Proposalanswerspart33 Proposalanswerspart31 Propsalanswerspart23 Propsalanswerspart22 Proposalanswerspart32 Proposalanswerspart3 NetworkDesignProposalTemplate xPropsalanswerspart2 Propsalanswerspart21 NetworkDesignProposalTemplaterevised x
Follow the template. Finish 2 sections. Look at 2 documents I uploaded. This is EASY. I need this in 6-8 Hours bu today MAX. NO HEADERS OR COVER Please. Do well and I will hire you for NEXT Paper to $ INSTRUCTIONS – Re-word and rewrite the Answers to the 2 documents I uploaded titled ″proposal answers part 2. You have to do NO RESEARCH. Just Re-Write. Make it in your OWN WORDS. MAKE IT SOUND ORIGINAL. ANSWER ALL LETTERS IN TEMPLATE. – The answers are in the 2 PDF again. Just put it own words. Find 4 NEW sources to cite do not use all same sources as PDF. IEEE-style format for sources references Background You have been hired as part of the networking team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project. The university has recently leased a single building in Adelphi, Maryland. The building will house faculty and administrative offices, classrooms, a library, and computer labs. Security is important at UMUC, as the university has a responsibility to protect student and employee data as well as any intellectual property that UMUC maintains on its servers and computers. IT management would like to review multiple proposals to determine how best to address the university’s specific security issues. As a junior network engineer, you are asked to prepare a network proposal that addresses how best to establish a secure network infrastructure to support university operations in the newly-leased building. The proposal requires three submissions covering network design, network addressing and security, and network customization and optimization. The network proposal represents a great opportunity to document your expertise. It is also an opportunity for you to gain an integrated view of the different aspects of networking that you will be asked about in the certification exam.′
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal:
Network Customization &
Optimization (Part 3)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal Part 3
A.) Identify Network Services
The University needs to function like a well oiled machine, and the implementation of
certain network services will help make that possible. In order to fully create a client-server
network model, servers must be used so the client, or the user, can access the services they need
on the network. The main services UMUC requires are: email, online/internet access and file
and print sharing services. [1]
An email server is used to send and receive emails. The Microsoft Exchange server
works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server
also preforms functions such as collaboration features which allows faculty to create tasks and
meetings from the calendar portion of the software. It also provides video and audio
conferencing and instant messaging (IM) services. A web server is a server computer running
software enabling a computer to host a web page. One of the more popular web servers today is
an Apache web server, which will be used for the University. One of the most important
functions of a server operating system is sharing resources between users. A file server is a
computer used specifically for centralized file storage with the ability to share the files between
computers and other devices on the network. A print server is a computer utilized specifically
for sharing printers on the network. The sole purpose of a print server is to collect the files and
documents sent to a printer by a user on the network, send the document to a printer on the
network at which point the printer would print it out. [2]
B.) Additional Servers or Network Devices
In addition to email, internet access, file and print servers, UMUC will also require a
directory service, a Domain Controller and DHCP server. A directory service stores user and
computer profiles and access privileges on the domain controller (DC). It can be used to
authenticate and authorize users to allow secure access to internet services and applications. [3]
The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server
2016 software and will be utilized for the UMUC network. ADDS is installed on a domain
controller, which authenticates users and controls access in a network, enforces security policies
and installs and updates software for all computers on the network. [4] A separate server will be
needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will
need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and
the scopes configured. [5]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP
settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or
device on the network. It also keeps track of all the IP addresses already in use on the network to
avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft
Windows Server 2016 software and will be utilized for the UMUC network.
C.) Security Measures
Security measures start with the user. User accounts are granted access to certain
network resources by the system administrator and they are secured using a password.
Therefore, making sure those user accounts have excellent passwords by implementing a
password policy is top priority when maintaining network security. [2]. A one-factor
authentication method requiring a username and password as well as a log-in pass phrase would
be sufficient for students logging into the network. Faculty will require a two-factor
authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide
a password or a pass phrase or cognitive information such as mother’s maiden name and the city
in which you were born. Faculty members will be required to enter a password to log onto the
network just like the students. Additionally, they will be required to use a type 2 form of
authentication such as an access card to enter the building during “off” hours which are 8pm
through 8am and to enter their office. [1]. The password will need to be strong, which will
require enforcement of strict password guidelines. Each user should create a password containing
8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be
changed every 90 days and a user cannot use the same password twice within a year.
In addition to strong authentication a vulnerability scanner needs to be purchased and
implemented on the network, which will be ran by the network administrator on a weekly basis.
A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running
applications or services, missing critical patches across all platforms, user accounts that have not
been disabled, default or blank passwords, misconfigurations and missing security controls.
Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline
Security Analyzer (MBSA) will be downloaded. [1]
SSH (Secure Shell) Protocol is software that enables secure system administration
and file transfers over insecure networks. Encryption of all user authentications, commands,
output and file transfers is used to secure the connection between a client and a server and to
prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise
grade SSH and will be implemented on the network. It protects organizations against internal and
external attacks on user identities, password or login credential theft and data theft and allows
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
automated secure processes for remote command execution and file transfer. In addition to the
Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement
a controlled provisioning process, termination process and assists in the discovery and
remediation of existing keys. The Universal SSH key manager is required to maintain
government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST
800-53. [6]
D.) Justification for Additional Servers and security measures
ADDS on the Domain Controller is a necessity for a college campus like UMUC
primarily due to the security measures it provides. An administrator alone would not be able to
keep track of every employee and their access rights and every student as well as every guest
device. The domain controller works as an invisible administrator for all end users on the
network, providing or denying access resourced on the network. These resources include
everything from email, the Learning Management System
A DHCP server automatically configures the IP address for every device on the network
which ensures a valid, unique IP address for each and every device. DHCP also automatically
configures devices as they are added and dropped from the network which is a big help to a
network administrator. Configuring IP addresses statically would be a mistake for any network
larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server
is the best option to prevent connectivity issues and troubleshooting issues. [2]
A DNS server maps the logical name to its IP address. It is a necessity on a network with
internet access because it translates the IP address into the URL and vice versa. [1] Users on a
network are not going to remember an IP address but they will remember a website name like
www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case
the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016
software and the other is configured through the router, it could prevent possible connectivity
issues on the network.
A vulnerability scanner is required because it helps to maintain a network and its devices
without having to employ an entire IT department. Being able to run a scan periodically to check
for any vulnerabilities on the network is simple and cost-effective when compared to paying
additional salaries and benefits.
SSH software and key management is required to secure the Universities network using
encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism
requiring users to authenticate before they are able to transmit data over the transmission
channels within the UMUC network. This prevents unauthorized users from accessing data on
the network. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://UMUC.edu
E.) Network Storage and Cloud Based Services
A network attached storage (NAS) device will be used for additional file storage on the
network. The NAS will be placed directly to the network through a switch using a wired
interface. The NAS provides better performance because its sole purpose is file storage. The
NAS is a viable option because it can be integrated into an existing network and the active
directory. This prevents IT from having to configure duplicate accounts for each user as they will
authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The
switch connecting the NAS will maintain two separate VLANs, one for professors and one for
administrators. This will prevent professors from accessing protected information such as
financial data, social security numbers, etc.
The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless
Network Attached Storage will be implemented onto the network. It provides 80TB of storage
with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core
processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-
virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as
well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately
$2000. [10]
A private cloud will be implemented for the students and faculty at UMUC. A private
cloud provides flexibility of access, ease of use and allows users to provision their own
resources. [1] The private cloud will house the Learning Management System to be used by both
faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect
infrastructure and applications between cloud based computing and existing on premises
infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide
users with the Learning Management System while not having to worry about software
maintenance, capacity planning or patching. [7] The monthly average cost of a large web
application on Amazon Cloud services is $1000.
F.) Data Protection and Back-up Implementation
Data protection is the process of safeguarding information from corruption, compromise
or loss through operational backup of data. Data protection also includes business continuity/
disaster recovery which ensures the recovery of data quickly after a loss. There are two main
areas of data management: Data Lifecycle Management and Information Lifecycle Management.
Data lifecycle management automatically moves critical data from online to offline storage.
Information lifecycle management is a strategy for valuing, cataloging and protecting
information assets from application and user errors, malware and virus attacks, machine failure,
or facility outages and disruptions.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://searchmidmarketsecurity.techtarget.com/definition/malware
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Continuous Data Protection (CDP) is a form of data replication that backs up data as
changes are made. With CDP, a system or network can be restored to any previous point in time
which is extremely useful after corruption or data loss. A true CDP systems records every
change and stores it in a log. If a physical system failure occurs, the CDP system will keep all
changes up to the last write before failure, then you can restore the system prior to any
corruption. CDP can be implemented via software running on a server or as a hardware
appliance. For UMUC, the software option that will be implemented is the Dell EMC Data
Protection Suite Enterprise Edition. The software will be placed on a server and the data will be
stored in separate locations: the cloud and on a physical storage device or server. The software
will be accessible to all faculty, students and administrators connected to the UMUC network. [8]
The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.
G.) Network Monitoring Solution
Network monitoring is a service conducted by software in conjunction with the network
administrator and/or an IT department to constantly monitor a network for possible outages or
failures. A network monitoring system is implemented to ensure the availability and
performance of all devices and components on the network by implementing software to search
for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be
implemented for network monitoring. It is rated one of the best network monitoring softwares of
2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,
temperature, fan and other hardware, monitors PoE loads, wireless access points and interface
metrics. Monitoring a network is critical because it detects, monitors and analyzes the network
while examining applications and devices in real time which allows IT to respond quickly. [9]
A packet sniffer can also be used on the system to capture data being transmitted on a
device or over a network. Once all the data is captured, the packet sniffer holds the data until it
can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly
what is being sent to the device. This is a useful tool because it can help prevent attacks to a
specific device on the network. Once it is determined the device should not be receiving a
certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s
packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port
sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,
P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).
It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of
data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the
software maintenance fee will be renewed at 25% of the current list price of the original license.
[11]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.paessler.com/ftp-monitoring
https://www.paessler.com/ssh_monitoring
H.) Storage and Management of Logs
System logs are extremely important because they provide a snapshot of all the events
that occurred on the system. The log entries are generated by the operating system and any other
applications running on the system. A log entry could be caused by a variety of events including,
failed login attempts or a change to the system. Each log is created and stored on each device on
the network. Implementing centralized logging is the best way to review what’s happening on
the system because all the logging files from all devices on the network end up in a centralized
device, most often the logging server also known as the Syslog server. [1] Since Windows
servers do not contain a version of syslog process, Datagram SyslogServer Suite will be
downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file
analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store
the logs in a SQL database through the Amazon Rational Database Service (RDS) on the
Amazon cloud previously implemented. The IT administrator will then review the analysis and
make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost
approximately $900 for 5000 IP addresses. [12]
I.) IT Troubleshooting Methodology
The troubleshooting methodology that will be used by IT personnel at UMUC is as
follows:
• Identify the problem by making a list of the symptoms and identifying who is
experiencing those symptoms. Check for changes that occurred prior to the start of the
symptoms then try to duplicate the problem.
• Establish a theory of probable cause by analyzing the symptoms and determining the
most likely cause. Keep in mind the flow of data through the OSI model. Check for the
most common issues with the list of symptoms reported first.
• Test the theory. If the theory is proven, take the appropriate steps to research fixes to
the problem. If the theory is not proven, start the process over again or escalate the
issue to a supervisor.
• If the theory proven and a resolution found, complete a plan of action.
• After the action plan is complete, implement the solution and a series of tests to
determine if the action plan worked.
• Finally, complete a standard operating procedure guide for this problem in the future
containing any preventative measures. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
References
[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.
[2] D. Lowe, Networking for dummies. .
[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.
[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.
[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].
Available: https://technet.microsoft.com/en-us/library/cc780036(WS.
10).aspx#w2k3tr_ad_over_qbjd.
