Order 1548415: Network Design

Proposalanswerspart33 Proposalanswerspart31 Propsalanswerspart23 Propsalanswerspart22 Proposalanswerspart32 Proposalanswerspart3 NetworkDesignProposalTemplate xPropsalanswerspart2 Propsalanswerspart21 NetworkDesignProposalTemplaterevised x
 

  • Type of paperOther
  • SubjectTechnology
  • Number of pages4
  • Format of citationOther
  • Number of cited resources4
  • Type of serviceWriting

Follow the template. Finish 2 sections. Look at 2 documents I uploaded. This is EASY. I need this in 6-8 Hours bu today MAX. NO HEADERS OR COVER Please. Do well and I will hire you for NEXT Paper to $ INSTRUCTIONS – Re-word and rewrite the Answers to the 2 documents I uploaded titled ″proposal answers part 2. You have to do NO RESEARCH. Just Re-Write. Make it in your OWN WORDS. MAKE IT SOUND ORIGINAL. ANSWER ALL LETTERS IN TEMPLATE. – The answers are in the 2 PDF again. Just put it own words. Find 4 NEW sources to cite do not use all same sources as PDF. IEEE-style format for sources references Background You have been hired as part of the networking team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project. The university has recently leased a single building in Adelphi, Maryland. The building will house faculty and administrative offices, classrooms, a library, and computer labs. Security is important at UMUC, as the university has a responsibility to protect student and employee data as well as any intellectual property that UMUC maintains on its servers and computers. IT management would like to review multiple proposals to determine how best to address the university’s specific security issues. As a junior network engineer, you are asked to prepare a network proposal that addresses how best to establish a secure network infrastructure to support university operations in the newly-leased building. The proposal requires three submissions covering network design, network addressing and security, and network customization and optimization. The network proposal represents a great opportunity to document your expertise. It is also an opportunity for you to gain an integrated view of the different aspects of networking that you will be asked about in the certification exam.′

Don't use plagiarized sources. Get Your Custom Essay on
Order 1548415: Network Design
Just from $13/Page
Order Essay

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 3

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal:

Network Customization &

Optimization (Part 3)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal Part 3

A.) Identify Network Services

The University needs to function like a well oiled machine, and the implementation of

certain network services will help make that possible. In order to fully create a client-server

network model, servers must be used so the client, or the user, can access the services they need

on the network. The main services UMUC requires are: email, online/internet access and file

and print sharing services. [1]

An email server is used to send and receive emails. The Microsoft Exchange server

works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server

also preforms functions such as collaboration features which allows faculty to create tasks and

meetings from the calendar portion of the software. It also provides video and audio

conferencing and instant messaging (IM) services. A web server is a server computer running

software enabling a computer to host a web page. One of the more popular web servers today is

an Apache web server, which will be used for the University. One of the most important

functions of a server operating system is sharing resources between users. A file server is a

computer used specifically for centralized file storage with the ability to share the files between

computers and other devices on the network. A print server is a computer utilized specifically

for sharing printers on the network. The sole purpose of a print server is to collect the files and

documents sent to a printer by a user on the network, send the document to a printer on the

network at which point the printer would print it out. [2]

B.) Additional Servers or Network Devices

In addition to email, internet access, file and print servers, UMUC will also require a

directory service, a Domain Controller and DHCP server. A directory service stores user and

computer profiles and access privileges on the domain controller (DC). It can be used to

authenticate and authorize users to allow secure access to internet services and applications. [3]

The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server

2016 software and will be utilized for the UMUC network. ADDS is installed on a domain

controller, which authenticates users and controls access in a network, enforces security policies

and installs and updates software for all computers on the network. [4] A separate server will be

needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will

need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and

the scopes configured. [5]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP

settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or

device on the network. It also keeps track of all the IP addresses already in use on the network to

avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft

Windows Server 2016 software and will be utilized for the UMUC network.

C.) Security Measures

Security measures start with the user. User accounts are granted access to certain

network resources by the system administrator and they are secured using a password.

Therefore, making sure those user accounts have excellent passwords by implementing a

password policy is top priority when maintaining network security. [2]. A one-factor

authentication method requiring a username and password as well as a log-in pass phrase would

be sufficient for students logging into the network. Faculty will require a two-factor

authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide

a password or a pass phrase or cognitive information such as mother’s maiden name and the city

in which you were born. Faculty members will be required to enter a password to log onto the

network just like the students. Additionally, they will be required to use a type 2 form of

authentication such as an access card to enter the building during “off” hours which are 8pm

through 8am and to enter their office. [1]. The password will need to be strong, which will

require enforcement of strict password guidelines. Each user should create a password containing

8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be

changed every 90 days and a user cannot use the same password twice within a year.

In addition to strong authentication a vulnerability scanner needs to be purchased and

implemented on the network, which will be ran by the network administrator on a weekly basis.

A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running

applications or services, missing critical patches across all platforms, user accounts that have not

been disabled, default or blank passwords, misconfigurations and missing security controls.

Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline

Security Analyzer (MBSA) will be downloaded. [1]

SSH (Secure Shell) Protocol is software that enables secure system administration

and file transfers over insecure networks. Encryption of all user authentications, commands,

output and file transfers is used to secure the connection between a client and a server and to

prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise

grade SSH and will be implemented on the network. It protects organizations against internal and

external attacks on user identities, password or login credential theft and data theft and allows

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

automated secure processes for remote command execution and file transfer. In addition to the

Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement

a controlled provisioning process, termination process and assists in the discovery and

remediation of existing keys. The Universal SSH key manager is required to maintain

government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST

800-53. [6]

D.) Justification for Additional Servers and security measures

ADDS on the Domain Controller is a necessity for a college campus like UMUC

primarily due to the security measures it provides. An administrator alone would not be able to

keep track of every employee and their access rights and every student as well as every guest

device. The domain controller works as an invisible administrator for all end users on the

network, providing or denying access resourced on the network. These resources include

everything from email, the Learning Management System

A DHCP server automatically configures the IP address for every device on the network

which ensures a valid, unique IP address for each and every device. DHCP also automatically

configures devices as they are added and dropped from the network which is a big help to a

network administrator. Configuring IP addresses statically would be a mistake for any network

larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server

is the best option to prevent connectivity issues and troubleshooting issues. [2]

A DNS server maps the logical name to its IP address. It is a necessity on a network with

internet access because it translates the IP address into the URL and vice versa. [1] Users on a

network are not going to remember an IP address but they will remember a website name like

www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case

the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016

software and the other is configured through the router, it could prevent possible connectivity

issues on the network.

A vulnerability scanner is required because it helps to maintain a network and its devices

without having to employ an entire IT department. Being able to run a scan periodically to check

for any vulnerabilities on the network is simple and cost-effective when compared to paying

additional salaries and benefits.

