changes as it is being incorporated. Ultimate responsibility for any implemented changes will reside with the Project Manager. Any team member wishing to make a change to their assigned area must first receive the Project Manager’s approval. Any proposed changes outside one team member’s assignment must receive the approval of both the Project Manager and the team member responsible for the aforementioned assignment. Project Member Standing Each team member is responsible for his/her individual role/assignments within the project. They will also be responsible to make certain that any changes to their assignments are approved by the Project Manager. Other team members are also responsible for contacting the specific employee if they want to make changes to a specific assignment not associated with them, as well as getting approval from the project manager. Change Control Process The following will lay out the order and process of how each change to the project will be handled and implemented to ensure and maintain optimum efficiency when incorporating the required changes for specific assignments within the project. The Project Manager oversee each change and ensure it is implemented as requested per the Change Control process of the Change Management Plan. The change control process is stated as follows:
  • 12. Page11 1) Properly identify the need for the change, and ensure that the proposal is beneficial to all parties involved with the project 2) Meticulously log every change request and implementation to the project. The Project Manager will be responsible for all change proposals submitted for the duration of the project. 3) The Project Manager will make sure that the approved change is properly implemented within the project, and that everyone involved properly implements the change. 4) All parties involved will implement the change, and report all progress to the Project Manager for evaluation and quality control. 5) Once the change has been implemented, the previous version will be logged for security and backup purposes. PROJECT SCHEDULE Project Overview Phase Date of Completion Deliverable Design Dec 10th 2015 Project Charter Build Mar 4th 2016 Hardware installed on site Software Configuration Mar 10th 2016 All software configured Completion Mar 17th 2016 Personnel trained & network handover Bill of Materials Item Cost per Unit Qty Total Cost HP Proliant BL460c Gen9 Server Blade $3,271.49 12 $39,257.88 Cisco RV220W Wireless Network Security Firewall Router $655.10 4 $2,620.40 Sangoma Vega 5000 20 FXS +2 FXO Gateway $2,627.30 1 $2,627.30 NETGEAR 16 Port Gigabit Business Class Desktop Switch $98.99 4 $395.96 Cisco SPA512g VoIP Phone $144.99 200 $28,998.00 Dell Precision T1700 Mini Tower (Intel Core i7-4790)* $1,705.04* 200 $341,008.00
  • 13. Page12 Dell B237DNF Mono Printer $269.99 8 $2,159.92 50 Pair CAT3 Cable PVC (1 Ft) $2.34 20 $46.80 Belden/CDT Bulk Cable CAT5e (1000 Ft) $197.95 1 $197.95 Microsoft Windows Professional $199.00 200 $39,800.00 Microsoft Windows Server 2012 R2 Standard (64 Bit License + 5 CALs) $544.96 2 $1,089.92 Kaspersky End Point Security for Business License (25 Nodes/3 Years) $1,729.95 8 $13,839.60 Carbonite Server Pro Bundle (3 Year Subscription) $2,159.99 1 $2,159.99 Tripp Lite Smart Rack Standard $1,124.00 2 $2,248.00 Trilogy T2 DL2700 Multi User Commercial Lock $501.00 2 $1,002.00 Technician Labor Wages $60,000.00 3 $180,000.00 *Cost of item incudes 200 each of: Dell Quietkey USB Keyboard, Dell Optical Scroll USB Mouse & Dell P2414H 24” Monitor Total: $657,451.72 Gantt Chart Task Name Duration Start Finish Orange Creek Network 0 days Wed 2/18/15 Wed 2/18/15 Initialization 2 days Mon 12/7/15 Tue 12/8/15 Identify Stakeholders Quiz Stakeholders 2 days Tue 12/8/15 Wed 12/9/15 Adjust Design 2 days Wed 12/9/15 Thu 12/10/15 Installation 60 days Mon 12/14/15 Fri 3/4/16
  • 14. Page13 Hardware 1 day Mon 12/14/15 Mon 12/14/15 Servers Work Stations Cables Security Configure Network Settings on Switches & Routers Switches & Routers Install Windows & Update Drivers & Patches Software 6 days Mon 12/14/15 Mon 12/21/15 Install Active Directory Install & Configure Authentication Methods (LDAP) Active Directory Configuration Email Server Configuration Create Domains
  • 15. Page14 Join Computer & Devices to Domains Add Client Configuration Add Users Configure IP Addresses Configure VoIP Telephones Test Infrastructure & Login User 7 days Mon 2/8/16 Tue 2/16/16 Improvements & Calibrations 14 days Mon 2/22/16 Thu 3/10/16 Quiz Stakeholders Make Adjustments Compile Documentation & Deliver Product Thu 3/17/16
  • 18. Page17 Floor #2 IP Scheme Server Farm IP Addressing 172.16.99.0-172.16.99.254 1st Floor Workstations & Peripherals 172.16.88.0-172.16.88.254 2nd Floor Workstations & Peripherals 172.16.77.0-172.16.77.254 1st Floor VoIP Addresses 172.16.66.0-172.16.66.254 2nd Floor VoIP Addresses 172.16.55.0-172.16.55.254