[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.
[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-
server-2016/.
[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://
www.ssh.com/ssh/.
[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://
aws.amazon.com/types-of-cloud-computing/.
[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:
http://searchdatabackup.techtarget.com/definition/data-protection.
[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].
Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.
[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,
Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-
nas-network-attached-storage/.
[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://
www.paessler.com/prtg/price_list.
[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:
https://www.netadmintools.com/syslog-server/datagram/.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://docs.oracle.com/cd/E19396-01/817-7619/intro.html
https://technet.microsoft.com/en-us/library/cc780036
https://protechgurus.com/configure-dhcp-server-in-windows-
http://www.ssh.com/ssh/
http://aws.amazon.com/types-of-cloud-computing/
http://searchdatabackup.techtarget.com/definition/data-protection
https://www.pcmag.com/article2/0,2817,2495263,00.asp
https://www.omnicoreagency.com/best-
http://www.paessler.com/prtg/price_list
https://www.netadmintools.com/syslog-server/datagram/
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal:
Network Customization &
Optimization (Part 3)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal Part 3
A.) Identify Network Services
The University needs to function like a well oiled machine, and the implementation of
certain network services will help make that possible. In order to fully create a client-server
network model, servers must be used so the client, or the user, can access the services they need
on the network. The main services UMUC requires are: email, online/internet access and file
and print sharing services. [1]
An email server is used to send and receive emails. The Microsoft Exchange server
works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server
also preforms functions such as collaboration features which allows faculty to create tasks and
meetings from the calendar portion of the software. It also provides video and audio
conferencing and instant messaging (IM) services. A web server is a server computer running
software enabling a computer to host a web page. One of the more popular web servers today is
an Apache web server, which will be used for the University. One of the most important
functions of a server operating system is sharing resources between users. A file server is a
computer used specifically for centralized file storage with the ability to share the files between
computers and other devices on the network. A print server is a computer utilized specifically
for sharing printers on the network. The sole purpose of a print server is to collect the files and
documents sent to a printer by a user on the network, send the document to a printer on the
network at which point the printer would print it out. [2]
B.) Additional Servers or Network Devices
In addition to email, internet access, file and print servers, UMUC will also require a
directory service, a Domain Controller and DHCP server. A directory service stores user and
computer profiles and access privileges on the domain controller (DC). It can be used to
authenticate and authorize users to allow secure access to internet services and applications. [3]
The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server
2016 software and will be utilized for the UMUC network. ADDS is installed on a domain
controller, which authenticates users and controls access in a network, enforces security policies
and installs and updates software for all computers on the network. [4] A separate server will be
needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will
need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and
the scopes configured. [5]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP
settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or
device on the network. It also keeps track of all the IP addresses already in use on the network to
avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft
Windows Server 2016 software and will be utilized for the UMUC network.
C.) Security Measures
Security measures start with the user. User accounts are granted access to certain
network resources by the system administrator and they are secured using a password.
Therefore, making sure those user accounts have excellent passwords by implementing a
password policy is top priority when maintaining network security. [2]. A one-factor
authentication method requiring a username and password as well as a log-in pass phrase would
be sufficient for students logging into the network. Faculty will require a two-factor
authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide
a password or a pass phrase or cognitive information such as mother’s maiden name and the city
in which you were born. Faculty members will be required to enter a password to log onto the
network just like the students. Additionally, they will be required to use a type 2 form of
authentication such as an access card to enter the building during “off” hours which are 8pm
through 8am and to enter their office. [1]. The password will need to be strong, which will
require enforcement of strict password guidelines. Each user should create a password containing
8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be
changed every 90 days and a user cannot use the same password twice within a year.
In addition to strong authentication a vulnerability scanner needs to be purchased and
implemented on the network, which will be ran by the network administrator on a weekly basis.
A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running
applications or services, missing critical patches across all platforms, user accounts that have not
been disabled, default or blank passwords, misconfigurations and missing security controls.
Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline
Security Analyzer (MBSA) will be downloaded. [1]
SSH (Secure Shell) Protocol is software that enables secure system administration
and file transfers over insecure networks. Encryption of all user authentications, commands,
output and file transfers is used to secure the connection between a client and a server and to
prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise
grade SSH and will be implemented on the network. It protects organizations against internal and
external attacks on user identities, password or login credential theft and data theft and allows
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
automated secure processes for remote command execution and file transfer. In addition to the
Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement
a controlled provisioning process, termination process and assists in the discovery and
remediation of existing keys. The Universal SSH key manager is required to maintain
government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST
800-53. [6]
D.) Justification for Additional Servers and security measures
ADDS on the Domain Controller is a necessity for a college campus like UMUC
primarily due to the security measures it provides. An administrator alone would not be able to
keep track of every employee and their access rights and every student as well as every guest
device. The domain controller works as an invisible administrator for all end users on the
network, providing or denying access resourced on the network. These resources include
everything from email, the Learning Management System
A DHCP server automatically configures the IP address for every device on the network
which ensures a valid, unique IP address for each and every device. DHCP also automatically
configures devices as they are added and dropped from the network which is a big help to a
network administrator. Configuring IP addresses statically would be a mistake for any network
larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server
is the best option to prevent connectivity issues and troubleshooting issues. [2]
A DNS server maps the logical name to its IP address. It is a necessity on a network with
internet access because it translates the IP address into the URL and vice versa. [1] Users on a
network are not going to remember an IP address but they will remember a website name like
www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case
the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016
software and the other is configured through the router, it could prevent possible connectivity
issues on the network.
A vulnerability scanner is required because it helps to maintain a network and its devices
without having to employ an entire IT department. Being able to run a scan periodically to check
for any vulnerabilities on the network is simple and cost-effective when compared to paying
additional salaries and benefits.
SSH software and key management is required to secure the Universities network using
encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism
requiring users to authenticate before they are able to transmit data over the transmission
channels within the UMUC network. This prevents unauthorized users from accessing data on
the network. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://UMUC.edu
E.) Network Storage and Cloud Based Services
A network attached storage (NAS) device will be used for additional file storage on the
network. The NAS will be placed directly to the network through a switch using a wired
interface. The NAS provides better performance because its sole purpose is file storage. The
NAS is a viable option because it can be integrated into an existing network and the active
directory. This prevents IT from having to configure duplicate accounts for each user as they will
authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The
switch connecting the NAS will maintain two separate VLANs, one for professors and one for
administrators. This will prevent professors from accessing protected information such as
financial data, social security numbers, etc.
The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless
Network Attached Storage will be implemented onto the network. It provides 80TB of storage
with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core
processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-
virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as
well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately
$2000. [10]
A private cloud will be implemented for the students and faculty at UMUC. A private
cloud provides flexibility of access, ease of use and allows users to provision their own
resources. [1] The private cloud will house the Learning Management System to be used by both
faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect
infrastructure and applications between cloud based computing and existing on premises
infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide
users with the Learning Management System while not having to worry about software
maintenance, capacity planning or patching. [7] The monthly average cost of a large web
application on Amazon Cloud services is $1000.
F.) Data Protection and Back-up Implementation
Data protection is the process of safeguarding information from corruption, compromise
or loss through operational backup of data. Data protection also includes business continuity/
disaster recovery which ensures the recovery of data quickly after a loss. There are two main
areas of data management: Data Lifecycle Management and Information Lifecycle Management.
Data lifecycle management automatically moves critical data from online to offline storage.
Information lifecycle management is a strategy for valuing, cataloging and protecting
information assets from application and user errors, malware and virus attacks, machine failure,
or facility outages and disruptions.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://searchmidmarketsecurity.techtarget.com/definition/malware
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Continuous Data Protection (CDP) is a form of data replication that backs up data as
changes are made. With CDP, a system or network can be restored to any previous point in time
which is extremely useful after corruption or data loss. A true CDP systems records every
change and stores it in a log. If a physical system failure occurs, the CDP system will keep all
changes up to the last write before failure, then you can restore the system prior to any
corruption. CDP can be implemented via software running on a server or as a hardware
appliance. For UMUC, the software option that will be implemented is the Dell EMC Data
Protection Suite Enterprise Edition. The software will be placed on a server and the data will be
stored in separate locations: the cloud and on a physical storage device or server. The software
will be accessible to all faculty, students and administrators connected to the UMUC network. [8]
The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.
G.) Network Monitoring Solution
Network monitoring is a service conducted by software in conjunction with the network
administrator and/or an IT department to constantly monitor a network for possible outages or
failures. A network monitoring system is implemented to ensure the availability and
performance of all devices and components on the network by implementing software to search
for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be
implemented for network monitoring. It is rated one of the best network monitoring softwares of
2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,
temperature, fan and other hardware, monitors PoE loads, wireless access points and interface
metrics. Monitoring a network is critical because it detects, monitors and analyzes the network
while examining applications and devices in real time which allows IT to respond quickly. [9]
A packet sniffer can also be used on the system to capture data being transmitted on a
device or over a network. Once all the data is captured, the packet sniffer holds the data until it
can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly
what is being sent to the device. This is a useful tool because it can help prevent attacks to a
specific device on the network. Once it is determined the device should not be receiving a
certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s
packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port
sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,
P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).
It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of
data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the
software maintenance fee will be renewed at 25% of the current list price of the original license.
[11]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.paessler.com/ftp-monitoring
https://www.paessler.com/ssh_monitoring
H.) Storage and Management of Logs
System logs are extremely important because they provide a snapshot of all the events
that occurred on the system. The log entries are generated by the operating system and any other
applications running on the system. A log entry could be caused by a variety of events including,
failed login attempts or a change to the system. Each log is created and stored on each device on
the network. Implementing centralized logging is the best way to review what’s happening on
the system because all the logging files from all devices on the network end up in a centralized
device, most often the logging server also known as the Syslog server. [1] Since Windows
servers do not contain a version of syslog process, Datagram SyslogServer Suite will be
downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file
analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store
the logs in a SQL database through the Amazon Rational Database Service (RDS) on the
Amazon cloud previously implemented. The IT administrator will then review the analysis and
make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost
approximately $900 for 5000 IP addresses. [12]
I.) IT Troubleshooting Methodology
The troubleshooting methodology that will be used by IT personnel at UMUC is as
follows:
• Identify the problem by making a list of the symptoms and identifying who is
experiencing those symptoms. Check for changes that occurred prior to the start of the
symptoms then try to duplicate the problem.
• Establish a theory of probable cause by analyzing the symptoms and determining the
most likely cause. Keep in mind the flow of data through the OSI model. Check for the
most common issues with the list of symptoms reported first.
• Test the theory. If the theory is proven, take the appropriate steps to research fixes to
the problem. If the theory is not proven, start the process over again or escalate the
issue to a supervisor.
• If the theory proven and a resolution found, complete a plan of action.
• After the action plan is complete, implement the solution and a series of tests to
determine if the action plan worked.
• Finally, complete a standard operating procedure guide for this problem in the future
containing any preventative measures. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
References
[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.
[2] D. Lowe, Networking for dummies. .
[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.
[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.
[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].
Available: https://technet.microsoft.com/en-us/library/cc780036(WS.
10).aspx#w2k3tr_ad_over_qbjd.
[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.
[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-
server-2016/.
[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://
www.ssh.com/ssh/.
[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://
aws.amazon.com/types-of-cloud-computing/.
[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:
http://searchdatabackup.techtarget.com/definition/data-protection.
[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].
Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.
[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,
Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-
nas-network-attached-storage/.
[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://
www.paessler.com/prtg/price_list.
[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:
https://www.netadmintools.com/syslog-server/datagram/.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://docs.oracle.com/cd/E19396-01/817-7619/intro.html
https://technet.microsoft.com/en-us/library/cc780036
https://protechgurus.com/configure-dhcp-server-in-windows-
http://www.ssh.com/ssh/
http://aws.amazon.com/types-of-cloud-computing/
http://searchdatabackup.techtarget.com/definition/data-protection
https://www.pcmag.com/article2/0,2817,2495263,00.asp
https://www.omnicoreagency.com/best-
http://www.paessler.com/prtg/price_list
https://www.netadmintools.com/syslog-server/datagram/
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Network Design Proposal:
Network Addressing &
Security (Part 2)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
!