SSH software and key management is required to secure the Universities network using

encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism

requiring users to authenticate before they are able to transmit data over the transmission

channels within the UMUC network. This prevents unauthorized users from accessing data on

the network. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://UMUC.edu

E.) Network Storage and Cloud Based Services

A network attached storage (NAS) device will be used for additional file storage on the

network. The NAS will be placed directly to the network through a switch using a wired

interface. The NAS provides better performance because its sole purpose is file storage. The

NAS is a viable option because it can be integrated into an existing network and the active

directory. This prevents IT from having to configure duplicate accounts for each user as they will

authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The

switch connecting the NAS will maintain two separate VLANs, one for professors and one for

administrators. This will prevent professors from accessing protected information such as

financial data, social security numbers, etc.

The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless

Network Attached Storage will be implemented onto the network. It provides 80TB of storage

with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core

processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-

virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as

well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately

$2000. [10]

A private cloud will be implemented for the students and faculty at UMUC. A private

cloud provides flexibility of access, ease of use and allows users to provision their own

resources. [1] The private cloud will house the Learning Management System to be used by both

faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect

infrastructure and applications between cloud based computing and existing on premises

infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide

users with the Learning Management System while not having to worry about software

maintenance, capacity planning or patching. [7] The monthly average cost of a large web

application on Amazon Cloud services is $1000.

F.) Data Protection and Back-up Implementation

Data protection is the process of safeguarding information from corruption, compromise

or loss through operational backup of data. Data protection also includes business continuity/

disaster recovery which ensures the recovery of data quickly after a loss. There are two main

areas of data management: Data Lifecycle Management and Information Lifecycle Management.

Data lifecycle management automatically moves critical data from online to offline storage.

Information lifecycle management is a strategy for valuing, cataloging and protecting

information assets from application and user errors, malware and virus attacks, machine failure,

or facility outages and disruptions.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://searchmidmarketsecurity.techtarget.com/definition/malware

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Continuous Data Protection (CDP) is a form of data replication that backs up data as

changes are made. With CDP, a system or network can be restored to any previous point in time

which is extremely useful after corruption or data loss. A true CDP systems records every

change and stores it in a log. If a physical system failure occurs, the CDP system will keep all

changes up to the last write before failure, then you can restore the system prior to any

corruption. CDP can be implemented via software running on a server or as a hardware

appliance. For UMUC, the software option that will be implemented is the Dell EMC Data

Protection Suite Enterprise Edition. The software will be placed on a server and the data will be

stored in separate locations: the cloud and on a physical storage device or server. The software

will be accessible to all faculty, students and administrators connected to the UMUC network. [8]

The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.

G.) Network Monitoring Solution

Network monitoring is a service conducted by software in conjunction with the network

administrator and/or an IT department to constantly monitor a network for possible outages or

failures. A network monitoring system is implemented to ensure the availability and

performance of all devices and components on the network by implementing software to search

for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be

implemented for network monitoring. It is rated one of the best network monitoring softwares of

2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,

temperature, fan and other hardware, monitors PoE loads, wireless access points and interface

metrics. Monitoring a network is critical because it detects, monitors and analyzes the network

while examining applications and devices in real time which allows IT to respond quickly. [9]

A packet sniffer can also be used on the system to capture data being transmitted on a

device or over a network. Once all the data is captured, the packet sniffer holds the data until it

can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly

what is being sent to the device. This is a useful tool because it can help prevent attacks to a

specific device on the network. Once it is determined the device should not be receiving a

certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s

packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port

sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,

P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).

It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of

data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the

software maintenance fee will be renewed at 25% of the current list price of the original license.

[11]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.paessler.com/ftp-monitoring

https://www.paessler.com/ssh_monitoring

H.) Storage and Management of Logs

System logs are extremely important because they provide a snapshot of all the events

that occurred on the system. The log entries are generated by the operating system and any other

applications running on the system. A log entry could be caused by a variety of events including,

failed login attempts or a change to the system. Each log is created and stored on each device on

the network. Implementing centralized logging is the best way to review what’s happening on

the system because all the logging files from all devices on the network end up in a centralized

device, most often the logging server also known as the Syslog server. [1] Since Windows

servers do not contain a version of syslog process, Datagram SyslogServer Suite will be

downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file

analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store

the logs in a SQL database through the Amazon Rational Database Service (RDS) on the

Amazon cloud previously implemented. The IT administrator will then review the analysis and

make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost

approximately $900 for 5000 IP addresses. [12]

I.) IT Troubleshooting Methodology

The troubleshooting methodology that will be used by IT personnel at UMUC is as

follows:

• Identify the problem by making a list of the symptoms and identifying who is

experiencing those symptoms. Check for changes that occurred prior to the start of the

symptoms then try to duplicate the problem.

• Establish a theory of probable cause by analyzing the symptoms and determining the

most likely cause. Keep in mind the flow of data through the OSI model. Check for the

most common issues with the list of symptoms reported first.

• Test the theory. If the theory is proven, take the appropriate steps to research fixes to

the problem. If the theory is not proven, start the process over again or escalate the

issue to a supervisor.

• If the theory proven and a resolution found, complete a plan of action.

• After the action plan is complete, implement the solution and a series of tests to

determine if the action plan worked.

• Finally, complete a standard operating procedure guide for this problem in the future

containing any preventative measures. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

References

[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.

[2] D. Lowe, Networking for dummies. .

[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.

[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.

[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].

Available: https://technet.microsoft.com/en-us/library/cc780036(WS.

10).aspx#w2k3tr_ad_over_qbjd.

[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.

[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-

server-2016/.

[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://

www.ssh.com/ssh/.

[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://

aws.amazon.com/types-of-cloud-computing/.

[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:

http://searchdatabackup.techtarget.com/definition/data-protection.

[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].

Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.

[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,

Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-

nas-network-attached-storage/.

[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://

www.paessler.com/prtg/price_list.

[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:

https://www.netadmintools.com/syslog-server/datagram/.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://docs.oracle.com/cd/E19396-01/817-7619/intro.html

https://technet.microsoft.com/en-us/library/cc780036

https://protechgurus.com/configure-dhcp-server-in-windows-

http://www.ssh.com/ssh/

http://aws.amazon.com/types-of-cloud-computing/

http://searchdatabackup.techtarget.com/definition/data-protection

https://www.pcmag.com/article2/0,2817,2495263,00.asp

https://www.omnicoreagency.com/best-

http://www.paessler.com/prtg/price_list

https://www.netadmintools.com/syslog-server/datagram/

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 3

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal:

Network Customization &

Optimization (Part 3)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal Part 3

A.) Identify Network Services

The University needs to function like a well oiled machine, and the implementation of

certain network services will help make that possible. In order to fully create a client-server

network model, servers must be used so the client, or the user, can access the services they need

on the network. The main services UMUC requires are: email, online/internet access and file

and print sharing services. [1]

An email server is used to send and receive emails. The Microsoft Exchange server

works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server

also preforms functions such as collaboration features which allows faculty to create tasks and

meetings from the calendar portion of the software. It also provides video and audio

conferencing and instant messaging (IM) services. A web server is a server computer running

software enabling a computer to host a web page. One of the more popular web servers today is

an Apache web server, which will be used for the University. One of the most important

functions of a server operating system is sharing resources between users. A file server is a

computer used specifically for centralized file storage with the ability to share the files between

computers and other devices on the network. A print server is a computer utilized specifically

for sharing printers on the network. The sole purpose of a print server is to collect the files and

documents sent to a printer by a user on the network, send the document to a printer on the

network at which point the printer would print it out. [2]

B.) Additional Servers or Network Devices

In addition to email, internet access, file and print servers, UMUC will also require a

directory service, a Domain Controller and DHCP server. A directory service stores user and

computer profiles and access privileges on the domain controller (DC). It can be used to

authenticate and authorize users to allow secure access to internet services and applications. [3]

The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server

2016 software and will be utilized for the UMUC network. ADDS is installed on a domain

controller, which authenticates users and controls access in a network, enforces security policies

and installs and updates software for all computers on the network. [4] A separate server will be

needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will

need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and

the scopes configured. [5]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP

settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or

device on the network. It also keeps track of all the IP addresses already in use on the network to

avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft

Windows Server 2016 software and will be utilized for the UMUC network.