  • 19. Page18 SERVER CONFIGURATION Dynamic Host Configuration Protocol (DHCP)/Firewall/Virtual Private Network Controller Dynamic Host Configuration Protocol is a service provided by Windows Server that allows client computers to obtain a random IP address from the server, based on a preconfigured subnet map. This server is important in order for a client to communicate between the server and other clients on the network, as well as gaining access to the internet. A firewall is a hardware or software program used to monitor the traffic incoming between connections in the network. This is used to filter out spam, and potentially malicious software, packets, or intruders. Firewalls can also be used to block certain ports on the network, so that employees cannot access certain websites that could be deemed inappropriate for the workplace. Virtual private networks allow users on a private network to communicate to other private networks over a public network like the Internet. Virtual private networks can be used to communicate information between separate sites and to the main server through a secure channel. Virtual private networks can also allow remote logins to the network from outside of the building, in case an employee is in the field. VPN networks will be monitored on the DHCP server, and controlled through the use of hardware VPN controllers. Edge/Hub Server The Edge server is designed to stand between the local network and the internet. Edge is used by Microsoft Exchange and has an added measure of security between two separate networks, such as the local network and the internet. Edge servers are useful for handling and monitoring both mail and traffic incoming and outgoing between the local network and the internet. This can prevent spam and provide protection against viruses through the mail service.
  • 20. Page19 The Hub server is similar to the Edge server, except it resides within the internal network, and sends mail to the Edge server to be processed and sent to the internet. When the Edge server receives mail, it transmits it to the Hub server, to be processed, and then released to the internal network. Both the Hub and Edge servers are required for proper security of the mail server. Demilitarized Zone (DMZ) server A DMZ server, AKA a honey pot, is used as a decoy to deter hackers from locating and harming the main servers on the network. These servers are essentially used as sacrifices to fool hackers into thinking they have access to the network, while everything the hacker is does is tracked and logged. DMZ servers can also be used for additional outgoing traffic control between the local network and the internet. DMZ servers are important for an effective security network, while also being cost-efficient. Microsoft Exchange Server With Microsoft Exchange, you can create and manage your own email server and domain. In addition to the client access licenses, every employee will have access to their own unique email that they can use to communicate amongst coworkers. Each email will have 1GB of storage, so you can easily store many past messages for future use. Active Directory Active Directory is used to manage all users registered on the network. It is a tool used by Windows Server to authenticate and authorize users, and assign them to specific groups within the network, such as administrator and basic user. You can assign specific permissions to each group, which can give authorization to users within the group to access specific information or make changes to the network. All user authentication and authorization within the network will be controlled by the Active Directory server.
  • 21. Page20 Domain Name System Server A Domain Name System is a hierarchical database used to track all domains within the World Wide Web, and converts them to usable IP’s in order to communicate with other domains on the World Wide Web. The DNS Server is essentially the ticket to gain access to the internet through a domain, and the DNS Server will keep track of and maintain the domain of the bank’s network. Both the Active Directory and the DNS will run on the same server. Windows Deployment Services (WDS) server Windows Deployment Services server is essential to maintain maximum efficiency in the network. It is used to remotely install and update operating systems on desktops that are connected to the network. This streamlines the maintenance process by keeping every lab computer in each school site updated with the latest version of Windows 8.1, and any other software that needs updating on the computer, without having to individually update each computer. *NOTE* All servers (excluding the DMZ servers) will have their own backups for quality assurance, so if something goes wrong, we can keep the network running until we figure out the problem.