!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
Part A: IP Addressing
Proposed Subnet
Subnet Description Required Hosts
Classroom 1 (First Floor) 25 Computers
Classroom 2 (First Floor) 25 Computers
Classroom 4 (First Floor) 25 Computers
Classroom 1 (Second Floor) 25 Computers
Classroom 5 (Second Floor) 25 Computers
Office 5 – Admissions (Second Floor) 25 Computers
Student Computer Lab 25 Computers
Library 15 Computers
Subnet Network Address Host Address Range Broadcast
Address
Subnet Mask: 255.255.255.0
Classroom 1
(First Floor)
192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31
Classroom 2
(First Floor)
192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63
Classroom 4
(First Floor)
192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95
Classroom 1
(Second Floor)
192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127
Classroom 5
(Second Floor)
192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159
Office 5 –
Admissions
(Second Floor)
192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191
Student
Computer Lab
192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223
Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255
Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Part B: Security
C.) Firewall: Network Based – Cisco ASA 5540 Series $3000
A Firewall is a device that secures a network from intruders. It acts as a lock between the
internet and a LAN requiring all traffic from the internet to pass through the firewall before
accessing any device within the network. There are two different types of firewalls: a host
based, which is a built in firewall that runs on a server or a network based, which is a hardware
appliance. For this campus, a network based firewall was chosen because they offer a stronger
defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)
5540 series firewall is an identity-based network firewall which allows certain users and groups
to access the network. This enables simplified policy configuration, so administrators can write
policies that correspond to business rules—for increased security, enhanced ease of use, and
fewer policies to manage. [1]
D.) IDS vs. IPS
An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from
accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs
advanced IPS software that provides proactive, full-featured intrusion prevention services to stop
malicious traffic, including worms and viruses, before they can affect a network. [1] For the
security of the University, the IPS module is the best option. An IDS (Intrusion Detection
System) wouldn’t prevent the malicious software from entering the network, which would be
detrimental to the University. Protecting University hardware and devices from cyber threats and
malware is one of the most important requirements of network security officer.
E.) DMZ
A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private
network and an untrusted network such as the internet. [2] A DMZ zone is a network
configuration designed to segregate computers on each side of a firewall. A commercial DMZ
creates a separate subnet outside of the firewall containing one or multiple computers to better
protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the
DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be
established using one or two firewalls. The single firewall solution uses multiple interfaces to
create multiple DMZ’s with multiple security zones. Each security zone can be created for
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
different levels of security: low, medium and high and anything in between. [2] For the
University campus, the best option is to create the DMZ’s using the existing hardware which is
the Cisco ASA firewall.
F.) Physical Security
Physical security is protection of the University’s information assets, IT services and
resources as well as ensuring safety of faculty and students. Physical security requires three
different areas of focus: prevention, detection and recovery. Prevention is key in any type of
security outline. It is easier to prevent an attack than it is to recover from an attack. [2]
Protecting the perimeter of the network and making sure the network is extremely difficult to
access helps prevent an attacker from attempting to breach the security in place. If a breach
occurs, being able to detect who breached the network and when, what was accessed and if it is
missing or damaged is of utmost importance. Finally, how a network recovers is paramount after
a breach to prevent any additional occurrences. If the network is breached, a review of the
physical security policy is required to determine how the breach occurred and if the security
profile has been sufficiently hardened. After review of the security policies in place, the
weakness allowing the breach should be corrected to prevent future attacks on the network. [2]
Protecting the buildings with S2 NetBox Online cloud-based access control system works
with existing infrastructure and peripheral devices allowing for seamless integration. The S2
System is scalable and allows the integration of third party access control devices such as the
Sargent Assa Abloy door locks.
The first step to take in physical security is protecting the buildings themselves with
Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever
and mortise box, the Harmony lock includes all access control capabilities such as card reader,
door position switch and request to exit monitoring sensors. The hardware is compatible will all
popular access control systems, such as the S2 NetBox Online system, and supports a variety of
openings while industry leading Grade 1 hardware offers the highest degree of physical security
available in access control locks. [5] These locks and the access control system will allow IT
professionals and administrators to prevent unauthorized access into the buildings on campus.
The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These
locks provide a cost-effective, future-proof solution for the campus while providing simultaneous
support for multiple credentials and offers an easy migration path to higher security credentials
and mobile access. [5] In addition to the locks, each faculty member will be assigned an access
card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
The interior and exterior doors will automatically lock at 8pm every night, barring entrance with
the exception of faculty with access cards. The doors will re-open at 8am every morning, again
with the exception of faculty access cards which will be permitted to access the buildings at any
time. The doors will allow exit with the request to exit monitoring sensors.
For access to the computers, each student will be given a username and password, which
will expire every 90 days. Students are permitted to access the buildings between the hours of
8am and 8pm. The students will only be able to access the network based computers with a
student log-in and password, provided by administration at time of registration. The password
will expire at the end of every semester and will only renew if the student is in good academic
standing, academically and financially.
The second step in physical security is protecting the perimeter of the buildings with
video surveillance of all exits and entrances within the two buildings. There should also be video
surveillance in common areas such as the lobby and stairways, the computer lab and library and
placed strategically throughout the hallways in both buildings. Surveillance should also be
placed outside the buildings on the lamp posts along the pathways connecting the two buildings.
The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision
bullet style surveillance cameras will be installed throughout the two new campus buildings.
They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an
83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night
vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be
placed in each building connecting all the cameras together. Each switch will cost $280 and will
be connected to the router and the router connected to the Network Video Recorder (NVR). The
NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of
incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6
terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on
all 32 channels. One benefit of using a 4K security system is the additional resolution needed
during an incident, which will offer the best chance to capture useful evidence such as distinct
facial features. [6]
This hardware will be used to provide optimal security on the University campus. The
electronic locks will be used to help prevent a physical security breach in one of the buildings.
The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying
to gain access to the buildings without authorization. The cameras are also used for detection
and recovery as they will record any nefarious acts, which will help law enforcement or
administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
recovery portion of physical security because they will provide administrators with a visual
account of the security breach as it is happening. This will help administrators implement new
policies and procedures to prevent future breaches in security. [2]
G.) Network Security Measures
Social engineering is an attempt to fraudulently access sensitive data from a user. Social
engineering is primarily accomplished by a person masquerading as someone the user trusts, then
asking for personal information such as passwords, usernames, bank account information and
social security numbers to name a few. Two different types of social engineering are used:
passive and active. Passive social engineering takes advantage of the unintended actions of a
user to gather information while active involves the user directly. [2] These types of attacks can
be prevented by implementing a social engineering policy. That policy would include bi-annual
mandatory training for all faculty, including IT professionals and administrators and students.
Faculty and students should also be tested by an outside third party to see if they fall prey to a
social engineering scam. These kinds of tests help keep the user on their toes and less
susceptible to a social engineering attack. The policy should also state users must comply with
the rules in regards to social engineering such as: do not open attachments from unknown users,
do not provide anyone with sensitive information, online transactions should only be made on
websites that use the https protocol and do not trust anyone requesting personal or sensitive
information. [7]
Malware, or malicious software, is a type of computer program designed to infect a
computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or
spyware. Protection against students or faculty willingly or unwillingly infecting computers with
malware starts with personal vigilance by training on social engineering techniques and
prevention. The requirement of a username to log-in to a computer for all students and faculty
can also protect against unintended malware infection by a student or faculty member. If a
student or faculty member intends to infect a computer with malware, knowing they will be
caught due to the required log-in may be a deterrent.
A computer’s second layer of defense against malware is through malware security
protection known as a host based intrusion detection system (IDS) or antivirus software.
Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will
periodically scan the computer and its files to detect and defeat malware. In addition, the
antivirus software can recognize and warn against previously unknown malware threats based on
technical features of the malware and warn against suspicious websites. Kaspersky was chosen
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
for the University because it is easy to use and install and its effective. There is no such thing as
100% protection against malware, but with personal vigilance and antivirus software, a computer
is as protected as it can be. [8]
H.) UMUC’s Liability Policy
Personal devices may be used on the wireless LAN with the acceptance of the BYOD
policy. The policy will be accepted by each user as he/she logs onto the WLAN with their
device. The end user will not be able to access the network without checking the “accept” button
on the login page. The BYOD policy will state that all personal devices logged into the network
will keep screen locks on, use device-tracking software and notify the college immediately if a
device is lost so that IT can wipe it clean. This will prevent sensitive information on the network
from ending up in the wrong hands. All students and faculty must also electronically sign a
document stating they will upload and maintain antivirus software on their device. [9] If the
end user does not comply with these requirements, he/she will not be allowed to participate in
the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a
device while connected to the network or the guest WiFi.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
References:
[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/
dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/
at_a_glance_c45-675579 .
[2] LabSim Network Pro. TestOut, 2016.
[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,
Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-
networking-816407.
[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,
Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/
connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.
[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:
http://www.sargentlock.com/products/product_overview.php?item_id=1878.
[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].
Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-
night-vision/LNB4163BW-1-p.
[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,
Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-
attacks-common-techniques-how-prevent-attack.
[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-
protect-against-it.
[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive
Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-
byod-campus.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579
https://www.lifewire.com/demilitarized-zone-computer-networking-816407
https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/
http://www.sargentlock.com/products/product_overview.php?item_id=1878
4MP High Definition IP Camera with Color Night Vision
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Network Design Proposal:
Network Addressing &
Security (Part 2)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
!
!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
Part A: IP Addressing
Proposed Subnet
Subnet Description Required Hosts
Classroom 1 (First Floor) 25 Computers
Classroom 2 (First Floor) 25 Computers
Classroom 4 (First Floor) 25 Computers
Classroom 1 (Second Floor) 25 Computers
Classroom 5 (Second Floor) 25 Computers
Office 5 – Admissions (Second Floor) 25 Computers
Student Computer Lab 25 Computers
Library 15 Computers
Subnet Network Address Host Address Range Broadcast
Address
Subnet Mask: 255.255.255.0
Classroom 1
(First Floor)
192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31
Classroom 2
(First Floor)
192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63
Classroom 4
(First Floor)
192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95
Classroom 1
(Second Floor)
192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127
Classroom 5
(Second Floor)
192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159
Office 5 –
Admissions
(Second Floor)
192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191
Student
Computer Lab
192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223
Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255
Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Part B: Security
C.) Firewall: Network Based – Cisco ASA 5540 Series $3000
A Firewall is a device that secures a network from intruders. It acts as a lock between the
internet and a LAN requiring all traffic from the internet to pass through the firewall before
accessing any device within the network. There are two different types of firewalls: a host
based, which is a built in firewall that runs on a server or a network based, which is a hardware
appliance. For this campus, a network based firewall was chosen because they offer a stronger
defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)
5540 series firewall is an identity-based network firewall which allows certain users and groups
to access the network. This enables simplified policy configuration, so administrators can write
policies that correspond to business rules—for increased security, enhanced ease of use, and
fewer policies to manage. [1]
D.) IDS vs. IPS
An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from
accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs
advanced IPS software that provides proactive, full-featured intrusion prevention services to stop
malicious traffic, including worms and viruses, before they can affect a network. [1] For the
security of the University, the IPS module is the best option. An IDS (Intrusion Detection
System) wouldn’t prevent the malicious software from entering the network, which would be
detrimental to the University. Protecting University hardware and devices from cyber threats and
malware is one of the most important requirements of network security officer.