C.) Security Measures

Security measures start with the user. User accounts are granted access to certain

network resources by the system administrator and they are secured using a password.

Therefore, making sure those user accounts have excellent passwords by implementing a

password policy is top priority when maintaining network security. [2]. A one-factor

authentication method requiring a username and password as well as a log-in pass phrase would

be sufficient for students logging into the network. Faculty will require a two-factor

authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide

a password or a pass phrase or cognitive information such as mother’s maiden name and the city

in which you were born. Faculty members will be required to enter a password to log onto the

network just like the students. Additionally, they will be required to use a type 2 form of

authentication such as an access card to enter the building during “off” hours which are 8pm

through 8am and to enter their office. [1]. The password will need to be strong, which will

require enforcement of strict password guidelines. Each user should create a password containing

8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be

changed every 90 days and a user cannot use the same password twice within a year.

In addition to strong authentication a vulnerability scanner needs to be purchased and

implemented on the network, which will be ran by the network administrator on a weekly basis.

A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running

applications or services, missing critical patches across all platforms, user accounts that have not

been disabled, default or blank passwords, misconfigurations and missing security controls.

Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline

Security Analyzer (MBSA) will be downloaded. [1]

SSH (Secure Shell) Protocol is software that enables secure system administration

and file transfers over insecure networks. Encryption of all user authentications, commands,

output and file transfers is used to secure the connection between a client and a server and to

prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise

grade SSH and will be implemented on the network. It protects organizations against internal and

external attacks on user identities, password or login credential theft and data theft and allows

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

automated secure processes for remote command execution and file transfer. In addition to the

Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement

a controlled provisioning process, termination process and assists in the discovery and

remediation of existing keys. The Universal SSH key manager is required to maintain

government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST

800-53. [6]

D.) Justification for Additional Servers and security measures

ADDS on the Domain Controller is a necessity for a college campus like UMUC

primarily due to the security measures it provides. An administrator alone would not be able to

keep track of every employee and their access rights and every student as well as every guest

device. The domain controller works as an invisible administrator for all end users on the

network, providing or denying access resourced on the network. These resources include

everything from email, the Learning Management System

A DHCP server automatically configures the IP address for every device on the network

which ensures a valid, unique IP address for each and every device. DHCP also automatically

configures devices as they are added and dropped from the network which is a big help to a

network administrator. Configuring IP addresses statically would be a mistake for any network

larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server

is the best option to prevent connectivity issues and troubleshooting issues. [2]

A DNS server maps the logical name to its IP address. It is a necessity on a network with

internet access because it translates the IP address into the URL and vice versa. [1] Users on a

network are not going to remember an IP address but they will remember a website name like

www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case

the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016

software and the other is configured through the router, it could prevent possible connectivity

issues on the network.

A vulnerability scanner is required because it helps to maintain a network and its devices

without having to employ an entire IT department. Being able to run a scan periodically to check

for any vulnerabilities on the network is simple and cost-effective when compared to paying

additional salaries and benefits.

SSH software and key management is required to secure the Universities network using

encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism

requiring users to authenticate before they are able to transmit data over the transmission

channels within the UMUC network. This prevents unauthorized users from accessing data on

the network. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://UMUC.edu

E.) Network Storage and Cloud Based Services

A network attached storage (NAS) device will be used for additional file storage on the

network. The NAS will be placed directly to the network through a switch using a wired

interface. The NAS provides better performance because its sole purpose is file storage. The

NAS is a viable option because it can be integrated into an existing network and the active

directory. This prevents IT from having to configure duplicate accounts for each user as they will

authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The

switch connecting the NAS will maintain two separate VLANs, one for professors and one for

administrators. This will prevent professors from accessing protected information such as

financial data, social security numbers, etc.

The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless

Network Attached Storage will be implemented onto the network. It provides 80TB of storage

with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core

processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-

virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as

well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately

$2000. [10]

A private cloud will be implemented for the students and faculty at UMUC. A private

cloud provides flexibility of access, ease of use and allows users to provision their own

resources. [1] The private cloud will house the Learning Management System to be used by both

faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect

infrastructure and applications between cloud based computing and existing on premises

infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide

users with the Learning Management System while not having to worry about software

maintenance, capacity planning or patching. [7] The monthly average cost of a large web

application on Amazon Cloud services is $1000.

F.) Data Protection and Back-up Implementation

Data protection is the process of safeguarding information from corruption, compromise

or loss through operational backup of data. Data protection also includes business continuity/

disaster recovery which ensures the recovery of data quickly after a loss. There are two main

areas of data management: Data Lifecycle Management and Information Lifecycle Management.

Data lifecycle management automatically moves critical data from online to offline storage.

Information lifecycle management is a strategy for valuing, cataloging and protecting

information assets from application and user errors, malware and virus attacks, machine failure,

or facility outages and disruptions.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://searchmidmarketsecurity.techtarget.com/definition/malware

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Continuous Data Protection (CDP) is a form of data replication that backs up data as

changes are made. With CDP, a system or network can be restored to any previous point in time

which is extremely useful after corruption or data loss. A true CDP systems records every

change and stores it in a log. If a physical system failure occurs, the CDP system will keep all

changes up to the last write before failure, then you can restore the system prior to any

corruption. CDP can be implemented via software running on a server or as a hardware

appliance. For UMUC, the software option that will be implemented is the Dell EMC Data

Protection Suite Enterprise Edition. The software will be placed on a server and the data will be

stored in separate locations: the cloud and on a physical storage device or server. The software

will be accessible to all faculty, students and administrators connected to the UMUC network. [8]

The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.

G.) Network Monitoring Solution

Network monitoring is a service conducted by software in conjunction with the network

administrator and/or an IT department to constantly monitor a network for possible outages or

failures. A network monitoring system is implemented to ensure the availability and

performance of all devices and components on the network by implementing software to search

for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be

implemented for network monitoring. It is rated one of the best network monitoring softwares of

2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,

temperature, fan and other hardware, monitors PoE loads, wireless access points and interface

metrics. Monitoring a network is critical because it detects, monitors and analyzes the network

while examining applications and devices in real time which allows IT to respond quickly. [9]

A packet sniffer can also be used on the system to capture data being transmitted on a

device or over a network. Once all the data is captured, the packet sniffer holds the data until it

can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly

what is being sent to the device. This is a useful tool because it can help prevent attacks to a

specific device on the network. Once it is determined the device should not be receiving a

certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s

packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port

sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,

P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).

