NT2799
CAPSTONE
PROJECT
Emmanuel McCain
Capstone Project
2
Table of Content
1.1. Hardware and Software……………………………………………………………. 3
1.2. Network……………………………………………………………………………... 4
1.3. Installing Windows Server 2012 Domain Controller…………………………...... 5
1.4. Installation of VPN/Firewall……………………………………………………...... 7
1.5. Network Protocols………………………………………………………………….. 8
1.6. IP Address…………………………………………………………………………... 9
1.7. Hardware and Software Security…………………………………………………. 11
1.8. Hardware and Software Backup………………………………………………….. 12
3
Hardware & Software
Hardware
 Domain Controller
o 10TB, 64Gb, 3.7 GHz
 Client Computer
o 4TB, 16 GB, 3.5GHz
Router
 Juniper
 Cisco
Switch
 Cisco Switch Panel

,
Software
 Program
 Application
o Microsoft Office
o Exchange
o PowerShell
o Chrome
o Windows Media Player
o VMWare
o MySQL
o
 Operating System
o Windows
o Windows 2012
o Windows Server 2008
o Windows Server 2012
4
Network
A network is a connection between multiple individuals on a specific network. In computer
networks, networked computing devices exchange data with each other using a data link. The
connections between nodes are established using either cable media or wireless media.
1. Domain Network
 All computers connected via switch to Domain Controller
 99.9% of time you will make Domain Controller
 For bigger network, Multiple Domain controller can be utilized.
 Broadens your network and allows wide range of things to be established.
 Domain Controller can manage streamliner usernames and passwords.
 Centralized antivirus program managed by DC.
2. Workgroup Network
 All computers connected together with an Admin computer.
 You can use Windows server 2012 as well.
 You do not convert Admin Comp to Domain Controller.
 Limits Company growth.
 Each workstation has its unique login and password.
 Simpler peer to peer network.
 Unorganized antivirus program for each workstation.
DNS (Two Types) DHCP
 Forward Lookup Zone
 Reverse Lookup Zone
 Dynamic host configure protocol.
 Located in modem.
 Sometimes can be found in the server as well.
 Modem is password protected.
 Provides IP address to modem.
5
Installing Windows Server 2012
1. Make sure the workstation has the requirements to install Server 2012
2. Insert Server 2012 CD into CD Drive
3. Once computer boots up access the boot menu
*only if your computer is booting from the hard-drive and not the CD/DVD Drive
4. Once you access the boot menu allows the workstation to boot the server 2012 CD
5. Once the Server 2012 CD is booted, configure the workstation
I.E – Location, time and any files that can be converted over to the new system.
6. Once the configuration is completed the installation will complete after
7. The workstation will restart once the installation is completed.
8. After the restart of the workstation, this workstation now has Windows server 2012
9. Next is to configure the workstation as a whole with the new software/Server
10. The first thing that will pop up will be the Server Manager where you will install all of
your Services for the Network and workstation
11. First you must name the computer and assign an IP address or dynamically have it
assigned.
12. This will be located on the network connections tab which allows you to name the
computer and also IP version of which to use
13. Next the computer will restart will offer a restart to complete the new configuration, and
you must click yes.
14. If you do not click yes then the assigned IP address will not be valid.
6
15. After the restart you workstation now has an IP address added statically or dynamically.
16. From the Server Manager you will click install roles and services link, which will then
direct you to the roles and services installation page
17. From here you will install Active Directory Services, DNS, and DHCP to make sure the
workstation has the requirements to become a Domain controller.
18. Make sure that you are signed on as Administrator and not a guess because certain files
will not install completely because of the permissions that a guest is allowed.
19. Once all services and roles have been installed restart the workstation so that the new
roles can be implemented.
7
Installation of VPN
1. On the main desktop click the start icon and click Administrative tools.
2. Once the drop down box appears click the routing and remote access link
3. Select the name of the server of which you would like to configure the VPN, then click
the Routing and Remote access link in the action pane.
4. When the installation box appears select the VPN icon in the common configurations
dialog box and click next
5. The next screen will be the Remote Client Protocol dialog box, which the user confirms
the TCP/IP is included in the list, select yes to accept the protocols that are on the list the
click next
6. Next select the internet that you would like to connect to the Internet
7. In the IP Address Assignment dialog box select the automatically so that the DHCP
server will assign ip and subnet mask. The click next
8. Now you will be able to manage Multiple Remote Access, select No for now the click
next
Firewall
Firewall is a protective layer within a computer network that blocks unauthorized traffic
while allowing authorized traffic to continue through without a problem. A firewall is mandatory
when setting up a computer network to keep the network protected. If a firewall is not enable the
whole network is at jeopardy for being hacked or taken over.