E.) DMZ
A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private
network and an untrusted network such as the internet. [2] A DMZ zone is a network
configuration designed to segregate computers on each side of a firewall. A commercial DMZ
creates a separate subnet outside of the firewall containing one or multiple computers to better
protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the
DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be
established using one or two firewalls. The single firewall solution uses multiple interfaces to
create multiple DMZ’s with multiple security zones. Each security zone can be created for
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
different levels of security: low, medium and high and anything in between. [2] For the
University campus, the best option is to create the DMZ’s using the existing hardware which is
the Cisco ASA firewall.
F.) Physical Security
Physical security is protection of the University’s information assets, IT services and
resources as well as ensuring safety of faculty and students. Physical security requires three
different areas of focus: prevention, detection and recovery. Prevention is key in any type of
security outline. It is easier to prevent an attack than it is to recover from an attack. [2]
Protecting the perimeter of the network and making sure the network is extremely difficult to
access helps prevent an attacker from attempting to breach the security in place. If a breach
occurs, being able to detect who breached the network and when, what was accessed and if it is
missing or damaged is of utmost importance. Finally, how a network recovers is paramount after
a breach to prevent any additional occurrences. If the network is breached, a review of the
physical security policy is required to determine how the breach occurred and if the security
profile has been sufficiently hardened. After review of the security policies in place, the
weakness allowing the breach should be corrected to prevent future attacks on the network. [2]
Protecting the buildings with S2 NetBox Online cloud-based access control system works
with existing infrastructure and peripheral devices allowing for seamless integration. The S2
System is scalable and allows the integration of third party access control devices such as the
Sargent Assa Abloy door locks.
The first step to take in physical security is protecting the buildings themselves with
Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever
and mortise box, the Harmony lock includes all access control capabilities such as card reader,
door position switch and request to exit monitoring sensors. The hardware is compatible will all
popular access control systems, such as the S2 NetBox Online system, and supports a variety of
openings while industry leading Grade 1 hardware offers the highest degree of physical security
available in access control locks. [5] These locks and the access control system will allow IT
professionals and administrators to prevent unauthorized access into the buildings on campus.
The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These
locks provide a cost-effective, future-proof solution for the campus while providing simultaneous
support for multiple credentials and offers an easy migration path to higher security credentials
and mobile access. [5] In addition to the locks, each faculty member will be assigned an access
card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
The interior and exterior doors will automatically lock at 8pm every night, barring entrance with
the exception of faculty with access cards. The doors will re-open at 8am every morning, again
with the exception of faculty access cards which will be permitted to access the buildings at any
time. The doors will allow exit with the request to exit monitoring sensors.
For access to the computers, each student will be given a username and password, which
will expire every 90 days. Students are permitted to access the buildings between the hours of
8am and 8pm. The students will only be able to access the network based computers with a
student log-in and password, provided by administration at time of registration. The password
will expire at the end of every semester and will only renew if the student is in good academic
standing, academically and financially.
The second step in physical security is protecting the perimeter of the buildings with
video surveillance of all exits and entrances within the two buildings. There should also be video
surveillance in common areas such as the lobby and stairways, the computer lab and library and
placed strategically throughout the hallways in both buildings. Surveillance should also be
placed outside the buildings on the lamp posts along the pathways connecting the two buildings.
The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision
bullet style surveillance cameras will be installed throughout the two new campus buildings.
They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an
83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night
vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be
placed in each building connecting all the cameras together. Each switch will cost $280 and will
be connected to the router and the router connected to the Network Video Recorder (NVR). The
NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of
incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6
terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on
all 32 channels. One benefit of using a 4K security system is the additional resolution needed
during an incident, which will offer the best chance to capture useful evidence such as distinct
facial features. [6]
This hardware will be used to provide optimal security on the University campus. The
electronic locks will be used to help prevent a physical security breach in one of the buildings.
The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying
to gain access to the buildings without authorization. The cameras are also used for detection
and recovery as they will record any nefarious acts, which will help law enforcement or
administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
recovery portion of physical security because they will provide administrators with a visual
account of the security breach as it is happening. This will help administrators implement new
policies and procedures to prevent future breaches in security. [2]
G.) Network Security Measures
Social engineering is an attempt to fraudulently access sensitive data from a user. Social
engineering is primarily accomplished by a person masquerading as someone the user trusts, then
asking for personal information such as passwords, usernames, bank account information and
social security numbers to name a few. Two different types of social engineering are used:
passive and active. Passive social engineering takes advantage of the unintended actions of a
user to gather information while active involves the user directly. [2] These types of attacks can
be prevented by implementing a social engineering policy. That policy would include bi-annual
mandatory training for all faculty, including IT professionals and administrators and students.
Faculty and students should also be tested by an outside third party to see if they fall prey to a
social engineering scam. These kinds of tests help keep the user on their toes and less
susceptible to a social engineering attack. The policy should also state users must comply with
the rules in regards to social engineering such as: do not open attachments from unknown users,
do not provide anyone with sensitive information, online transactions should only be made on
websites that use the https protocol and do not trust anyone requesting personal or sensitive
information. [7]
Malware, or malicious software, is a type of computer program designed to infect a
computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or
spyware. Protection against students or faculty willingly or unwillingly infecting computers with
malware starts with personal vigilance by training on social engineering techniques and
prevention. The requirement of a username to log-in to a computer for all students and faculty
can also protect against unintended malware infection by a student or faculty member. If a
student or faculty member intends to infect a computer with malware, knowing they will be
caught due to the required log-in may be a deterrent.
A computer’s second layer of defense against malware is through malware security
protection known as a host based intrusion detection system (IDS) or antivirus software.
Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will
periodically scan the computer and its files to detect and defeat malware. In addition, the
antivirus software can recognize and warn against previously unknown malware threats based on
technical features of the malware and warn against suspicious websites. Kaspersky was chosen
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
for the University because it is easy to use and install and its effective. There is no such thing as
100% protection against malware, but with personal vigilance and antivirus software, a computer
is as protected as it can be. [8]
H.) UMUC’s Liability Policy
Personal devices may be used on the wireless LAN with the acceptance of the BYOD
policy. The policy will be accepted by each user as he/she logs onto the WLAN with their
device. The end user will not be able to access the network without checking the “accept” button
on the login page. The BYOD policy will state that all personal devices logged into the network
will keep screen locks on, use device-tracking software and notify the college immediately if a
device is lost so that IT can wipe it clean. This will prevent sensitive information on the network
from ending up in the wrong hands. All students and faculty must also electronically sign a
document stating they will upload and maintain antivirus software on their device. [9] If the
end user does not comply with these requirements, he/she will not be allowed to participate in
the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a
device while connected to the network or the guest WiFi.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
References:
[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/
dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/
at_a_glance_c45-675579 .
[2] LabSim Network Pro. TestOut, 2016.
[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,
Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-
networking-816407.
[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,
Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/
connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.
[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:
http://www.sargentlock.com/products/product_overview.php?item_id=1878.
[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].
Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-
night-vision/LNB4163BW-1-p.
[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,
Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-
attacks-common-techniques-how-prevent-attack.
[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-
protect-against-it.
[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive
Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-
byod-campus.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579
https://www.lifewire.com/demilitarized-zone-computer-networking-816407
https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/
http://www.sargentlock.com/products/product_overview.php?item_id=1878
4MP High Definition IP Camera with Color Night Vision
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal:
Network Customization &
Optimization (Part 3)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal Part 3
A.) Identify Network Services
The University needs to function like a well oiled machine, and the implementation of
certain network services will help make that possible. In order to fully create a client-server
network model, servers must be used so the client, or the user, can access the services they need
on the network. The main services UMUC requires are: email, online/internet access and file
and print sharing services. [1]
An email server is used to send and receive emails. The Microsoft Exchange server
works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server
also preforms functions such as collaboration features which allows faculty to create tasks and
meetings from the calendar portion of the software. It also provides video and audio
conferencing and instant messaging (IM) services. A web server is a server computer running
software enabling a computer to host a web page. One of the more popular web servers today is
an Apache web server, which will be used for the University. One of the most important
functions of a server operating system is sharing resources between users. A file server is a
computer used specifically for centralized file storage with the ability to share the files between
computers and other devices on the network. A print server is a computer utilized specifically
for sharing printers on the network. The sole purpose of a print server is to collect the files and
documents sent to a printer by a user on the network, send the document to a printer on the
network at which point the printer would print it out. [2]
B.) Additional Servers or Network Devices
In addition to email, internet access, file and print servers, UMUC will also require a
directory service, a Domain Controller and DHCP server. A directory service stores user and
computer profiles and access privileges on the domain controller (DC). It can be used to
authenticate and authorize users to allow secure access to internet services and applications. [3]
The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server
2016 software and will be utilized for the UMUC network. ADDS is installed on a domain
controller, which authenticates users and controls access in a network, enforces security policies
and installs and updates software for all computers on the network. [4] A separate server will be
needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will
need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and
the scopes configured. [5]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP
settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or
device on the network. It also keeps track of all the IP addresses already in use on the network to
avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft
Windows Server 2016 software and will be utilized for the UMUC network.
C.) Security Measures
Security measures start with the user. User accounts are granted access to certain
network resources by the system administrator and they are secured using a password.
Therefore, making sure those user accounts have excellent passwords by implementing a
password policy is top priority when maintaining network security. [2]. A one-factor
authentication method requiring a username and password as well as a log-in pass phrase would
be sufficient for students logging into the network. Faculty will require a two-factor
authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide
a password or a pass phrase or cognitive information such as mother’s maiden name and the city
in which you were born. Faculty members will be required to enter a password to log onto the
network just like the students. Additionally, they will be required to use a type 2 form of
authentication such as an access card to enter the building during “off” hours which are 8pm
through 8am and to enter their office. [1]. The password will need to be strong, which will
require enforcement of strict password guidelines. Each user should create a password containing
8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be
changed every 90 days and a user cannot use the same password twice within a year.
In addition to strong authentication a vulnerability scanner needs to be purchased and
implemented on the network, which will be ran by the network administrator on a weekly basis.
A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running
applications or services, missing critical patches across all platforms, user accounts that have not
been disabled, default or blank passwords, misconfigurations and missing security controls.
Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline
Security Analyzer (MBSA) will be downloaded. [1]
SSH (Secure Shell) Protocol is software that enables secure system administration
and file transfers over insecure networks. Encryption of all user authentications, commands,
output and file transfers is used to secure the connection between a client and a server and to
prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise
grade SSH and will be implemented on the network. It protects organizations against internal and
external attacks on user identities, password or login credential theft and data theft and allows
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
automated secure processes for remote command execution and file transfer. In addition to the
Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement
a controlled provisioning process, termination process and assists in the discovery and
remediation of existing keys. The Universal SSH key manager is required to maintain
government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST
800-53. [6]
D.) Justification for Additional Servers and security measures
ADDS on the Domain Controller is a necessity for a college campus like UMUC
primarily due to the security measures it provides. An administrator alone would not be able to
keep track of every employee and their access rights and every student as well as every guest
device. The domain controller works as an invisible administrator for all end users on the
network, providing or denying access resourced on the network. These resources include
everything from email, the Learning Management System
A DHCP server automatically configures the IP address for every device on the network
which ensures a valid, unique IP address for each and every device. DHCP also automatically
configures devices as they are added and dropped from the network which is a big help to a
network administrator. Configuring IP addresses statically would be a mistake for any network
larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server
is the best option to prevent connectivity issues and troubleshooting issues. [2]
A DNS server maps the logical name to its IP address. It is a necessity on a network with
internet access because it translates the IP address into the URL and vice versa. [1] Users on a
network are not going to remember an IP address but they will remember a website name like
www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case
the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016
software and the other is configured through the router, it could prevent possible connectivity
issues on the network.
A vulnerability scanner is required because it helps to maintain a network and its devices
without having to employ an entire IT department. Being able to run a scan periodically to check
for any vulnerabilities on the network is simple and cost-effective when compared to paying
additional salaries and benefits.