It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of

data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the

software maintenance fee will be renewed at 25% of the current list price of the original license.

[11]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.paessler.com/ftp-monitoring

https://www.paessler.com/ssh_monitoring

H.) Storage and Management of Logs

System logs are extremely important because they provide a snapshot of all the events

that occurred on the system. The log entries are generated by the operating system and any other

applications running on the system. A log entry could be caused by a variety of events including,

failed login attempts or a change to the system. Each log is created and stored on each device on

the network. Implementing centralized logging is the best way to review what’s happening on

the system because all the logging files from all devices on the network end up in a centralized

device, most often the logging server also known as the Syslog server. [1] Since Windows

servers do not contain a version of syslog process, Datagram SyslogServer Suite will be

downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file

analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store

the logs in a SQL database through the Amazon Rational Database Service (RDS) on the

Amazon cloud previously implemented. The IT administrator will then review the analysis and

make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost

approximately $900 for 5000 IP addresses. [12]

I.) IT Troubleshooting Methodology

The troubleshooting methodology that will be used by IT personnel at UMUC is as

follows:

• Identify the problem by making a list of the symptoms and identifying who is

experiencing those symptoms. Check for changes that occurred prior to the start of the

symptoms then try to duplicate the problem.

• Establish a theory of probable cause by analyzing the symptoms and determining the

most likely cause. Keep in mind the flow of data through the OSI model. Check for the

most common issues with the list of symptoms reported first.

• Test the theory. If the theory is proven, take the appropriate steps to research fixes to

the problem. If the theory is not proven, start the process over again or escalate the

issue to a supervisor.

• If the theory proven and a resolution found, complete a plan of action.

• After the action plan is complete, implement the solution and a series of tests to

determine if the action plan worked.

• Finally, complete a standard operating procedure guide for this problem in the future

containing any preventative measures. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

References

[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.

[2] D. Lowe, Networking for dummies. .

[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.

[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.

[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].

Available: https://technet.microsoft.com/en-us/library/cc780036(WS.

10).aspx#w2k3tr_ad_over_qbjd.

[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.

[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-

server-2016/.

[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://

www.ssh.com/ssh/.

[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://

aws.amazon.com/types-of-cloud-computing/.

[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:

http://searchdatabackup.techtarget.com/definition/data-protection.

[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].

Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.

[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,

Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-

nas-network-attached-storage/.

[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://

www.paessler.com/prtg/price_list.

[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:

https://www.netadmintools.com/syslog-server/datagram/.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://docs.oracle.com/cd/E19396-01/817-7619/intro.html

https://technet.microsoft.com/en-us/library/cc780036

https://protechgurus.com/configure-dhcp-server-in-windows-

http://www.ssh.com/ssh/

http://aws.amazon.com/types-of-cloud-computing/

http://searchdatabackup.techtarget.com/definition/data-protection

https://www.pcmag.com/article2/0,2817,2495263,00.asp

https://www.omnicoreagency.com/best-

http://www.paessler.com/prtg/price_list

https://www.netadmintools.com/syslog-server/datagram/

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 2

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Network Design Proposal:

Network Addressing &

Security (Part 2)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

!

!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

Part A: IP Addressing

Proposed Subnet

Subnet Description Required Hosts

Classroom 1 (First Floor) 25 Computers

Classroom 2 (First Floor) 25 Computers

Classroom 4 (First Floor) 25 Computers

Classroom 1 (Second Floor) 25 Computers

Classroom 5 (Second Floor) 25 Computers

Office 5 – Admissions (Second Floor) 25 Computers

Student Computer Lab 25 Computers

Library 15 Computers

Subnet Network Address Host Address Range Broadcast
Address

Subnet Mask: 255.255.255.0

Classroom 1
(First Floor)

192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31

Classroom 2
(First Floor)

192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63

Classroom 4
(First Floor)

192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95

Classroom 1
(Second Floor)

192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127

Classroom 5
(Second Floor)

192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159

Office 5 –
Admissions
(Second Floor)

192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191

Student
Computer Lab

192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223

Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255

Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Part B: Security

C.) Firewall: Network Based – Cisco ASA 5540 Series $3000

A Firewall is a device that secures a network from intruders. It acts as a lock between the

internet and a LAN requiring all traffic from the internet to pass through the firewall before

accessing any device within the network. There are two different types of firewalls: a host

based, which is a built in firewall that runs on a server or a network based, which is a hardware

appliance. For this campus, a network based firewall was chosen because they offer a stronger

defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)

5540 series firewall is an identity-based network firewall which allows certain users and groups

to access the network. This enables simplified policy configuration, so administrators can write

policies that correspond to business rules—for increased security, enhanced ease of use, and

fewer policies to manage. [1]

D.) IDS vs. IPS

An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from

accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs

advanced IPS software that provides proactive, full-featured intrusion prevention services to stop

malicious traffic, including worms and viruses, before they can affect a network. [1] For the

security of the University, the IPS module is the best option. An IDS (Intrusion Detection

System) wouldn’t prevent the malicious software from entering the network, which would be

detrimental to the University. Protecting University hardware and devices from cyber threats and

malware is one of the most important requirements of network security officer.

E.) DMZ

A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private

network and an untrusted network such as the internet. [2] A DMZ zone is a network

configuration designed to segregate computers on each side of a firewall. A commercial DMZ

creates a separate subnet outside of the firewall containing one or multiple computers to better

protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the

DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be

established using one or two firewalls. The single firewall solution uses multiple interfaces to

create multiple DMZ’s with multiple security zones. Each security zone can be created for

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

different levels of security: low, medium and high and anything in between. [2] For the

University campus, the best option is to create the DMZ’s using the existing hardware which is

the Cisco ASA firewall.

F.) Physical Security

Physical security is protection of the University’s information assets, IT services and

resources as well as ensuring safety of faculty and students. Physical security requires three

different areas of focus: prevention, detection and recovery. Prevention is key in any type of

security outline. It is easier to prevent an attack than it is to recover from an attack. [2]

Protecting the perimeter of the network and making sure the network is extremely difficult to

access helps prevent an attacker from attempting to breach the security in place. If a breach

occurs, being able to detect who breached the network and when, what was accessed and if it is

missing or damaged is of utmost importance. Finally, how a network recovers is paramount after

a breach to prevent any additional occurrences. If the network is breached, a review of the

physical security policy is required to determine how the breach occurred and if the security

profile has been sufficiently hardened. After review of the security policies in place, the

weakness allowing the breach should be corrected to prevent future attacks on the network. [2]

Protecting the buildings with S2 NetBox Online cloud-based access control system works

with existing infrastructure and peripheral devices allowing for seamless integration. The S2

System is scalable and allows the integration of third party access control devices such as the

Sargent Assa Abloy door locks.