8
Network Protocols
OS-
Routing Protocols/Help Communication
 IP
 SMTP
 POP3
 IMAP4
 IGRP
 EIGRP
Routed Protocols
 TCP/IP – DoD
 IPX/SPX – Novel
 Netbeui – MX
DoD/TCP/IP Layers
1. Process Application 5-7
2. Host-to-Host 4
TCP-UDP
3. Internet 3
4. Physical Access 1-2
9
IP Address
IP Address has two types
Network Address Subnet Mask Host Address
We do not have any control
over the IP address that we
acquire. The ISP provides
the IP address.
Each IP address must
have a subnet mask.
We generate this
ourselves not ISP
needed
ISP
 Comcast
 Verizon
 Cox
IP Address
IP Address has 4 bytes and 32 bits 4 octets
0 0 0 0 0 0 0 0
128 64 32 16 8 4 2 1 = 255
0 = OFF
1 = ON
Subnet Mask Equation = (2n) – 2
Public Classes IP Address Range
A – 1 – 126
B – 128 – 191
C – 192 – 223
D – 224 -339 (Reserved for Multicast)
E – 240-254 (Reserved for Research and Development)
Private Classes IP Address
Class A - 10.0.0.0
Class B – 127.16.0.0
Class C – 192.168.0.0
Subnet Range Default
10
Class A
255. 0. 0. 0
Network Address Host Address
Class B
255. 255. 0. 0
Network Address Host Address
Class C
255. 255. 255. 0
Network Address Host Address
2 Ways of Subnetting
1. 0 0 0 0 0 0 0 0
2. IP Address Subnet Mask
Subnet Mask IP Address
Example 1
192.168.111.?
N=4
192.168.111. ?
255.255.255.0
11
Hardware and Software Security
Hardware Security is a physical computing device that safeguards and manages digital
keys for strong authentication and provides crypto processing. This hardware security is usually
a physical object that coexist with the computer as a whole.
Software Security is any computer program designed to enhance information security.
Software security is within the computer itself, for example MacAfee which is a software
security program which protects the users from unauthorized intrusions and viruses.
12
Hardware and Software Back-Up
Hardware backup is a device that is portable or stationary that consist of a program that
allows the user of the computer to store information that may be able to be saved for a later time.
There are also flash drives that consist of programs that allow the computer to store back up
information on the device to save for a late time if something was to happen to the main
workstation.
Software back up is just like software security it is a nonphysical app that or program that
allows the user to save a restore point of the machine such as restore on Windows operating
system which allows the user to return to a previous point before something was installed or
problems occurred. A software back up does the same attributed by saving all information on
that machine and converting it to a file to be restored at a later point if there was a problem with
the machine/workstation

Project Pt1

  • 1.
  • 2.
    2 Table of Content 1.1.Hardware and Software……………………………………………………………. 3 1.2. Network……………………………………………………………………………... 4 1.3. Installing Windows Server 2012 Domain Controller…………………………...... 5 1.4. Installation of VPN/Firewall……………………………………………………...... 7 1.5. Network Protocols………………………………………………………………….. 8 1.6. IP Address…………………………………………………………………………... 9 1.7. Hardware and Software Security…………………………………………………. 11 1.8. Hardware and Software Backup………………………………………………….. 12
  • 3.
    3 Hardware & Software Hardware Domain Controller o 10TB, 64Gb, 3.7 GHz  Client Computer o 4TB, 16 GB, 3.5GHz Router  Juniper  Cisco Switch  Cisco Switch Panel  , Software  Program  Application o Microsoft Office o Exchange o PowerShell o Chrome o Windows Media Player o VMWare o MySQL o  Operating System o Windows o Windows 2012 o Windows Server 2008 o Windows Server 2012
  • 4.
    4 Network A network isa connection between multiple individuals on a specific network. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. 1. Domain Network  All computers connected via switch to Domain Controller  99.9% of time you will make Domain Controller  For bigger network, Multiple Domain controller can be utilized.  Broadens your network and allows wide range of things to be established.  Domain Controller can manage streamliner usernames and passwords.  Centralized antivirus program managed by DC. 2. Workgroup Network  All computers connected together with an Admin computer.  You can use Windows server 2012 as well.  You do not convert Admin Comp to Domain Controller.  Limits Company growth.  Each workstation has its unique login and password.  Simpler peer to peer network.  Unorganized antivirus program for each workstation. DNS (Two Types) DHCP  Forward Lookup Zone  Reverse Lookup Zone  Dynamic host configure protocol.  Located in modem.  Sometimes can be found in the server as well.  Modem is password protected.  Provides IP address to modem.
  • 5.