SSH software and key management is required to secure the Universities network using
encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism
requiring users to authenticate before they are able to transmit data over the transmission
channels within the UMUC network. This prevents unauthorized users from accessing data on
the network. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://UMUC.edu
E.) Network Storage and Cloud Based Services
A network attached storage (NAS) device will be used for additional file storage on the
network. The NAS will be placed directly to the network through a switch using a wired
interface. The NAS provides better performance because its sole purpose is file storage. The
NAS is a viable option because it can be integrated into an existing network and the active
directory. This prevents IT from having to configure duplicate accounts for each user as they will
authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The
switch connecting the NAS will maintain two separate VLANs, one for professors and one for
administrators. This will prevent professors from accessing protected information such as
financial data, social security numbers, etc.
The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless
Network Attached Storage will be implemented onto the network. It provides 80TB of storage
with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core
processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-
virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as
well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately
$2000. [10]
A private cloud will be implemented for the students and faculty at UMUC. A private
cloud provides flexibility of access, ease of use and allows users to provision their own
resources. [1] The private cloud will house the Learning Management System to be used by both
faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect
infrastructure and applications between cloud based computing and existing on premises
infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide
users with the Learning Management System while not having to worry about software
maintenance, capacity planning or patching. [7] The monthly average cost of a large web
application on Amazon Cloud services is $1000.
F.) Data Protection and Back-up Implementation
Data protection is the process of safeguarding information from corruption, compromise
or loss through operational backup of data. Data protection also includes business continuity/
disaster recovery which ensures the recovery of data quickly after a loss. There are two main
areas of data management: Data Lifecycle Management and Information Lifecycle Management.
Data lifecycle management automatically moves critical data from online to offline storage.
Information lifecycle management is a strategy for valuing, cataloging and protecting
information assets from application and user errors, malware and virus attacks, machine failure,
or facility outages and disruptions.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://searchmidmarketsecurity.techtarget.com/definition/malware
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Continuous Data Protection (CDP) is a form of data replication that backs up data as
changes are made. With CDP, a system or network can be restored to any previous point in time
which is extremely useful after corruption or data loss. A true CDP systems records every
change and stores it in a log. If a physical system failure occurs, the CDP system will keep all
changes up to the last write before failure, then you can restore the system prior to any
corruption. CDP can be implemented via software running on a server or as a hardware
appliance. For UMUC, the software option that will be implemented is the Dell EMC Data
Protection Suite Enterprise Edition. The software will be placed on a server and the data will be
stored in separate locations: the cloud and on a physical storage device or server. The software
will be accessible to all faculty, students and administrators connected to the UMUC network. [8]
The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.
G.) Network Monitoring Solution
Network monitoring is a service conducted by software in conjunction with the network
administrator and/or an IT department to constantly monitor a network for possible outages or
failures. A network monitoring system is implemented to ensure the availability and
performance of all devices and components on the network by implementing software to search
for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be
implemented for network monitoring. It is rated one of the best network monitoring softwares of
2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,
temperature, fan and other hardware, monitors PoE loads, wireless access points and interface
metrics. Monitoring a network is critical because it detects, monitors and analyzes the network
while examining applications and devices in real time which allows IT to respond quickly. [9]
A packet sniffer can also be used on the system to capture data being transmitted on a
device or over a network. Once all the data is captured, the packet sniffer holds the data until it
can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly
what is being sent to the device. This is a useful tool because it can help prevent attacks to a
specific device on the network. Once it is determined the device should not be receiving a
certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s
packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port
sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,
P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).
It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of
data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the
software maintenance fee will be renewed at 25% of the current list price of the original license.
[11]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.paessler.com/ftp-monitoring
https://www.paessler.com/ssh_monitoring
H.) Storage and Management of Logs
System logs are extremely important because they provide a snapshot of all the events
that occurred on the system. The log entries are generated by the operating system and any other
applications running on the system. A log entry could be caused by a variety of events including,
failed login attempts or a change to the system. Each log is created and stored on each device on
the network. Implementing centralized logging is the best way to review what’s happening on
the system because all the logging files from all devices on the network end up in a centralized
device, most often the logging server also known as the Syslog server. [1] Since Windows
servers do not contain a version of syslog process, Datagram SyslogServer Suite will be
downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file
analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store
the logs in a SQL database through the Amazon Rational Database Service (RDS) on the
Amazon cloud previously implemented. The IT administrator will then review the analysis and
make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost
approximately $900 for 5000 IP addresses. [12]
I.) IT Troubleshooting Methodology
The troubleshooting methodology that will be used by IT personnel at UMUC is as
follows:
• Identify the problem by making a list of the symptoms and identifying who is
experiencing those symptoms. Check for changes that occurred prior to the start of the
symptoms then try to duplicate the problem.
• Establish a theory of probable cause by analyzing the symptoms and determining the
most likely cause. Keep in mind the flow of data through the OSI model. Check for the
most common issues with the list of symptoms reported first.
• Test the theory. If the theory is proven, take the appropriate steps to research fixes to
the problem. If the theory is not proven, start the process over again or escalate the
issue to a supervisor.
• If the theory proven and a resolution found, complete a plan of action.
• After the action plan is complete, implement the solution and a series of tests to
determine if the action plan worked.
• Finally, complete a standard operating procedure guide for this problem in the future
containing any preventative measures. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
References
[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.
[2] D. Lowe, Networking for dummies. .
[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.
[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.
[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].
Available: https://technet.microsoft.com/en-us/library/cc780036(WS.
10).aspx#w2k3tr_ad_over_qbjd.
[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.
[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-
server-2016/.
[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://
www.ssh.com/ssh/.
[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://
aws.amazon.com/types-of-cloud-computing/.
[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:
http://searchdatabackup.techtarget.com/definition/data-protection.
[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].
Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.
[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,
Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-
nas-network-attached-storage/.
[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://
www.paessler.com/prtg/price_list.
[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:
https://www.netadmintools.com/syslog-server/datagram/.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://docs.oracle.com/cd/E19396-01/817-7619/intro.html
https://technet.microsoft.com/en-us/library/cc780036
https://protechgurus.com/configure-dhcp-server-in-windows-
http://www.ssh.com/ssh/
http://aws.amazon.com/types-of-cloud-computing/
http://searchdatabackup.techtarget.com/definition/data-protection
https://www.pcmag.com/article2/0,2817,2495263,00.asp
https://www.omnicoreagency.com/best-
http://www.paessler.com/prtg/price_list
https://www.netadmintools.com/syslog-server/datagram/
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal:
Network Customization &
Optimization (Part 3)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Network Design Proposal Part 3
A.) Identify Network Services
The University needs to function like a well oiled machine, and the implementation of
certain network services will help make that possible. In order to fully create a client-server
network model, servers must be used so the client, or the user, can access the services they need
on the network. The main services UMUC requires are: email, online/internet access and file
and print sharing services. [1]
An email server is used to send and receive emails. The Microsoft Exchange server
works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server
also preforms functions such as collaboration features which allows faculty to create tasks and
meetings from the calendar portion of the software. It also provides video and audio
conferencing and instant messaging (IM) services. A web server is a server computer running
software enabling a computer to host a web page. One of the more popular web servers today is
an Apache web server, which will be used for the University. One of the most important
functions of a server operating system is sharing resources between users. A file server is a
computer used specifically for centralized file storage with the ability to share the files between
computers and other devices on the network. A print server is a computer utilized specifically
for sharing printers on the network. The sole purpose of a print server is to collect the files and
documents sent to a printer by a user on the network, send the document to a printer on the
network at which point the printer would print it out. [2]
B.) Additional Servers or Network Devices
In addition to email, internet access, file and print servers, UMUC will also require a
directory service, a Domain Controller and DHCP server. A directory service stores user and
computer profiles and access privileges on the domain controller (DC). It can be used to
authenticate and authorize users to allow secure access to internet services and applications. [3]
The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server
2016 software and will be utilized for the UMUC network. ADDS is installed on a domain
controller, which authenticates users and controls access in a network, enforces security policies
and installs and updates software for all computers on the network. [4] A separate server will be
needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will
need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and
the scopes configured. [5]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP
settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or
device on the network. It also keeps track of all the IP addresses already in use on the network to
avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft
Windows Server 2016 software and will be utilized for the UMUC network.
C.) Security Measures
Security measures start with the user. User accounts are granted access to certain
network resources by the system administrator and they are secured using a password.
Therefore, making sure those user accounts have excellent passwords by implementing a
password policy is top priority when maintaining network security. [2]. A one-factor
authentication method requiring a username and password as well as a log-in pass phrase would
be sufficient for students logging into the network. Faculty will require a two-factor
authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide
a password or a pass phrase or cognitive information such as mother’s maiden name and the city
in which you were born. Faculty members will be required to enter a password to log onto the
network just like the students. Additionally, they will be required to use a type 2 form of
authentication such as an access card to enter the building during “off” hours which are 8pm
through 8am and to enter their office. [1]. The password will need to be strong, which will
require enforcement of strict password guidelines. Each user should create a password containing
8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be
changed every 90 days and a user cannot use the same password twice within a year.
In addition to strong authentication a vulnerability scanner needs to be purchased and
implemented on the network, which will be ran by the network administrator on a weekly basis.
A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running
applications or services, missing critical patches across all platforms, user accounts that have not
been disabled, default or blank passwords, misconfigurations and missing security controls.
Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline
Security Analyzer (MBSA) will be downloaded. [1]
SSH (Secure Shell) Protocol is software that enables secure system administration
and file transfers over insecure networks. Encryption of all user authentications, commands,
output and file transfers is used to secure the connection between a client and a server and to
prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise
grade SSH and will be implemented on the network. It protects organizations against internal and
external attacks on user identities, password or login credential theft and data theft and allows
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
automated secure processes for remote command execution and file transfer. In addition to the
Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement
a controlled provisioning process, termination process and assists in the discovery and
remediation of existing keys. The Universal SSH key manager is required to maintain
government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST
800-53. [6]
D.) Justification for Additional Servers and security measures
ADDS on the Domain Controller is a necessity for a college campus like UMUC
primarily due to the security measures it provides. An administrator alone would not be able to
keep track of every employee and their access rights and every student as well as every guest
device. The domain controller works as an invisible administrator for all end users on the
network, providing or denying access resourced on the network. These resources include
everything from email, the Learning Management System
A DHCP server automatically configures the IP address for every device on the network
which ensures a valid, unique IP address for each and every device. DHCP also automatically
configures devices as they are added and dropped from the network which is a big help to a
network administrator. Configuring IP addresses statically would be a mistake for any network
larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server
is the best option to prevent connectivity issues and troubleshooting issues. [2]
A DNS server maps the logical name to its IP address. It is a necessity on a network with
internet access because it translates the IP address into the URL and vice versa. [1] Users on a
network are not going to remember an IP address but they will remember a website name like
www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case
the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016
software and the other is configured through the router, it could prevent possible connectivity
issues on the network.
A vulnerability scanner is required because it helps to maintain a network and its devices
without having to employ an entire IT department. Being able to run a scan periodically to check
for any vulnerabilities on the network is simple and cost-effective when compared to paying
additional salaries and benefits.
SSH software and key management is required to secure the Universities network using
encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism
requiring users to authenticate before they are able to transmit data over the transmission
channels within the UMUC network. This prevents unauthorized users from accessing data on
the network. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://UMUC.edu
E.) Network Storage and Cloud Based Services
A network attached storage (NAS) device will be used for additional file storage on the
network. The NAS will be placed directly to the network through a switch using a wired
interface. The NAS provides better performance because its sole purpose is file storage. The
NAS is a viable option because it can be integrated into an existing network and the active
directory. This prevents IT from having to configure duplicate accounts for each user as they will
authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The
switch connecting the NAS will maintain two separate VLANs, one for professors and one for
administrators. This will prevent professors from accessing protected information such as
financial data, social security numbers, etc.