The first step to take in physical security is protecting the buildings themselves with

Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever

and mortise box, the Harmony lock includes all access control capabilities such as card reader,

door position switch and request to exit monitoring sensors. The hardware is compatible will all

popular access control systems, such as the S2 NetBox Online system, and supports a variety of

openings while industry leading Grade 1 hardware offers the highest degree of physical security

available in access control locks. [5] These locks and the access control system will allow IT

professionals and administrators to prevent unauthorized access into the buildings on campus.

The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These

locks provide a cost-effective, future-proof solution for the campus while providing simultaneous

support for multiple credentials and offers an easy migration path to higher security credentials

and mobile access. [5] In addition to the locks, each faculty member will be assigned an access

card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

The interior and exterior doors will automatically lock at 8pm every night, barring entrance with

the exception of faculty with access cards. The doors will re-open at 8am every morning, again

with the exception of faculty access cards which will be permitted to access the buildings at any

time. The doors will allow exit with the request to exit monitoring sensors.

For access to the computers, each student will be given a username and password, which

will expire every 90 days. Students are permitted to access the buildings between the hours of

8am and 8pm. The students will only be able to access the network based computers with a

student log-in and password, provided by administration at time of registration. The password

will expire at the end of every semester and will only renew if the student is in good academic

standing, academically and financially.

The second step in physical security is protecting the perimeter of the buildings with

video surveillance of all exits and entrances within the two buildings. There should also be video

surveillance in common areas such as the lobby and stairways, the computer lab and library and

placed strategically throughout the hallways in both buildings. Surveillance should also be

placed outside the buildings on the lamp posts along the pathways connecting the two buildings.

The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision

bullet style surveillance cameras will be installed throughout the two new campus buildings.

They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an

83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night

vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be

placed in each building connecting all the cameras together. Each switch will cost $280 and will

be connected to the router and the router connected to the Network Video Recorder (NVR). The

NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of

incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6

terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on

all 32 channels. One benefit of using a 4K security system is the additional resolution needed

during an incident, which will offer the best chance to capture useful evidence such as distinct

facial features. [6]

This hardware will be used to provide optimal security on the University campus. The

electronic locks will be used to help prevent a physical security breach in one of the buildings.

The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying

to gain access to the buildings without authorization. The cameras are also used for detection

and recovery as they will record any nefarious acts, which will help law enforcement or

administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

recovery portion of physical security because they will provide administrators with a visual

account of the security breach as it is happening. This will help administrators implement new

policies and procedures to prevent future breaches in security. [2]

G.) Network Security Measures

Social engineering is an attempt to fraudulently access sensitive data from a user. Social

engineering is primarily accomplished by a person masquerading as someone the user trusts, then

asking for personal information such as passwords, usernames, bank account information and

social security numbers to name a few. Two different types of social engineering are used:

passive and active. Passive social engineering takes advantage of the unintended actions of a

user to gather information while active involves the user directly. [2] These types of attacks can

be prevented by implementing a social engineering policy. That policy would include bi-annual

mandatory training for all faculty, including IT professionals and administrators and students.

Faculty and students should also be tested by an outside third party to see if they fall prey to a

social engineering scam. These kinds of tests help keep the user on their toes and less

susceptible to a social engineering attack. The policy should also state users must comply with

the rules in regards to social engineering such as: do not open attachments from unknown users,

do not provide anyone with sensitive information, online transactions should only be made on

websites that use the https protocol and do not trust anyone requesting personal or sensitive

information. [7]

Malware, or malicious software, is a type of computer program designed to infect a

computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or

spyware. Protection against students or faculty willingly or unwillingly infecting computers with

malware starts with personal vigilance by training on social engineering techniques and

prevention. The requirement of a username to log-in to a computer for all students and faculty

can also protect against unintended malware infection by a student or faculty member. If a

student or faculty member intends to infect a computer with malware, knowing they will be

caught due to the required log-in may be a deterrent.

A computer’s second layer of defense against malware is through malware security

protection known as a host based intrusion detection system (IDS) or antivirus software.

Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will

periodically scan the computer and its files to detect and defeat malware. In addition, the

antivirus software can recognize and warn against previously unknown malware threats based on

technical features of the malware and warn against suspicious websites. Kaspersky was chosen

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

for the University because it is easy to use and install and its effective. There is no such thing as

100% protection against malware, but with personal vigilance and antivirus software, a computer

is as protected as it can be. [8]

H.) UMUC’s Liability Policy

Personal devices may be used on the wireless LAN with the acceptance of the BYOD

policy. The policy will be accepted by each user as he/she logs onto the WLAN with their

device. The end user will not be able to access the network without checking the “accept” button

on the login page. The BYOD policy will state that all personal devices logged into the network

will keep screen locks on, use device-tracking software and notify the college immediately if a

device is lost so that IT can wipe it clean. This will prevent sensitive information on the network

from ending up in the wrong hands. All students and faculty must also electronically sign a

document stating they will upload and maintain antivirus software on their device. [9] If the

end user does not comply with these requirements, he/she will not be allowed to participate in

the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a

device while connected to the network or the guest WiFi.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

References:

[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/

dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/

at_a_glance_c45-675579 .

[2] LabSim Network Pro. TestOut, 2016.

[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,

Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-

networking-816407.

[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,

Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/

connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.

[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:

http://www.sargentlock.com/products/product_overview.php?item_id=1878.

[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].

Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-

night-vision/LNB4163BW-1-p.

[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,

Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-

attacks-common-techniques-how-prevent-attack.

[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-

protect-against-it.

[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive

Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-

byod-campus.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579

https://www.lifewire.com/demilitarized-zone-computer-networking-816407

https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/

http://www.sargentlock.com/products/product_overview.php?item_id=1878

4MP High Definition IP Camera with Color Night Vision

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it

https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 2

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Network Design Proposal:

Network Addressing &

Security (Part 2)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

!

!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

Part A: IP Addressing

Proposed Subnet

Subnet Description Required Hosts

Classroom 1 (First Floor) 25 Computers

Classroom 2 (First Floor) 25 Computers

Classroom 4 (First Floor) 25 Computers

Classroom 1 (Second Floor) 25 Computers

Classroom 5 (Second Floor) 25 Computers

Office 5 – Admissions (Second Floor) 25 Computers

Student Computer Lab 25 Computers

Library 15 Computers

Subnet Network Address Host Address Range Broadcast
Address

Subnet Mask: 255.255.255.0

Classroom 1
(First Floor)

192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31

Classroom 2
(First Floor)

192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63

Classroom 4
(First Floor)

192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95

Classroom 1
(Second Floor)

192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127

Classroom 5
(Second Floor)

192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159

Office 5 –
Admissions
(Second Floor)

192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191

Student
Computer Lab

192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223

Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255

Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Part B: Security

C.) Firewall: Network Based – Cisco ASA 5540 Series $3000

A Firewall is a device that secures a network from intruders. It acts as a lock between the

internet and a LAN requiring all traffic from the internet to pass through the firewall before

accessing any device within the network. There are two different types of firewalls: a host

based, which is a built in firewall that runs on a server or a network based, which is a hardware

appliance. For this campus, a network based firewall was chosen because they offer a stronger

defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)

5540 series firewall is an identity-based network firewall which allows certain users and groups

to access the network. This enables simplified policy configuration, so administrators can write

policies that correspond to business rules—for increased security, enhanced ease of use, and

fewer policies to manage. [1]

D.) IDS vs. IPS

An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from

accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs

advanced IPS software that provides proactive, full-featured intrusion prevention services to stop

malicious traffic, including worms and viruses, before they can affect a network. [1] For the

security of the University, the IPS module is the best option. An IDS (Intrusion Detection

System) wouldn’t prevent the malicious software from entering the network, which would be

detrimental to the University. Protecting University hardware and devices from cyber threats and

malware is one of the most important requirements of network security officer.

