SlideShare a Scribd company logo
1 of 10
LAN Consulting Plan
                                       
                                       
    Taylor & Sons Financial Consulting
What   will be Covered:
  Network Layout
  Physical and Logical design
  Technology used
  Internal and External Network Security
  User Access and Control
  Why the selected Network was chosen



                  Overview
2008   Windows Server
Network  Will Use a Client/Server
 Architecture
Mainframe  located on Lower level, Backup
 Server on 2nd Floor
Internet   access through Central located
 router



              Network Layout
Windows    Server 2008

40   GB Ethernet Connection

48   Port Switch on each floor

RAID 1 configuration provide solid data
 backup


                 Technology
Proxy   Server provides strong security

Windows Server 2008 Firewall with
Advanced Security

AuthenticationProtocol Kerberos through
Windows Server 2008



                  Security
 Administrative
               Controller adds or deletes
 users from workgroup

 Kerberos   Key Distribution Center (KDC)

 Audit   files and folders to control access




           User and Group Access
Best   choice for expansion

Affordable   and Cost effective

Client/Server   Architecture is simple and
 efficient

RAID5  backup server for highest network
 security and sustainment



        Why Choose Client/Server?
Network connectivity from floor to
floor with the use of switches.

 STAR/EXTENDED
  STAR Topology

 Cat 6a Cabling

 Configurable Smart
  Switches

 Fiber Optic Cable for
  Switch Connections
In Conclusion
Network topology

Physical and Logical design

Technology

Security measures

User and group access

Why the network was chosen
 Tomsho, Gregory; Guide to Networking Essentials, Sixth
  Edition. Boston: Cengage Learning.
 Microsoft Corporation, (2012) Windows Server 2008 R2
  Retrieved September 1, 2012, from
  http://technet.microsoft.com/library/dd349801
 Microsoft Corporation, (2012). Kerberos, Retrieved
  September 1, 2012, from
  http://technet.microsoft.com/en-
  us/library/cc733924(v=WS.10).aspx




                    References

More Related Content

What's hot

Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
B olivares ppt mgmt 306
B olivares ppt mgmt 306B olivares ppt mgmt 306
B olivares ppt mgmt 306olivarb10
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
Cis 293 Extraordinary Success/newtonhelp.com
Cis 293 Extraordinary Success/newtonhelp.com  Cis 293 Extraordinary Success/newtonhelp.com
Cis 293 Extraordinary Success/newtonhelp.com amaranthbeg145
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source DatabasesGazzang
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment Gazzang
 
Windows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetWindows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetPassreset
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataNasser Hassan
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwarewardell henley
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 

What's hot (19)

Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
B olivares ppt mgmt 306
B olivares ppt mgmt 306B olivares ppt mgmt 306
B olivares ppt mgmt 306
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Cis 293 Extraordinary Success/newtonhelp.com
Cis 293 Extraordinary Success/newtonhelp.com  Cis 293 Extraordinary Success/newtonhelp.com
Cis 293 Extraordinary Success/newtonhelp.com
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
 
Windows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetWindows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password reset
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Remote Access For Desktop With Encryption System (
Remote  Access For Desktop With Encryption System (Remote  Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 

Similar to LAN Consulting Plan for Taylor & Sons Financial

Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 SecurityAmit Gatenyo
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...EuroCloud
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part IITimothy Chen
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twppptMizuhashi Yuki
 
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric VanderburgNetworking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric VanderburgEric Vanderburg
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
Active Directory 2019 v2.pptx
Active Directory 2019 v2.pptxActive Directory 2019 v2.pptx
Active Directory 2019 v2.pptxPradeep Kapkoti
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
Check Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course OverviewCheck Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course Overviewdaisuke_tanabe
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
Unified Fabric Architecture from BLADE Network Technologies
Unified Fabric Architecture from BLADE Network TechnologiesUnified Fabric Architecture from BLADE Network Technologies
Unified Fabric Architecture from BLADE Network TechnologiesIBM System Networking
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptxKISHOYIANKISH
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 

Similar to LAN Consulting Plan for Taylor & Sons Financial (20)

Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric VanderburgNetworking Concepts Lesson 01 - Intro - Eric Vanderburg
Networking Concepts Lesson 01 - Intro - Eric Vanderburg
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Active Directory 2019 v2.pptx
Active Directory 2019 v2.pptxActive Directory 2019 v2.pptx
Active Directory 2019 v2.pptx
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
Check Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course OverviewCheck Point CCSA NGX R71 Course Overview
Check Point CCSA NGX R71 Course Overview
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
Unified Fabric Architecture from BLADE Network Technologies
Unified Fabric Architecture from BLADE Network TechnologiesUnified Fabric Architecture from BLADE Network Technologies
Unified Fabric Architecture from BLADE Network Technologies
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 