The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless
Network Attached Storage will be implemented onto the network. It provides 80TB of storage
with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core
processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-
virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as
well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately
$2000. [10]
A private cloud will be implemented for the students and faculty at UMUC. A private
cloud provides flexibility of access, ease of use and allows users to provision their own
resources. [1] The private cloud will house the Learning Management System to be used by both
faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect
infrastructure and applications between cloud based computing and existing on premises
infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide
users with the Learning Management System while not having to worry about software
maintenance, capacity planning or patching. [7] The monthly average cost of a large web
application on Amazon Cloud services is $1000.
F.) Data Protection and Back-up Implementation
Data protection is the process of safeguarding information from corruption, compromise
or loss through operational backup of data. Data protection also includes business continuity/
disaster recovery which ensures the recovery of data quickly after a loss. There are two main
areas of data management: Data Lifecycle Management and Information Lifecycle Management.
Data lifecycle management automatically moves critical data from online to offline storage.
Information lifecycle management is a strategy for valuing, cataloging and protecting
information assets from application and user errors, malware and virus attacks, machine failure,
or facility outages and disruptions.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
http://searchmidmarketsecurity.techtarget.com/definition/malware
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
Continuous Data Protection (CDP) is a form of data replication that backs up data as
changes are made. With CDP, a system or network can be restored to any previous point in time
which is extremely useful after corruption or data loss. A true CDP systems records every
change and stores it in a log. If a physical system failure occurs, the CDP system will keep all
changes up to the last write before failure, then you can restore the system prior to any
corruption. CDP can be implemented via software running on a server or as a hardware
appliance. For UMUC, the software option that will be implemented is the Dell EMC Data
Protection Suite Enterprise Edition. The software will be placed on a server and the data will be
stored in separate locations: the cloud and on a physical storage device or server. The software
will be accessible to all faculty, students and administrators connected to the UMUC network. [8]
The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.
G.) Network Monitoring Solution
Network monitoring is a service conducted by software in conjunction with the network
administrator and/or an IT department to constantly monitor a network for possible outages or
failures. A network monitoring system is implemented to ensure the availability and
performance of all devices and components on the network by implementing software to search
for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be
implemented for network monitoring. It is rated one of the best network monitoring softwares of
2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,
temperature, fan and other hardware, monitors PoE loads, wireless access points and interface
metrics. Monitoring a network is critical because it detects, monitors and analyzes the network
while examining applications and devices in real time which allows IT to respond quickly. [9]
A packet sniffer can also be used on the system to capture data being transmitted on a
device or over a network. Once all the data is captured, the packet sniffer holds the data until it
can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly
what is being sent to the device. This is a useful tool because it can help prevent attacks to a
specific device on the network. Once it is determined the device should not be receiving a
certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s
packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port
sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,
P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).
It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of
data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the
software maintenance fee will be renewed at 25% of the current list price of the original license.
[11]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.paessler.com/ftp-monitoring
https://www.paessler.com/ssh_monitoring
H.) Storage and Management of Logs
System logs are extremely important because they provide a snapshot of all the events
that occurred on the system. The log entries are generated by the operating system and any other
applications running on the system. A log entry could be caused by a variety of events including,
failed login attempts or a change to the system. Each log is created and stored on each device on
the network. Implementing centralized logging is the best way to review what’s happening on
the system because all the logging files from all devices on the network end up in a centralized
device, most often the logging server also known as the Syslog server. [1] Since Windows
servers do not contain a version of syslog process, Datagram SyslogServer Suite will be
downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file
analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store
the logs in a SQL database through the Amazon Rational Database Service (RDS) on the
Amazon cloud previously implemented. The IT administrator will then review the analysis and
make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost
approximately $900 for 5000 IP addresses. [12]
I.) IT Troubleshooting Methodology
The troubleshooting methodology that will be used by IT personnel at UMUC is as
follows:
• Identify the problem by making a list of the symptoms and identifying who is
experiencing those symptoms. Check for changes that occurred prior to the start of the
symptoms then try to duplicate the problem.
• Establish a theory of probable cause by analyzing the symptoms and determining the
most likely cause. Keep in mind the flow of data through the OSI model. Check for the
most common issues with the list of symptoms reported first.
• Test the theory. If the theory is proven, take the appropriate steps to research fixes to
the problem. If the theory is not proven, start the process over again or escalate the
issue to a supervisor.
• If the theory proven and a resolution found, complete a plan of action.
• After the action plan is complete, implement the solution and a series of tests to
determine if the action plan worked.
• Finally, complete a standard operating procedure guide for this problem in the future
containing any preventative measures. [1]
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3
References
[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.
[2] D. Lowe, Networking for dummies. .
[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.
[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.
[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].
Available: https://technet.microsoft.com/en-us/library/cc780036(WS.
10).aspx#w2k3tr_ad_over_qbjd.
[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.
[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-
server-2016/.
[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://
www.ssh.com/ssh/.
[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://
aws.amazon.com/types-of-cloud-computing/.
[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:
http://searchdatabackup.techtarget.com/definition/data-protection.
[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].
Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.
[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,
Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-
nas-network-attached-storage/.
[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://
www.paessler.com/prtg/price_list.
[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:
https://www.netadmintools.com/syslog-server/datagram/.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://docs.oracle.com/cd/E19396-01/817-7619/intro.html
https://technet.microsoft.com/en-us/library/cc780036
https://protechgurus.com/configure-dhcp-server-in-windows-
http://www.ssh.com/ssh/
http://aws.amazon.com/types-of-cloud-computing/
http://searchdatabackup.techtarget.com/definition/data-protection
https://www.pcmag.com/article2/0,2817,2495263,00.asp
https://www.omnicoreagency.com/best-
http://www.paessler.com/prtg/price_list
https://www.netadmintools.com/syslog-server/datagram/
II.
Network Addressing and Security
A. Subnetting
Overview
Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).
We have been assigned the network address 192.168.22.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.
Class
Octet Decimal Range
A
1 – 126
B
128 – 191
C
192 – 223
Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.
Class
Subnet Mask
Format
A
255.0.0.0
Network.Host.Host.Host
B
255.255.0.0
Network.Network.Host.Host
C
255.255.255.0
Network.Network.Network.Host
CIDR (Classless Inter Domain Routing)
CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.
· Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation, it would be written as /8, means address has 8 bits on.
· Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation, it would be written as /16, means address has 16 bits on.
· Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation, it would be written as /24, means address has 24 bits on.
Technical Requirements
UMUC has not decided how they will use all of the physical space within the newly leased building, but the diagrams below convey the proposed end state. However, they have decided to use some of the space in the short term. In doing so, we will proceed with the proposed plan. Initially, the building will house
5 classrooms, 1 student computer lab, 1 library, and 1 office
.
· In the below building diagrams, we will use Office 5 (Admissions) on the first floor. Each office will have 1 computer for staff use, with the exception of the admissions office, which will have 5 computers. Based on the subnetting performed above, we may be able to add more devices in the future.
· The classrooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each classroom will have a closet. Each classroom will have 25 devices: 23 student computers, 1 instructor computer, and 1 server in the closet, for instructional use.
· Students should consider high traffic areas for Wi-Fi, such as the sitting areas and not the classrooms. The Wi-Fi network should be segregated from the wired network and implemented on a separate Class C network. What will the network address, range, and broadcast address for this separate Class C wireless address be?
· In addition, there will be a student computer lab that will provide computer access to students to do their homework. The student computer lab is located on the second floor. There will be 24 computers in this lab and 1 server in the closet.
· To allow students access to library resources, the library will also have 10 computers for the general public to use and 5 computers for library staff.
· There will be two server rooms, one on the first floor and one on the second floor.
To be clear, the diagram below conveys the proposed end state.
Given the aforementioned scenario, we are going to use the 192.168.3.0 network and create a total of 8 subnets, with 25 possible hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.
Subnet Description
Required Hosts
Classroom 1 (First Floor)
25 Computers
Classroom 2 (First Floor)
25 Computers
Classroom 4 (First Floor)
25 Computers
Classroom 1 (Second Floor)
25 Computers
Classroom 5 (Second Floor)
25 Computers
Office 5 – Admissions (Second Floor)
25 Computers
Student Computer Lab
25 Computers
Library
15 Computers
Note: Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.
Proposed Subnet
Subnet
Network Address
Host Address Range
Broadcast Address
Subnet Mask: 255.255.255. ___
Classroom 1 (First Floor)
192.168.22.0
192.168.22.1 – 192.168.22.30
192.168.22.31
Classroom 2 (First Floor)
192.168.22. _
192.168.22. _ – 192.168.22. _
192.168.22. _
Classroom 4 (First Floor)
192.168.22. _
192.168.22. _ – 192.168.22. _
192.168.22. _
Classroom 1 (Second Floor)
192.168.22.96
192.168.22.97 – 192.168.22.126
192.168.22.127
Classroom 5 (Second Floor)
192.168.22.128
192.168.22.129 – 192.168.22.158
192.168.22.159
Office 5 – Admissions (Second Floor)
192.168.22. _
192.168.22. _ – 192.168.22. _
192.168.22. _
Student Computer Lab
192.168.22. _
192.168.22. _ – 192.168.22. _
192.168.22. _
Library
192.168.22. _
192.168.22. _ – 192.168.22. _
192.168.22. _
Wi-Fi Network
192.__. __.__
192._._. _ – 192._._. _
192._._. _
B. Firewall Implementation
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Firewall Implementation
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
C. Intrusion Detection System / Intrusion Protection System
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Intrusion Detection System / Intrusion Protection System
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won’t IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
D. DMZ Implementation
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed DMZ Implementation
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
E. Physical Security Measures
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Physical Security Measures
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
F. Additional Network Security Measures
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Measures
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
A. Network and Cloud Based Storage
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the network and cloud based storage. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network and Cloud Based Storage
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions. Is it worthwhile to consider outsourcing some or all of the classrooms? Have all the costs been considered?
B. Data Protection and Backup
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the data protection and backup. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Data Protection and Backup
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Consider disaster recovery and options available for conducting classes, but also day to day operations of the offices. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
C. Network Monitoring
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to network monitoring. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Monitoring
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What monitoring systems are available and of them which would be the most advantageous for the UMUC to implement? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
D. Log Storage and Management
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the log storage and management. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Log Storage and Management
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What aggregating and analysis solutions are there and which one is best to choose from for UMUC? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
E. Troubleshooting Methodology
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the troubleshooting methodology. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Troubleshooting Methodology
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Present the isolation method for equipment and how you could find one bad end point or a cable that is bad between classroom 1 and the IT server closet. Student should be specific when discussing the methods, test equipment, and results.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Network Design Proposal:
Network Addressing &
Security (Part 2)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
!
!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
Part A: IP Addressing
Proposed Subnet
Subnet Description Required Hosts
Classroom 1 (First Floor) 25 Computers
Classroom 2 (First Floor) 25 Computers
Classroom 4 (First Floor) 25 Computers
Classroom 1 (Second Floor) 25 Computers
Classroom 5 (Second Floor) 25 Computers
Office 5 – Admissions (Second Floor) 25 Computers
Student Computer Lab 25 Computers
Library 15 Computers
Subnet Network Address Host Address Range Broadcast
Address
Subnet Mask: 255.255.255.0
Classroom 1
(First Floor)
192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31
Classroom 2
(First Floor)
192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63
Classroom 4
(First Floor)
192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95
Classroom 1
(Second Floor)
192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127
Classroom 5
(Second Floor)
192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159
Office 5 –
Admissions
(Second Floor)
192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191
Student
Computer Lab
192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223
Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255
Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Part B: Security
C.) Firewall: Network Based – Cisco ASA 5540 Series $3000
A Firewall is a device that secures a network from intruders. It acts as a lock between the
internet and a LAN requiring all traffic from the internet to pass through the firewall before
accessing any device within the network. There are two different types of firewalls: a host
based, which is a built in firewall that runs on a server or a network based, which is a hardware
appliance. For this campus, a network based firewall was chosen because they offer a stronger
defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)
5540 series firewall is an identity-based network firewall which allows certain users and groups
to access the network. This enables simplified policy configuration, so administrators can write
policies that correspond to business rules—for increased security, enhanced ease of use, and
fewer policies to manage. [1]
D.) IDS vs. IPS
An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from
accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs
advanced IPS software that provides proactive, full-featured intrusion prevention services to stop
malicious traffic, including worms and viruses, before they can affect a network. [1] For the
security of the University, the IPS module is the best option. An IDS (Intrusion Detection
System) wouldn’t prevent the malicious software from entering the network, which would be
detrimental to the University. Protecting University hardware and devices from cyber threats and
malware is one of the most important requirements of network security officer.