E.) DMZ

A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private

network and an untrusted network such as the internet. [2] A DMZ zone is a network

configuration designed to segregate computers on each side of a firewall. A commercial DMZ

creates a separate subnet outside of the firewall containing one or multiple computers to better

protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the

DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be

established using one or two firewalls. The single firewall solution uses multiple interfaces to

create multiple DMZ’s with multiple security zones. Each security zone can be created for

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

different levels of security: low, medium and high and anything in between. [2] For the

University campus, the best option is to create the DMZ’s using the existing hardware which is

the Cisco ASA firewall.

F.) Physical Security

Physical security is protection of the University’s information assets, IT services and

resources as well as ensuring safety of faculty and students. Physical security requires three

different areas of focus: prevention, detection and recovery. Prevention is key in any type of

security outline. It is easier to prevent an attack than it is to recover from an attack. [2]

Protecting the perimeter of the network and making sure the network is extremely difficult to

access helps prevent an attacker from attempting to breach the security in place. If a breach

occurs, being able to detect who breached the network and when, what was accessed and if it is

missing or damaged is of utmost importance. Finally, how a network recovers is paramount after

a breach to prevent any additional occurrences. If the network is breached, a review of the

physical security policy is required to determine how the breach occurred and if the security

profile has been sufficiently hardened. After review of the security policies in place, the

weakness allowing the breach should be corrected to prevent future attacks on the network. [2]

Protecting the buildings with S2 NetBox Online cloud-based access control system works

with existing infrastructure and peripheral devices allowing for seamless integration. The S2

System is scalable and allows the integration of third party access control devices such as the

Sargent Assa Abloy door locks.

The first step to take in physical security is protecting the buildings themselves with

Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever

and mortise box, the Harmony lock includes all access control capabilities such as card reader,

door position switch and request to exit monitoring sensors. The hardware is compatible will all

popular access control systems, such as the S2 NetBox Online system, and supports a variety of

openings while industry leading Grade 1 hardware offers the highest degree of physical security

available in access control locks. [5] These locks and the access control system will allow IT

professionals and administrators to prevent unauthorized access into the buildings on campus.

The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These

locks provide a cost-effective, future-proof solution for the campus while providing simultaneous

support for multiple credentials and offers an easy migration path to higher security credentials

and mobile access. [5] In addition to the locks, each faculty member will be assigned an access

card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

The interior and exterior doors will automatically lock at 8pm every night, barring entrance with

the exception of faculty with access cards. The doors will re-open at 8am every morning, again

with the exception of faculty access cards which will be permitted to access the buildings at any

time. The doors will allow exit with the request to exit monitoring sensors.

For access to the computers, each student will be given a username and password, which

will expire every 90 days. Students are permitted to access the buildings between the hours of

8am and 8pm. The students will only be able to access the network based computers with a

student log-in and password, provided by administration at time of registration. The password

will expire at the end of every semester and will only renew if the student is in good academic

standing, academically and financially.

The second step in physical security is protecting the perimeter of the buildings with

video surveillance of all exits and entrances within the two buildings. There should also be video

surveillance in common areas such as the lobby and stairways, the computer lab and library and

placed strategically throughout the hallways in both buildings. Surveillance should also be

placed outside the buildings on the lamp posts along the pathways connecting the two buildings.

The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision

bullet style surveillance cameras will be installed throughout the two new campus buildings.

They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an

83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night

vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be

placed in each building connecting all the cameras together. Each switch will cost $280 and will

be connected to the router and the router connected to the Network Video Recorder (NVR). The

NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of

incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6

terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on

all 32 channels. One benefit of using a 4K security system is the additional resolution needed

during an incident, which will offer the best chance to capture useful evidence such as distinct

facial features. [6]

This hardware will be used to provide optimal security on the University campus. The

electronic locks will be used to help prevent a physical security breach in one of the buildings.

The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying

to gain access to the buildings without authorization. The cameras are also used for detection

and recovery as they will record any nefarious acts, which will help law enforcement or

administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

recovery portion of physical security because they will provide administrators with a visual

account of the security breach as it is happening. This will help administrators implement new

policies and procedures to prevent future breaches in security. [2]

G.) Network Security Measures

Social engineering is an attempt to fraudulently access sensitive data from a user. Social

engineering is primarily accomplished by a person masquerading as someone the user trusts, then

asking for personal information such as passwords, usernames, bank account information and

social security numbers to name a few. Two different types of social engineering are used:

passive and active. Passive social engineering takes advantage of the unintended actions of a

user to gather information while active involves the user directly. [2] These types of attacks can

be prevented by implementing a social engineering policy. That policy would include bi-annual

mandatory training for all faculty, including IT professionals and administrators and students.

Faculty and students should also be tested by an outside third party to see if they fall prey to a

social engineering scam. These kinds of tests help keep the user on their toes and less

susceptible to a social engineering attack. The policy should also state users must comply with

the rules in regards to social engineering such as: do not open attachments from unknown users,

do not provide anyone with sensitive information, online transactions should only be made on

websites that use the https protocol and do not trust anyone requesting personal or sensitive

information. [7]

Malware, or malicious software, is a type of computer program designed to infect a

computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or

spyware. Protection against students or faculty willingly or unwillingly infecting computers with

malware starts with personal vigilance by training on social engineering techniques and

prevention. The requirement of a username to log-in to a computer for all students and faculty

can also protect against unintended malware infection by a student or faculty member. If a

student or faculty member intends to infect a computer with malware, knowing they will be

caught due to the required log-in may be a deterrent.

A computer’s second layer of defense against malware is through malware security

protection known as a host based intrusion detection system (IDS) or antivirus software.

Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will

periodically scan the computer and its files to detect and defeat malware. In addition, the

antivirus software can recognize and warn against previously unknown malware threats based on

technical features of the malware and warn against suspicious websites. Kaspersky was chosen

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

for the University because it is easy to use and install and its effective. There is no such thing as

100% protection against malware, but with personal vigilance and antivirus software, a computer

is as protected as it can be. [8]

H.) UMUC’s Liability Policy

Personal devices may be used on the wireless LAN with the acceptance of the BYOD

policy. The policy will be accepted by each user as he/she logs onto the WLAN with their

device. The end user will not be able to access the network without checking the “accept” button

on the login page. The BYOD policy will state that all personal devices logged into the network

will keep screen locks on, use device-tracking software and notify the college immediately if a

device is lost so that IT can wipe it clean. This will prevent sensitive information on the network

from ending up in the wrong hands. All students and faculty must also electronically sign a

document stating they will upload and maintain antivirus software on their device. [9] If the

end user does not comply with these requirements, he/she will not be allowed to participate in

the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a

device while connected to the network or the guest WiFi.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

References:

[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/

dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/

at_a_glance_c45-675579 .

[2] LabSim Network Pro. TestOut, 2016.

[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,

Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-

networking-816407.

[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,

Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/

connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.

[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:

http://www.sargentlock.com/products/product_overview.php?item_id=1878.

[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].

Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-

night-vision/LNB4163BW-1-p.

[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,

Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-

attacks-common-techniques-how-prevent-attack.

[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-

protect-against-it.

[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive

Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-

byod-campus.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579

https://www.lifewire.com/demilitarized-zone-computer-networking-816407

https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/

http://www.sargentlock.com/products/product_overview.php?item_id=1878

4MP High Definition IP Camera with Color Night Vision

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it

https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 3

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal:

Network Customization &

Optimization (Part 3)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal Part 3

A.) Identify Network Services

The University needs to function like a well oiled machine, and the implementation of

certain network services will help make that possible. In order to fully create a client-server

network model, servers must be used so the client, or the user, can access the services they need

on the network. The main services UMUC requires are: email, online/internet access and file

and print sharing services. [1]

An email server is used to send and receive emails. The Microsoft Exchange server

works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server

also preforms functions such as collaboration features which allows faculty to create tasks and

meetings from the calendar portion of the software. It also provides video and audio

conferencing and instant messaging (IM) services. A web server is a server computer running

software enabling a computer to host a web page. One of the more popular web servers today is

an Apache web server, which will be used for the University. One of the most important

functions of a server operating system is sharing resources between users. A file server is a

computer used specifically for centralized file storage with the ability to share the files between

computers and other devices on the network. A print server is a computer utilized specifically

for sharing printers on the network. The sole purpose of a print server is to collect the files and

documents sent to a printer by a user on the network, send the document to a printer on the

network at which point the printer would print it out. [2]

B.) Additional Servers or Network Devices

In addition to email, internet access, file and print servers, UMUC will also require a

directory service, a Domain Controller and DHCP server. A directory service stores user and

computer profiles and access privileges on the domain controller (DC). It can be used to

authenticate and authorize users to allow secure access to internet services and applications. [3]

The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server

2016 software and will be utilized for the UMUC network. ADDS is installed on a domain

controller, which authenticates users and controls access in a network, enforces security policies

and installs and updates software for all computers on the network. [4] A separate server will be

needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will

need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and

the scopes configured. [5]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP

settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or

device on the network. It also keeps track of all the IP addresses already in use on the network to

avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft

Windows Server 2016 software and will be utilized for the UMUC network.

C.) Security Measures

Security measures start with the user. User accounts are granted access to certain

network resources by the system administrator and they are secured using a password.

Therefore, making sure those user accounts have excellent passwords by implementing a

password policy is top priority when maintaining network security. [2]. A one-factor

authentication method requiring a username and password as well as a log-in pass phrase would

be sufficient for students logging into the network. Faculty will require a two-factor

authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide

a password or a pass phrase or cognitive information such as mother’s maiden name and the city

in which you were born. Faculty members will be required to enter a password to log onto the

network just like the students. Additionally, they will be required to use a type 2 form of

authentication such as an access card to enter the building during “off” hours which are 8pm

through 8am and to enter their office. [1]. The password will need to be strong, which will

require enforcement of strict password guidelines. Each user should create a password containing

8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be

changed every 90 days and a user cannot use the same password twice within a year.

In addition to strong authentication a vulnerability scanner needs to be purchased and

implemented on the network, which will be ran by the network administrator on a weekly basis.

A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running

applications or services, missing critical patches across all platforms, user accounts that have not

been disabled, default or blank passwords, misconfigurations and missing security controls.

Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline

Security Analyzer (MBSA) will be downloaded. [1]

SSH (Secure Shell) Protocol is software that enables secure system administration

and file transfers over insecure networks. Encryption of all user authentications, commands,

output and file transfers is used to secure the connection between a client and a server and to

prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise

grade SSH and will be implemented on the network. It protects organizations against internal and

external attacks on user identities, password or login credential theft and data theft and allows

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

automated secure processes for remote command execution and file transfer. In addition to the

Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement

a controlled provisioning process, termination process and assists in the discovery and

remediation of existing keys. The Universal SSH key manager is required to maintain

government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST

800-53. [6]

D.) Justification for Additional Servers and security measures

ADDS on the Domain Controller is a necessity for a college campus like UMUC

primarily due to the security measures it provides. An administrator alone would not be able to

keep track of every employee and their access rights and every student as well as every guest

device. The domain controller works as an invisible administrator for all end users on the

network, providing or denying access resourced on the network. These resources include

everything from email, the Learning Management System

A DHCP server automatically configures the IP address for every device on the network

which ensures a valid, unique IP address for each and every device. DHCP also automatically

configures devices as they are added and dropped from the network which is a big help to a

network administrator. Configuring IP addresses statically would be a mistake for any network

larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server

is the best option to prevent connectivity issues and troubleshooting issues. [2]

A DNS server maps the logical name to its IP address. It is a necessity on a network with

internet access because it translates the IP address into the URL and vice versa. [1] Users on a

network are not going to remember an IP address but they will remember a website name like

www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case

the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016

software and the other is configured through the router, it could prevent possible connectivity

issues on the network.

A vulnerability scanner is required because it helps to maintain a network and its devices

without having to employ an entire IT department. Being able to run a scan periodically to check

for any vulnerabilities on the network is simple and cost-effective when compared to paying

additional salaries and benefits.

SSH software and key management is required to secure the Universities network using

encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism

requiring users to authenticate before they are able to transmit data over the transmission

channels within the UMUC network. This prevents unauthorized users from accessing data on

the network. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://UMUC.edu

E.) Network Storage and Cloud Based Services

A network attached storage (NAS) device will be used for additional file storage on the

network. The NAS will be placed directly to the network through a switch using a wired

interface. The NAS provides better performance because its sole purpose is file storage. The

NAS is a viable option because it can be integrated into an existing network and the active

directory. This prevents IT from having to configure duplicate accounts for each user as they will

authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The

switch connecting the NAS will maintain two separate VLANs, one for professors and one for

administrators. This will prevent professors from accessing protected information such as

financial data, social security numbers, etc.