  • 22. Page21 Active Directory Schema I. Active Directory Root A. Group Policy 1. Email 2. User Intranet 3. Management Intranet 4. Printers 5. Other Permissions 6. Client Configuration B. Users 1. Employees a. 1st Floor Lab b. 2nd Floor Lab 2. Managers a. 1st Floor Supervisor b. 2nd Floor Supervisor 3. Guest a. A single, shared account with a preset time limit and weekly password changes 4. Other Employees C. Secure Authentication OU 1. Employees 2. Management 3. Guest 4. Admin D. Computers 1. 1st Floor Lab (1-90) 2. 2nd Floor Lab (91-180) E. Domain Controllers
  • 23. Page22 Basic Group Policies I. Users A. Main Policies 1. Cannot install ActiveX components 2. Cannot add or remove programs 3. Autoplay disabled 4. Assigned default domain to log in 5. Active Directory folder is hidden from desktop 6. Enable Disk Quota 7. Enforce Disk Quota 8. Disallow user override of locale settings 9. Configure folder options preference extension policy processing 10. Turn off Windows Updates 11. Configure local Users and Groups preference extension policy processing 12. Configure Network Shares preference extension policy processing 13. Configure Power Options preference extension policy processing 14. Configure shortcuts preference extension policy processing 15. Configure Start Menu preference extension policy processing 16. Restrict potentially unsafe HTML help functions to specified folders 17. Prevent Redirection of USB device 18. Slow link threshold for employees looking at unsolicited media 500 kb II. Managers A. Main Policy 1. Allow non-administrators to install drivers
  • 24. Page23 CLIENT CONFIGURATION Windows 10 The latest version of Microsoft’s PC operating system, Windows 10 improves upon Windows 7 & 8 with better start-up time and faster processing. Windows 10 Enterprise comes with built in file encrypting, for better security of important files. Windows 10 has kept most of the innovations for 8 but redesigns it for the PC as opposed to touchscreen devices. Windows Server 2012 The latest version of Windows Server allows you to take control of your network with the newest in innovative technology. Windows Server 2012 has enhanced support for open framework tools, so you can build, deploy, and scale applications with more flexibility. Windows Server 2012 has improved performance and can scale capacity more efficiently, so you can run your largest workloads, with powerful recovery tools to protect against sudden system failures and outages. With Windows Server 2012, you have full control over your network with the use of DNS, DHCP, Hub/Edge, Active Directory, and Exchange mail servers, with built-in state of the art firewalls and malware/virus protection. With seven thousand Client Access Licenses, you can be ensured that every employee will have their own unique license that can be used to access each server’s features, such as email services, Wi-Fi access, virtual machines, and more. Microsoft Office 365 Business Office 365 Business allows you the opportunity to get the latest versions of all Microsoft Office programs for a monthly fee. Microsoft Office 365 provides you with Word, Excel, PowerPoint, Outlook, OneNote, Publisher, Skype, and Access. Microsoft Office 365 comes with extensive IT tools used for security, user management, and user credentials. Each employee will
  • 25. Page24 have a Microsoft Office 365 user license, so they can install Microsoft Office on up to five devices. VMWare Virtual Machine VMWare is a powerful and indispensable tool for software developers, used to simulate a desktop environment in order to test, or learn about certain programs in a virtual environment. VMWare provides the opportunity to add, alter or delete programs without risk of causing system failure. CONTINGENCIES Disaster Recovery Plan Having a recovery plan is one of the most important things to have on a daily basis. In Information technology, disaster recovery plan may include restoring servers or mainframes with backups, re-establishing private branch exchanges or provisioning local area networks immediate business needs. In this project, we have identified and prepare all the steps that are required to respond to each type of disaster. The recovery steps are tested to make sure that when something wrong happens you will be able to recover all the data that will be at risk. Any threat to the server; be it either a technical disaster, such as circuit trips, and natural disaster, such as fire or flood, it would risk all the files and data stored in the server. Since these are servers for two separate floors it was decided to add a recovery plan for both of them. The purpose of the disaster recovery plan is to enable us to recover a damaged databases that are important. A well-designed and tested backup and restore plan is made so that if a disaster occurs you will be able to maximize the data availability and minimize the data loss. There are three types of Recovery model; Simple, Full, Bulk logged. Simple is riskier than the other two models. When under the Simple recovery model you cannot restore the point of failure data that is lost and can only recover the most recent backup made. While Full and bulk logged recovery models allows recovery from the point of failure. Below is a chart for the three different type of recovery models:
  • 26. Page25 Recovery Model Description Work Loss Exposure Recovery to Point in Time Simple No log backups. Automatically reclaims log space to keep space requirements small, essentially eliminating the need to manage the transaction log space Changes since the most recent backup are unprotected. In the event of a disaster, those changes must be redone Can recover only to the end of a backup. Full Requires log backups. No work is lost due to a lost or damaged data file. Can recover to an arbitrary point in time. Normally none. If the tail of the log is damaged, changes since the most recent log backup must be redone. Can recover to a specific point in time, assuming that your backups are complete up to that point in time Bulk Logged Requires log backups. An adjunct of the full recovery model that permits high performance bulk copy operations. Reduces log space usage by using minimal logging for most bulk operations If the log in damaged or bulk-logged operations occurred since the most recent log backup, changes since that last backup must be redone. Otherwise, no work is lost. Can recover to the end of any backup. Point-in-time recover is not supported. For this project it was decided to go for Full recovery model. Important data and files are going to be stored in the servers and because of that we need to make sure that all of that data and files are safe. When any type of disaster occurs and shuts the servers down, the first goal is to restore the whole database from the point of failure. In the duration of the restoration the whole server will be offline. Before any of the database can come online, all data will be restored to any point before the servers goes down.
  • 27. Page26 Risk Management Plan Purpose The purpose of a Risk Management Plan is to list potential risks and threats to the project as well as the network, and infrastructure. The main risk to the network is from attacks by malicious software and hackers who want to steal data or harm the company. The next likeliest risk to the network is data loss from a lack of retention from hardware leakage or failure. This document will outline the risks and methods to reduce the damage. Scope I. Viruses II. Infected Software III. Bringing viruses from home via USB thumb drives that can infect the entire network IV. Antivirus software not installed. V. Malware VI. Firewall not installed VII. Security Breaches VIII. Security Failures IX. Loss of confidentiality X. Loss of integrity XI. Loss of availability XII. Natural Disaster XIII. Any loss of data XIV. Any loss of service XV. An external attacker attempting to access data XVI. An attacker defacing a website Risk Plan Objectives This project will meet the following objectives:  Creating a security policy.  Insurance.  Use automation.  Use antivirus software  Protect the boundary  Include input validation
  • 28. Page27 Deliverables #1  Users visiting risky website, downloading and executing infected software. They may unknowingly bring viruses from home via USB thumb drives or other external memory device. When the USB is plugged in the work computer becomes infected. This, in turn, can infect other computers on the network.  If antivirus software is not installed, the workstation is vulnerable. If a system is infected, the malware can cause significant harm. Some malware infects a single system while others release worms that can spread across the network  The LAN (Local Area Network) Domain is the area that resides within the firewall. It can consist of a few systems connected together in a small home office network or a large network of a thousand or more machines. Each individual device on the network must be protected or all devices are vulnerable. The LAN to WAN (Wide Area Network) Domain connects the local network to the wide network. The LAN Domain is considered a trusted zone since it is controlled by the owner. The WAN Domain is considered an untrusted zone because it is not controlled and accessible to attackers.  Remote access is granted to field workers so they may utilize the network resources. Access can be granted via a VPN (Virtual Private Network) connection. The vulnerabilities exist at two stages of the VPN connection. The first stage is authentication. Authentication is when the user provides credentials to prove identity. If these credentials can be discovered, the attacker can later use them to impersonate a genuine user. The second stage is when data is passed between the user and the server. If the data is sent in clear text, an attacker can capture and read the data.  Natural disaster occurs such as a hurricane, flood, fire, tornado, or earthquake. These are very unpredictable events and cannot be avoided.  Downtime for the network. There will be times the network will fail such as power outages or internet provider service is down. This will cause many problems for people in Orange Creek. It will help to have a plan if and when this problem occurs.