E.) DMZ
A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private
network and an untrusted network such as the internet. [2] A DMZ zone is a network
configuration designed to segregate computers on each side of a firewall. A commercial DMZ
creates a separate subnet outside of the firewall containing one or multiple computers to better
protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the
DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be
established using one or two firewalls. The single firewall solution uses multiple interfaces to
create multiple DMZ’s with multiple security zones. Each security zone can be created for
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
different levels of security: low, medium and high and anything in between. [2] For the
University campus, the best option is to create the DMZ’s using the existing hardware which is
the Cisco ASA firewall.
F.) Physical Security
Physical security is protection of the University’s information assets, IT services and
resources as well as ensuring safety of faculty and students. Physical security requires three
different areas of focus: prevention, detection and recovery. Prevention is key in any type of
security outline. It is easier to prevent an attack than it is to recover from an attack. [2]
Protecting the perimeter of the network and making sure the network is extremely difficult to
access helps prevent an attacker from attempting to breach the security in place. If a breach
occurs, being able to detect who breached the network and when, what was accessed and if it is
missing or damaged is of utmost importance. Finally, how a network recovers is paramount after
a breach to prevent any additional occurrences. If the network is breached, a review of the
physical security policy is required to determine how the breach occurred and if the security
profile has been sufficiently hardened. After review of the security policies in place, the
weakness allowing the breach should be corrected to prevent future attacks on the network. [2]
Protecting the buildings with S2 NetBox Online cloud-based access control system works
with existing infrastructure and peripheral devices allowing for seamless integration. The S2
System is scalable and allows the integration of third party access control devices such as the
Sargent Assa Abloy door locks.
The first step to take in physical security is protecting the buildings themselves with
Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever
and mortise box, the Harmony lock includes all access control capabilities such as card reader,
door position switch and request to exit monitoring sensors. The hardware is compatible will all
popular access control systems, such as the S2 NetBox Online system, and supports a variety of
openings while industry leading Grade 1 hardware offers the highest degree of physical security
available in access control locks. [5] These locks and the access control system will allow IT
professionals and administrators to prevent unauthorized access into the buildings on campus.
The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These
locks provide a cost-effective, future-proof solution for the campus while providing simultaneous
support for multiple credentials and offers an easy migration path to higher security credentials
and mobile access. [5] In addition to the locks, each faculty member will be assigned an access
card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
The interior and exterior doors will automatically lock at 8pm every night, barring entrance with
the exception of faculty with access cards. The doors will re-open at 8am every morning, again
with the exception of faculty access cards which will be permitted to access the buildings at any
time. The doors will allow exit with the request to exit monitoring sensors.
For access to the computers, each student will be given a username and password, which
will expire every 90 days. Students are permitted to access the buildings between the hours of
8am and 8pm. The students will only be able to access the network based computers with a
student log-in and password, provided by administration at time of registration. The password
will expire at the end of every semester and will only renew if the student is in good academic
standing, academically and financially.
The second step in physical security is protecting the perimeter of the buildings with
video surveillance of all exits and entrances within the two buildings. There should also be video
surveillance in common areas such as the lobby and stairways, the computer lab and library and
placed strategically throughout the hallways in both buildings. Surveillance should also be
placed outside the buildings on the lamp posts along the pathways connecting the two buildings.
The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision
bullet style surveillance cameras will be installed throughout the two new campus buildings.
They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an
83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night
vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be
placed in each building connecting all the cameras together. Each switch will cost $280 and will
be connected to the router and the router connected to the Network Video Recorder (NVR). The
NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of
incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6
terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on
all 32 channels. One benefit of using a 4K security system is the additional resolution needed
during an incident, which will offer the best chance to capture useful evidence such as distinct
facial features. [6]
This hardware will be used to provide optimal security on the University campus. The
electronic locks will be used to help prevent a physical security breach in one of the buildings.
The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying
to gain access to the buildings without authorization. The cameras are also used for detection
and recovery as they will record any nefarious acts, which will help law enforcement or
administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
recovery portion of physical security because they will provide administrators with a visual
account of the security breach as it is happening. This will help administrators implement new
policies and procedures to prevent future breaches in security. [2]
G.) Network Security Measures
Social engineering is an attempt to fraudulently access sensitive data from a user. Social
engineering is primarily accomplished by a person masquerading as someone the user trusts, then
asking for personal information such as passwords, usernames, bank account information and
social security numbers to name a few. Two different types of social engineering are used:
passive and active. Passive social engineering takes advantage of the unintended actions of a
user to gather information while active involves the user directly. [2] These types of attacks can
be prevented by implementing a social engineering policy. That policy would include bi-annual
mandatory training for all faculty, including IT professionals and administrators and students.
Faculty and students should also be tested by an outside third party to see if they fall prey to a
social engineering scam. These kinds of tests help keep the user on their toes and less
susceptible to a social engineering attack. The policy should also state users must comply with
the rules in regards to social engineering such as: do not open attachments from unknown users,
do not provide anyone with sensitive information, online transactions should only be made on
websites that use the https protocol and do not trust anyone requesting personal or sensitive
information. [7]
Malware, or malicious software, is a type of computer program designed to infect a
computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or
spyware. Protection against students or faculty willingly or unwillingly infecting computers with
malware starts with personal vigilance by training on social engineering techniques and
prevention. The requirement of a username to log-in to a computer for all students and faculty
can also protect against unintended malware infection by a student or faculty member. If a
student or faculty member intends to infect a computer with malware, knowing they will be
caught due to the required log-in may be a deterrent.
A computer’s second layer of defense against malware is through malware security
protection known as a host based intrusion detection system (IDS) or antivirus software.
Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will
periodically scan the computer and its files to detect and defeat malware. In addition, the
antivirus software can recognize and warn against previously unknown malware threats based on
technical features of the malware and warn against suspicious websites. Kaspersky was chosen
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
for the University because it is easy to use and install and its effective. There is no such thing as
100% protection against malware, but with personal vigilance and antivirus software, a computer
is as protected as it can be. [8]
H.) UMUC’s Liability Policy
Personal devices may be used on the wireless LAN with the acceptance of the BYOD
policy. The policy will be accepted by each user as he/she logs onto the WLAN with their
device. The end user will not be able to access the network without checking the “accept” button
on the login page. The BYOD policy will state that all personal devices logged into the network
will keep screen locks on, use device-tracking software and notify the college immediately if a
device is lost so that IT can wipe it clean. This will prevent sensitive information on the network
from ending up in the wrong hands. All students and faculty must also electronically sign a
document stating they will upload and maintain antivirus software on their device. [9] If the
end user does not comply with these requirements, he/she will not be allowed to participate in
the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a
device while connected to the network or the guest WiFi.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
References:
[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/
dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/
at_a_glance_c45-675579 .
[2] LabSim Network Pro. TestOut, 2016.
[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,
Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-
networking-816407.
[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,
Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/
connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.
[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:
http://www.sargentlock.com/products/product_overview.php?item_id=1878.
[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].
Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-
night-vision/LNB4163BW-1-p.
[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,
Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-
attacks-common-techniques-how-prevent-attack.
[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-
protect-against-it.
[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive
Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-
byod-campus.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579
https://www.lifewire.com/demilitarized-zone-computer-networking-816407
https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/
http://www.sargentlock.com/products/product_overview.php?item_id=1878
4MP High Definition IP Camera with Color Night Vision
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Network Design Proposal:
Network Addressing &
Security (Part 2)
Prepared for:
University of Maryland University College
Prepared by:
Kellie Keiser
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
!
!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
Part A: IP Addressing
Proposed Subnet
Subnet Description Required Hosts
Classroom 1 (First Floor) 25 Computers
Classroom 2 (First Floor) 25 Computers
Classroom 4 (First Floor) 25 Computers
Classroom 1 (Second Floor) 25 Computers
Classroom 5 (Second Floor) 25 Computers
Office 5 – Admissions (Second Floor) 25 Computers
Student Computer Lab 25 Computers
Library 15 Computers
Subnet Network Address Host Address Range Broadcast
Address
Subnet Mask: 255.255.255.0
Classroom 1
(First Floor)
192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31
Classroom 2
(First Floor)
192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63
Classroom 4
(First Floor)
192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95
Classroom 1
(Second Floor)
192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127
Classroom 5
(Second Floor)
192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159
Office 5 –
Admissions
(Second Floor)
192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191
Student
Computer Lab
192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223
Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255
Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Part B: Security
C.) Firewall: Network Based – Cisco ASA 5540 Series $3000
A Firewall is a device that secures a network from intruders. It acts as a lock between the
internet and a LAN requiring all traffic from the internet to pass through the firewall before
accessing any device within the network. There are two different types of firewalls: a host
based, which is a built in firewall that runs on a server or a network based, which is a hardware
appliance. For this campus, a network based firewall was chosen because they offer a stronger
defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)
5540 series firewall is an identity-based network firewall which allows certain users and groups
to access the network. This enables simplified policy configuration, so administrators can write
policies that correspond to business rules—for increased security, enhanced ease of use, and
fewer policies to manage. [1]
D.) IDS vs. IPS
An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from
accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs
advanced IPS software that provides proactive, full-featured intrusion prevention services to stop
malicious traffic, including worms and viruses, before they can affect a network. [1] For the
security of the University, the IPS module is the best option. An IDS (Intrusion Detection
System) wouldn’t prevent the malicious software from entering the network, which would be
detrimental to the University. Protecting University hardware and devices from cyber threats and
malware is one of the most important requirements of network security officer.
E.) DMZ
A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private
network and an untrusted network such as the internet. [2] A DMZ zone is a network
configuration designed to segregate computers on each side of a firewall. A commercial DMZ
creates a separate subnet outside of the firewall containing one or multiple computers to better
protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the
DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be
established using one or two firewalls. The single firewall solution uses multiple interfaces to
create multiple DMZ’s with multiple security zones. Each security zone can be created for
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
different levels of security: low, medium and high and anything in between. [2] For the
University campus, the best option is to create the DMZ’s using the existing hardware which is
the Cisco ASA firewall.
F.) Physical Security
Physical security is protection of the University’s information assets, IT services and
resources as well as ensuring safety of faculty and students. Physical security requires three
different areas of focus: prevention, detection and recovery. Prevention is key in any type of
security outline. It is easier to prevent an attack than it is to recover from an attack. [2]
Protecting the perimeter of the network and making sure the network is extremely difficult to
access helps prevent an attacker from attempting to breach the security in place. If a breach
occurs, being able to detect who breached the network and when, what was accessed and if it is
missing or damaged is of utmost importance. Finally, how a network recovers is paramount after
a breach to prevent any additional occurrences. If the network is breached, a review of the
physical security policy is required to determine how the breach occurred and if the security
profile has been sufficiently hardened. After review of the security policies in place, the
weakness allowing the breach should be corrected to prevent future attacks on the network. [2]
Protecting the buildings with S2 NetBox Online cloud-based access control system works
with existing infrastructure and peripheral devices allowing for seamless integration. The S2
System is scalable and allows the integration of third party access control devices such as the
Sargent Assa Abloy door locks.
