2. What will be Covered:
Network Layout
Physical and Logical design
Technology used
Internal and External Network Security
User Access and Control
Why the selected Network was chosen
Overview
3. 2008 Windows Server
Network Will Use a Client/Server
Architecture
Mainframe located on Lower level, Backup
Server on 2nd Floor
Internet access through Central located
router
Network Layout
4. Windows Server 2008
40 GB Ethernet Connection
48 Port Switch on each floor
RAID 1 configuration provide solid data
backup
Technology
5. Proxy Server provides strong security
Windows Server 2008 Firewall with
Advanced Security
AuthenticationProtocol Kerberos through
Windows Server 2008
Security
6. Administrative
Controller adds or deletes
users from workgroup
Kerberos Key Distribution Center (KDC)
Audit files and folders to control access
User and Group Access
7. Best choice for expansion
Affordable and Cost effective
Client/Server Architecture is simple and
efficient
RAID5 backup server for highest network
security and sustainment
Why Choose Client/Server?
8. Network connectivity from floor to
floor with the use of switches.
STAR/EXTENDED
STAR Topology
Cat 6a Cabling
Configurable Smart
Switches
Fiber Optic Cable for
Switch Connections
10. Tomsho, Gregory; Guide to Networking Essentials, Sixth
Edition. Boston: Cengage Learning.
Microsoft Corporation, (2012) Windows Server 2008 R2
Retrieved September 1, 2012, from
http://technet.microsoft.com/library/dd349801
Microsoft Corporation, (2012). Kerberos, Retrieved
September 1, 2012, from
http://technet.microsoft.com/en-
us/library/cc733924(v=WS.10).aspx
References
Editor's Notes
Good Afternoon. Thank you for the opportunity to assess and provide consultations on your network and security of such network. In today’s market, maintaining a high level of network security should one of the top priorities of businesses. I have designed a network based on your supplied requirements and needs. The key points listed here will be covered throughout the presentation.
Taking advantage of technology available in today’s market, upgrading to Windows 2008 Server will allow for the highest speeds and security on the network. Additionally, a client-server architecture will allow for easy file sharing, individual users personal data storage, and other users to benefits. Locating the Main and Backup Servers within close proximity of each other will provide quick access for troubleshooting and access control. A Backup server is critical to the continuation of services in the event of a malfunction or power outage of the Main module.
The 40 GB Ethernet backbone in conjunction with new category 6 cabling will ensure high speed data processing and control. The addition of a 48 port switch per floor will provide equal distribution of network access amongst the 100 users online to the 10 applications extensively used, while providing the ability of expansion in the event more users are added. A RAID1 backup system keeps daily logs of network activity along with scheduled backups throughout the work day; these backups will be fully automatic to allow top productivity.
The use of a proxy server, which controls and monitor requested and transmitted data, along with Windows Server 2008 Firewall with Advanced Security and server and domain isolation , will provide a strong line of defense against internal and external threats. By monitoring, collecting, accepting, and denying access requests to the network will ensure total protection from unwanted access and attacks by malicious threats. Kerberos authentication verification incorporated in Windows 2008 provides additional security by verifying both the identity of the requesting user and the server providing the request.
A company (Taylor & Sons) designated administrative controller will control have total control over individual users and workgroups rights of access to files, databases, and servers. The Kerberos Key Distribution Center (KDC) will help monitor access to files and servers through individual tickets issued for each authentication request, which will contain encrypted data, including an encrypted password upon an open secure session between the client and the service hosting the resource.
Taylor and Sons Financial Consulting would be best served with a client/server architecture because of expandability, the simple and yet efficient design, which provides a heightened security with low maintenance and startup cost. The use of RAID5 backup divides parity information across all drives in the RAID array, which allows for reconstruction of a damaged drive through the parity information on other drives. RAID5 provides the added security of continued operations if one drive has a catastrophic failure. The port switches will allow future expansion if need be yet does not waste power if expansion does not happen. Kerberos encryption and the proxy server control simplifies file sharing without reduced security.
Providing an individual switch to each floor using Cat6a cable to connect the individual pc’s to the switch using a star topology in conjunction with fiber optic cables connecting each switch to a centralize switch using the extended star topology will provide centralized monitoring and make upgrading the network much easier.
I believe the Taylor & Sons Financial Consulting will continue to succeed as a leader in their market by providing total protection to the integrity and privacy of their clients with the incorporation of the network upgrades, improved security, and additional hardware previously mentioned. Thank you.