  • 29. Page28 Deliverables #2  Any user downloading a virus onto a work computer will have an enormous impact. The cost of such an act can range from the price of a single computer, if the virus is contained, to considerable if the malware spreads into the network.  Antivirus protection can be expensive but the price is negligible compared to the damage that can be done without it. The more a company spends on antivirus the less it will have to spend on repairing the network.  The impact of a workstation lacking a firewall is very high. This would impact Orange Creek significantly. A firewall protects a network by controlling incoming and outgoing traffic based on established rules.  The impact from remote access is considered medium. Generally remote access is granted to IT professionals who are trusted to abide by password and encryption protocols.  The impact of a natural disaster can be considered high. Damage to the physical components of the network would not only mean Orange Creek would need to replace them but also cost them in downtime until the network is up and running again. Risk Area Level (H/M/L) Risk Plan Faulty Equipment M Troubleshoot or Replace Hacking H Security Countermeasures Exceeding Budget L Reduce Overhead Misinformation Feed L Run fact check to ensure reliable coverage DisasterRecovery Plan 1) Types of Teams:  Operations Team  Information Technology Team
  • 30. Page29  Facilities Team 2) In the Event of a Disaster:  All employees will follow SOP (Standard Operations Procedure) for the specific disaster.  The first step should always be to account for all employees. For a natural disaster follow SOP, for an immanent network attack sever all outside connections and if needed shut down all servers. 3) Recovery Scenarios:  Minor Damage Scenarios  Normal hardware failure. Replace hardware and start recovery from last good backup.  Major Damage, data loss due to malware or hacker, natural disaster. This will require the following specific SOP for the major disaster. 4) Recovery Activities:  Operations Team Tasks: Manage, organize, and evaluate disaster recovery.  Information Technology Team: Repair, replace, and recover from backups  Facilities Team Tasks: Evaluate and repair structural damage WBS DICTIONARY 1. Orange Creek Network 1.1 Initialization. 1.1.1 Identify Stakeholders. Compilation of a list of all stakeholders in the new network. 1.1.2 Quiz Stakeholders. Once all stakeholders have been identified, they will be asked a series of questions regarding their needs and expectations for the new network. 1.1.3 Adjust Design. Results of the stakeholder quizzes will be reviewed and any major discrepancies in the network’s design will be addressed. 1.2 Installation 1.2.1 Hardware. All physical needs of the network are put into place. Servers, routers & switches, and workstations including computers, monitors, phones
  • 31. Page30 and (where applicable) printers are placed according to the blueprints. The cabling will then be measured, cut and installed. Finally, mundane security measure (ex. server room door locks) need to be installed. 1.2.2 Software. Once the physical components are in place, the software can be installed onto them. Software and drivers need to be installed, domains and directories created. Then the work of creating user accounts, assigning roles and configuring IP addresses. Finally, the Voice over IP phones configured. 1.2.3 Test Infrastructure. Once the network is fully functional, it to run a full gamut of stress tests to ensure it will meet the requested specifications. 1.3 Improvements & Calibrations 1.3.1 Quiz Stakeholders. As the network’s users become familiar with the new systems, careful notes of any comments, questions or concerns should be taken for last-minute adjustments. 1.3.2 Make Adjustments. After a reasonable breaking in period, the necessary adjustments should be made to accommodate any persistent complaints or requests. CONCLUSION This document spells out what we at Hawks Networking believe to be the most advanced and efficient lab designs for the given parameters. We pride ourselves on high quality service and will apply the same attention to detail with building the labs as we have put into this presentation. Our team is always available to answer any questions or concerns whenever they arise. Please feel free to contact us and we look forward to working closely with you in the future.