The first step to take in physical security is protecting the buildings themselves with
Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever
and mortise box, the Harmony lock includes all access control capabilities such as card reader,
door position switch and request to exit monitoring sensors. The hardware is compatible will all
popular access control systems, such as the S2 NetBox Online system, and supports a variety of
openings while industry leading Grade 1 hardware offers the highest degree of physical security
available in access control locks. [5] These locks and the access control system will allow IT
professionals and administrators to prevent unauthorized access into the buildings on campus.
The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These
locks provide a cost-effective, future-proof solution for the campus while providing simultaneous
support for multiple credentials and offers an easy migration path to higher security credentials
and mobile access. [5] In addition to the locks, each faculty member will be assigned an access
card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
The interior and exterior doors will automatically lock at 8pm every night, barring entrance with
the exception of faculty with access cards. The doors will re-open at 8am every morning, again
with the exception of faculty access cards which will be permitted to access the buildings at any
time. The doors will allow exit with the request to exit monitoring sensors.
For access to the computers, each student will be given a username and password, which
will expire every 90 days. Students are permitted to access the buildings between the hours of
8am and 8pm. The students will only be able to access the network based computers with a
student log-in and password, provided by administration at time of registration. The password
will expire at the end of every semester and will only renew if the student is in good academic
standing, academically and financially.
The second step in physical security is protecting the perimeter of the buildings with
video surveillance of all exits and entrances within the two buildings. There should also be video
surveillance in common areas such as the lobby and stairways, the computer lab and library and
placed strategically throughout the hallways in both buildings. Surveillance should also be
placed outside the buildings on the lamp posts along the pathways connecting the two buildings.
The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision
bullet style surveillance cameras will be installed throughout the two new campus buildings.
They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an
83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night
vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be
placed in each building connecting all the cameras together. Each switch will cost $280 and will
be connected to the router and the router connected to the Network Video Recorder (NVR). The
NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of
incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6
terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on
all 32 channels. One benefit of using a 4K security system is the additional resolution needed
during an incident, which will offer the best chance to capture useful evidence such as distinct
facial features. [6]
This hardware will be used to provide optimal security on the University campus. The
electronic locks will be used to help prevent a physical security breach in one of the buildings.
The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying
to gain access to the buildings without authorization. The cameras are also used for detection
and recovery as they will record any nefarious acts, which will help law enforcement or
administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
recovery portion of physical security because they will provide administrators with a visual
account of the security breach as it is happening. This will help administrators implement new
policies and procedures to prevent future breaches in security. [2]
G.) Network Security Measures
Social engineering is an attempt to fraudulently access sensitive data from a user. Social
engineering is primarily accomplished by a person masquerading as someone the user trusts, then
asking for personal information such as passwords, usernames, bank account information and
social security numbers to name a few. Two different types of social engineering are used:
passive and active. Passive social engineering takes advantage of the unintended actions of a
user to gather information while active involves the user directly. [2] These types of attacks can
be prevented by implementing a social engineering policy. That policy would include bi-annual
mandatory training for all faculty, including IT professionals and administrators and students.
Faculty and students should also be tested by an outside third party to see if they fall prey to a
social engineering scam. These kinds of tests help keep the user on their toes and less
susceptible to a social engineering attack. The policy should also state users must comply with
the rules in regards to social engineering such as: do not open attachments from unknown users,
do not provide anyone with sensitive information, online transactions should only be made on
websites that use the https protocol and do not trust anyone requesting personal or sensitive
information. [7]
Malware, or malicious software, is a type of computer program designed to infect a
computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or
spyware. Protection against students or faculty willingly or unwillingly infecting computers with
malware starts with personal vigilance by training on social engineering techniques and
prevention. The requirement of a username to log-in to a computer for all students and faculty
can also protect against unintended malware infection by a student or faculty member. If a
student or faculty member intends to infect a computer with malware, knowing they will be
caught due to the required log-in may be a deterrent.
A computer’s second layer of defense against malware is through malware security
protection known as a host based intrusion detection system (IDS) or antivirus software.
Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will
periodically scan the computer and its files to detect and defeat malware. In addition, the
antivirus software can recognize and warn against previously unknown malware threats based on
technical features of the malware and warn against suspicious websites. Kaspersky was chosen
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
for the University because it is easy to use and install and its effective. There is no such thing as
100% protection against malware, but with personal vigilance and antivirus software, a computer
is as protected as it can be. [8]
H.) UMUC’s Liability Policy
Personal devices may be used on the wireless LAN with the acceptance of the BYOD
policy. The policy will be accepted by each user as he/she logs onto the WLAN with their
device. The end user will not be able to access the network without checking the “accept” button
on the login page. The BYOD policy will state that all personal devices logged into the network
will keep screen locks on, use device-tracking software and notify the college immediately if a
device is lost so that IT can wipe it clean. This will prevent sensitive information on the network
from ending up in the wrong hands. All students and faculty must also electronically sign a
document stating they will upload and maintain antivirus software on their device. [9] If the
end user does not comply with these requirements, he/she will not be allowed to participate in
the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a
device while connected to the network or the guest WiFi.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
References:
[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/
dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/
at_a_glance_c45-675579 .
[2] LabSim Network Pro. TestOut, 2016.
[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,
Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-
networking-816407.
[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,
Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/
connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.
[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:
http://www.sargentlock.com/products/product_overview.php?item_id=1878.
[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].
Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-
night-vision/LNB4163BW-1-p.
[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,
Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-
attacks-common-techniques-how-prevent-attack.
[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-
protect-against-it.
[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive
Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-
byod-campus.
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324
https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579
https://www.lifewire.com/demilitarized-zone-computer-networking-816407
https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/
http://www.sargentlock.com/products/product_overview.php?item_id=1878
4MP High Definition IP Camera with Color Night Vision
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus
https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2
Network
Design Proposal Template
Network Design Proposal
Prepared for:
University of Maryland University
C
ollege
Prepared by:
Student Name
I. Network Design
A
. Network Topology
Technical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information,
feel free to ask your instructor or make some assumptions
. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example (
Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, wellbeing, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).
Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution
.
B
e specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (
https://www.draw.io
) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.
Example (
Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Furthermore, you must include a chart comparing and contrasting the different options available to meet the requirement. An example is provided below and should be used as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).
The following business case analysis show the three potential hardware solutions to the requirement provided. The visual presents the ability for the reader to understand the variables considered during the analysis of the three potential hardware solutions.
[The requirements are on the top row. The green in the table shows options that meet requirements, red does not, and blue exceeds requirements. As you can see in the above table, not all requirements can be met. You will need to explain in your Justification why the selection you made gives the school the best available option for the cost. The options that meet or exceed the requirements may cost too much. Your job is to decide what the best option is and present it to management. So, based on the requirements, which phone would you select for meeting those requirements at the least cost?]
Justification
This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.
Example (
Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).
B. Cables and Connectors
Note: (Students should consider the needs for both a wired and wireless implementation as your proposal should include both.)
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Cables and Connectors
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students
C. Networking and Internetworking Hardware
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Networking and Internetworking Devices
This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
D. Wide Area Network (WAN) Design
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Wide Area Network (WAN) Design
This section should be used to provide the details of your proposed Internet Service Provider (ISP) solution. Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Students should connect to the ISP with two different technologies. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
E. Computer Systems Hardware
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Computer Systems Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
A. Subnetting
Overview
Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).
We have been assigned the network address
192.168.22.0
. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.
Class |
Octet Decimal Range |
|
A |
1 – 126 |
|
B |
128 – 191 |
|
C |
192 – 223 |
Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.
Subnet Mask |
Format |
255.0.0.0 |
Network.Host.Host.Host |
255.255.0.0 |
Network.Network.Host.Host |
255.255.255.0 |
Network.Network.Network.Host |
CIDR (Classless Inter Domain Routing)
CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.
· Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation, it would be written as /8, means address has 8 bits on.
· Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation, it would be written as /16, means address has 16 bits on.
· Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation, it would be written as /24, means address has 24 bits on.
Technical Requirements
UMUC has not decided how they will use all of the physical space within the newly leased building, but the diagrams below convey the proposed end state. However, they have decided to use some of the space in the short term. In doing so, we will proceed with the proposed plan. Initially, the building will house
5 classrooms, 1 student computer lab, 1 library, and 1 office
.
· In the below building diagrams, we will use Office 5 (Admissions) on the first floor. Each office will have 1 computer for staff use, with the exception of the admissions office, which will have 5 computers. Based on the subnetting performed above, we may be able to add more devices in the future.
· The classrooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each classroom will have a closet. Each classroom will have 25 devices: 23 student computers, 1 instructor computer, and 1 server in the closet, for instructional use.
· Students should consider high traffic areas for Wi-Fi, such as the sitting areas and not the classrooms. The Wi-Fi network should be segregated from the wired network and implemented on a separate Class C network. What will the network address, range, and broadcast address for this separate Class C wireless address be?
· In addition, there will be a student computer lab that will provide computer access to students to do their homework. The student computer lab is located on the second floor. There will be 24 computers in this lab and 1 server in the closet.
· To allow students access to library resources, the library will also have 10 computers for the general public to use and 5 computers for library staff.
· There will be two server rooms, one on the first floor and one on the second floor.
To be clear, the diagram below conveys the proposed end state.
Given the aforementioned scenario, we are going to use the 192.168.3.0 network and create a total of 8 subnets, with 25 possible hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.
Subnet Description |
Required Hosts |
|||||||
Classroom 1 (First Floor) |
25 Computers |
|||||||
Classroom 2 (First Floor) |
||||||||
Classroom 4 (First Floor) |
||||||||
Classroom 1 (Second Floor) |
||||||||
Classroom 5 (Second Floor) |
||||||||
Office 5 – Admissions (Second Floor) |
||||||||
Student Computer Lab |
||||||||
Library |
15 Computers |
Note: Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.
Proposed Subnet
Subnet |
Network Address |
Host Address Range |
Broadcast Address |
|||||||||||
Subnet Mask: 255.255.255. ___ |
||||||||||||||
192.168.22.0 |
192.168.22.1 – 192.168.22.30 |
192.168.22.31 |
||||||||||||
192.168.22. _ |
192.168.22. _ – 192.168.22. _ |
|||||||||||||
Classroom 4 (First Floor) | ||||||||||||||
192.168.22.96 |
192.168.22.97 – 192.168.22.126 |
192.168.22.127 |
||||||||||||
192.168.22.128 |
192.168.22.129 – 192.168.22.158 |
192.168.22.159 |
||||||||||||
Wi-Fi Network |
192.__. __.__ |
192._._. _ – 192._._. _ |
192._._. _ |
B. Firewall Implementation
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Firewall Implementation
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
C. Intrusion Detection System / Intrusion Protection System
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Intrusion Detection System / Intrusion Protection System
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won’t IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
D. DMZ Implementation
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed DMZ Implementation
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
E. Physical Security Measures
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Physical Security Measures
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
F. Additional Network Security Measures
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Measures
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
A. Network and Cloud Based Storage
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the network and cloud based storage. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network and Cloud Based Storage
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions. Is it worthwhile to consider outsourcing some or all of the classrooms? Have all the costs been considered?
B. Data Protection and Backup
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the data protection and backup. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Data Protection and Backup
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Consider disaster recovery and options available for conducting classes, but also day to day operations of the offices. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
C. Network Monitoring
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to network monitoring. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Monitoring
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What monitoring systems are available and of them which would be the most advantageous for the UMUC to implement? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
D. Log Storage and Management
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the log storage and management. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Log Storage and Management
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What aggregating and analysis solutions are there and which one is best to choose from for UMUC? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
E. Troubleshooting Methodology
Technical Requirements
In this section, you will assess UMUC’s technical requirements
related to the troubleshooting methodology. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Troubleshooting Methodology
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Present the isolation method for equipment and how you could find one bad end point or a cable that is bad between classroom 1 and the IT server closet. Student should be specific when discussing the methods, test equipment, and results.
Justification
This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.