    5 Installing Windows Server2012 1. Make sure the workstation has the requirements to install Server 2012 2. Insert Server 2012 CD into CD Drive 3. Once computer boots up access the boot menu *only if your computer is booting from the hard-drive and not the CD/DVD Drive 4. Once you access the boot menu allows the workstation to boot the server 2012 CD 5. Once the Server 2012 CD is booted, configure the workstation I.E – Location, time and any files that can be converted over to the new system. 6. Once the configuration is completed the installation will complete after 7. The workstation will restart once the installation is completed. 8. After the restart of the workstation, this workstation now has Windows server 2012 9. Next is to configure the workstation as a whole with the new software/Server 10. The first thing that will pop up will be the Server Manager where you will install all of your Services for the Network and workstation 11. First you must name the computer and assign an IP address or dynamically have it assigned. 12. This will be located on the network connections tab which allows you to name the computer and also IP version of which to use 13. Next the computer will restart will offer a restart to complete the new configuration, and you must click yes. 14. If you do not click yes then the assigned IP address will not be valid.
  • 6.
    6 15. After therestart you workstation now has an IP address added statically or dynamically. 16. From the Server Manager you will click install roles and services link, which will then direct you to the roles and services installation page 17. From here you will install Active Directory Services, DNS, and DHCP to make sure the workstation has the requirements to become a Domain controller. 18. Make sure that you are signed on as Administrator and not a guess because certain files will not install completely because of the permissions that a guest is allowed. 19. Once all services and roles have been installed restart the workstation so that the new roles can be implemented.
  • 7.
    7 Installation of VPN 1.On the main desktop click the start icon and click Administrative tools. 2. Once the drop down box appears click the routing and remote access link 3. Select the name of the server of which you would like to configure the VPN, then click the Routing and Remote access link in the action pane. 4. When the installation box appears select the VPN icon in the common configurations dialog box and click next 5. The next screen will be the Remote Client Protocol dialog box, which the user confirms the TCP/IP is included in the list, select yes to accept the protocols that are on the list the click next 6. Next select the internet that you would like to connect to the Internet 7. In the IP Address Assignment dialog box select the automatically so that the DHCP server will assign ip and subnet mask. The click next 8. Now you will be able to manage Multiple Remote Access, select No for now the click next Firewall Firewall is a protective layer within a computer network that blocks unauthorized traffic while allowing authorized traffic to continue through without a problem. A firewall is mandatory when setting up a computer network to keep the network protected. If a firewall is not enable the whole network is at jeopardy for being hacked or taken over.
  • 8.
    8 Network Protocols OS- Routing Protocols/HelpCommunication  IP  SMTP  POP3  IMAP4  IGRP  EIGRP Routed Protocols  TCP/IP – DoD  IPX/SPX – Novel  Netbeui – MX DoD/TCP/IP Layers 1. Process Application 5-7 2. Host-to-Host 4 TCP-UDP 3. Internet 3 4. Physical Access 1-2
  • 9.
    9 IP Address IP Addresshas two types Network Address Subnet Mask Host Address We do not have any control over the IP address that we acquire. The ISP provides the IP address. Each IP address must have a subnet mask. We generate this ourselves not ISP needed ISP  Comcast  Verizon  Cox IP Address IP Address has 4 bytes and 32 bits 4 octets 0 0 0 0 0 0 0 0 128 64 32 16 8 4 2 1 = 255 0 = OFF 1 = ON Subnet Mask Equation = (2n) – 2 Public Classes IP Address Range A – 1 – 126 B – 128 – 191 C – 192 – 223 D – 224 -339 (Reserved for Multicast) E – 240-254 (Reserved for Research and Development) Private Classes IP Address Class A - 10.0.0.0 Class B – 127.16.0.0 Class C – 192.168.0.0 Subnet Range Default
  • 10.
    10 Class A 255. 0.0. 0 Network Address Host Address Class B 255. 255. 0. 0 Network Address Host Address Class C 255. 255. 255. 0 Network Address Host Address 2 Ways of Subnetting 1. 0 0 0 0 0 0 0 0 2. IP Address Subnet Mask Subnet Mask IP Address Example 1 192.168.111.? N=4 192.168.111. ? 255.255.255.0
  • 11.
    11 Hardware and SoftwareSecurity Hardware Security is a physical computing device that safeguards and manages digital keys for strong authentication and provides crypto processing. This hardware security is usually a physical object that coexist with the computer as a whole. Software Security is any computer program designed to enhance information security. Software security is within the computer itself, for example MacAfee which is a software security program which protects the users from unauthorized intrusions and viruses.
  • 12.
    12 Hardware and SoftwareBack-Up Hardware backup is a device that is portable or stationary that consist of a program that allows the user of the computer to store information that may be able to be saved for a later time. There are also flash drives that consist of programs that allow the computer to store back up information on the device to save for a late time if something was to happen to the main workstation. Software back up is just like software security it is a nonphysical app that or program that allows the user to save a restore point of the machine such as restore on Windows operating system which allows the user to return to a previous point before something was installed or problems occurred. A software back up does the same attributed by saving all information on that machine and converting it to a file to be restored at a later point if there was a problem with the machine/workstation