LAN Consulting Plan for Taylor & Sons Financial

  • 1. LAN Consulting Plan      Taylor & Sons Financial Consulting
  • 2. What will be Covered:  Network Layout  Physical and Logical design  Technology used  Internal and External Network Security  User Access and Control  Why the selected Network was chosen Overview
  • 3. 2008 Windows Server Network Will Use a Client/Server Architecture Mainframe located on Lower level, Backup Server on 2nd Floor Internet access through Central located router Network Layout
  • 4. Windows Server 2008 40 GB Ethernet Connection 48 Port Switch on each floor RAID 1 configuration provide solid data backup Technology
  • 5. Proxy Server provides strong security Windows Server 2008 Firewall with Advanced Security AuthenticationProtocol Kerberos through Windows Server 2008 Security
  • 6.  Administrative Controller adds or deletes users from workgroup  Kerberos Key Distribution Center (KDC)  Audit files and folders to control access User and Group Access
  • 7. Best choice for expansion Affordable and Cost effective Client/Server Architecture is simple and efficient RAID5 backup server for highest network security and sustainment Why Choose Client/Server?
  • 8. Network connectivity from floor to floor with the use of switches.  STAR/EXTENDED STAR Topology  Cat 6a Cabling  Configurable Smart Switches  Fiber Optic Cable for Switch Connections
  • 9. In Conclusion Network topology Physical and Logical design Technology Security measures User and group access Why the network was chosen
  • 10.  Tomsho, Gregory; Guide to Networking Essentials, Sixth Edition. Boston: Cengage Learning.  Microsoft Corporation, (2012) Windows Server 2008 R2 Retrieved September 1, 2012, from http://technet.microsoft.com/library/dd349801  Microsoft Corporation, (2012). Kerberos, Retrieved September 1, 2012, from http://technet.microsoft.com/en- us/library/cc733924(v=WS.10).aspx References

Editor's Notes

  1. Good Afternoon. Thank you for the opportunity to assess and provide consultations on your network and security of such network. In today’s market, maintaining a high level of network security should one of the top priorities of businesses. I have designed a network based on your supplied requirements and needs. The key points listed here will be covered throughout the presentation.
  2. Taking advantage of technology available in today’s market, upgrading to Windows 2008 Server will allow for the highest speeds and security on the network. Additionally, a client-server architecture will allow for easy file sharing, individual users personal data storage, and other users to benefits. Locating the Main and Backup Servers within close proximity of each other will provide quick access for troubleshooting and access control. A Backup server is critical to the continuation of services in the event of a malfunction or power outage of the Main module.
  3. The 40 GB Ethernet backbone in conjunction with new category 6 cabling will ensure high speed data processing and control. The addition of a 48 port switch per floor will provide equal distribution of network access amongst the 100 users online to the 10 applications extensively used, while providing the ability of expansion in the event more users are added. A RAID1 backup system keeps daily logs of network activity along with scheduled backups throughout the work day; these backups will be fully automatic to allow top productivity.
  4. The use of a proxy server, which controls and monitor requested and transmitted data, along with Windows Server 2008 Firewall with Advanced Security and server and domain isolation , will provide a strong line of defense against internal and external threats. By monitoring, collecting, accepting, and denying access requests to the network will ensure total protection from unwanted access and attacks by malicious threats. Kerberos authentication verification incorporated in Windows 2008 provides additional security by verifying both the identity of the requesting user and the server providing the request.
  5. A company (Taylor & Sons) designated administrative controller will control have total control over individual users and workgroups rights of access to files, databases, and servers. The Kerberos Key Distribution Center (KDC) will help monitor access to files and servers through individual tickets issued for each authentication request, which will contain encrypted data, including an encrypted password upon an open secure session between the client and the service hosting the resource.
  6. Taylor and Sons Financial Consulting would be best served with a client/server architecture because of expandability, the simple and yet efficient design, which provides a heightened security with low maintenance and startup cost. The use of RAID5 backup divides parity information across all drives in the RAID array, which allows for reconstruction of a damaged drive through the parity information on other drives. RAID5 provides the added security of continued operations if one drive has a catastrophic failure. The port switches will allow future expansion if need be yet does not waste power if expansion does not happen. Kerberos encryption and the proxy server control simplifies file sharing without reduced security.
  7. Providing an individual switch to each floor using Cat6a cable to connect the individual pc’s to the switch using a star topology in conjunction with fiber optic cables connecting each switch to a centralize switch using the extended star topology will provide centralized monitoring and make upgrading the network much easier.
  8. I believe the Taylor & Sons Financial Consulting will continue to succeed as a leader in their market by providing total protection to the integrity and privacy of their clients with the incorporation of the network upgrades, improved security, and additional hardware previously mentioned. Thank you.
  9. Reference Page