The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless

Network Attached Storage will be implemented onto the network. It provides 80TB of storage

with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core

processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-

virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as

well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately

$2000. [10]

A private cloud will be implemented for the students and faculty at UMUC. A private

cloud provides flexibility of access, ease of use and allows users to provision their own

resources. [1] The private cloud will house the Learning Management System to be used by both

faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect

infrastructure and applications between cloud based computing and existing on premises

infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide

users with the Learning Management System while not having to worry about software

maintenance, capacity planning or patching. [7] The monthly average cost of a large web

application on Amazon Cloud services is $1000.

F.) Data Protection and Back-up Implementation

Data protection is the process of safeguarding information from corruption, compromise

or loss through operational backup of data. Data protection also includes business continuity/

disaster recovery which ensures the recovery of data quickly after a loss. There are two main

areas of data management: Data Lifecycle Management and Information Lifecycle Management.

Data lifecycle management automatically moves critical data from online to offline storage.

Information lifecycle management is a strategy for valuing, cataloging and protecting

information assets from application and user errors, malware and virus attacks, machine failure,

or facility outages and disruptions.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://searchmidmarketsecurity.techtarget.com/definition/malware

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Continuous Data Protection (CDP) is a form of data replication that backs up data as

changes are made. With CDP, a system or network can be restored to any previous point in time

which is extremely useful after corruption or data loss. A true CDP systems records every

change and stores it in a log. If a physical system failure occurs, the CDP system will keep all

changes up to the last write before failure, then you can restore the system prior to any

corruption. CDP can be implemented via software running on a server or as a hardware

appliance. For UMUC, the software option that will be implemented is the Dell EMC Data

Protection Suite Enterprise Edition. The software will be placed on a server and the data will be

stored in separate locations: the cloud and on a physical storage device or server. The software

will be accessible to all faculty, students and administrators connected to the UMUC network. [8]

The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.

G.) Network Monitoring Solution

Network monitoring is a service conducted by software in conjunction with the network

administrator and/or an IT department to constantly monitor a network for possible outages or

failures. A network monitoring system is implemented to ensure the availability and

performance of all devices and components on the network by implementing software to search

for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be

implemented for network monitoring. It is rated one of the best network monitoring softwares of

2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,

temperature, fan and other hardware, monitors PoE loads, wireless access points and interface

metrics. Monitoring a network is critical because it detects, monitors and analyzes the network

while examining applications and devices in real time which allows IT to respond quickly. [9]

A packet sniffer can also be used on the system to capture data being transmitted on a

device or over a network. Once all the data is captured, the packet sniffer holds the data until it

can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly

what is being sent to the device. This is a useful tool because it can help prevent attacks to a

specific device on the network. Once it is determined the device should not be receiving a

certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s

packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port

sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,

P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).

It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of

data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the

software maintenance fee will be renewed at 25% of the current list price of the original license.

[11]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.paessler.com/ftp-monitoring

https://www.paessler.com/ssh_monitoring

H.) Storage and Management of Logs

System logs are extremely important because they provide a snapshot of all the events

that occurred on the system. The log entries are generated by the operating system and any other

applications running on the system. A log entry could be caused by a variety of events including,

failed login attempts or a change to the system. Each log is created and stored on each device on

the network. Implementing centralized logging is the best way to review what’s happening on

the system because all the logging files from all devices on the network end up in a centralized

device, most often the logging server also known as the Syslog server. [1] Since Windows

servers do not contain a version of syslog process, Datagram SyslogServer Suite will be

downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file

analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store

the logs in a SQL database through the Amazon Rational Database Service (RDS) on the

Amazon cloud previously implemented. The IT administrator will then review the analysis and

make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost

approximately $900 for 5000 IP addresses. [12]

I.) IT Troubleshooting Methodology

The troubleshooting methodology that will be used by IT personnel at UMUC is as

follows:

• Identify the problem by making a list of the symptoms and identifying who is

experiencing those symptoms. Check for changes that occurred prior to the start of the

symptoms then try to duplicate the problem.

• Establish a theory of probable cause by analyzing the symptoms and determining the

most likely cause. Keep in mind the flow of data through the OSI model. Check for the

most common issues with the list of symptoms reported first.

• Test the theory. If the theory is proven, take the appropriate steps to research fixes to

the problem. If the theory is not proven, start the process over again or escalate the

issue to a supervisor.

• If the theory proven and a resolution found, complete a plan of action.

• After the action plan is complete, implement the solution and a series of tests to

determine if the action plan worked.

• Finally, complete a standard operating procedure guide for this problem in the future

containing any preventative measures. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

References

[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.

[2] D. Lowe, Networking for dummies. .

[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.

[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.

[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].

Available: https://technet.microsoft.com/en-us/library/cc780036(WS.

10).aspx#w2k3tr_ad_over_qbjd.

[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.

[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-

server-2016/.

[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://

www.ssh.com/ssh/.

[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://

aws.amazon.com/types-of-cloud-computing/.

[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:

http://searchdatabackup.techtarget.com/definition/data-protection.

[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].

Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.

[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,

Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-

nas-network-attached-storage/.

[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://

www.paessler.com/prtg/price_list.

[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:

https://www.netadmintools.com/syslog-server/datagram/.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://docs.oracle.com/cd/E19396-01/817-7619/intro.html

https://technet.microsoft.com/en-us/library/cc780036

https://protechgurus.com/configure-dhcp-server-in-windows-

http://www.ssh.com/ssh/

http://aws.amazon.com/types-of-cloud-computing/

http://searchdatabackup.techtarget.com/definition/data-protection

https://www.pcmag.com/article2/0,2817,2495263,00.asp

https://www.omnicoreagency.com/best-

http://www.paessler.com/prtg/price_list

https://www.netadmintools.com/syslog-server/datagram/

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 3

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 3
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-3/4030682/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal:

Network Customization &

Optimization (Part 3)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Network Design Proposal Part 3

A.) Identify Network Services

The University needs to function like a well oiled machine, and the implementation of

certain network services will help make that possible. In order to fully create a client-server

network model, servers must be used so the client, or the user, can access the services they need

on the network. The main services UMUC requires are: email, online/internet access and file

and print sharing services. [1]

An email server is used to send and receive emails. The Microsoft Exchange server

works with Microsoft Outlook, the software that comes with Microsoft Office. A mail server

also preforms functions such as collaboration features which allows faculty to create tasks and

meetings from the calendar portion of the software. It also provides video and audio

conferencing and instant messaging (IM) services. A web server is a server computer running

software enabling a computer to host a web page. One of the more popular web servers today is

an Apache web server, which will be used for the University. One of the most important

functions of a server operating system is sharing resources between users. A file server is a

computer used specifically for centralized file storage with the ability to share the files between

computers and other devices on the network. A print server is a computer utilized specifically

for sharing printers on the network. The sole purpose of a print server is to collect the files and

documents sent to a printer by a user on the network, send the document to a printer on the

network at which point the printer would print it out. [2]

B.) Additional Servers or Network Devices

In addition to email, internet access, file and print servers, UMUC will also require a

directory service, a Domain Controller and DHCP server. A directory service stores user and

computer profiles and access privileges on the domain controller (DC). It can be used to

authenticate and authorize users to allow secure access to internet services and applications. [3]

The Microsoft Active Directory Domain Services (ADDS) is included in the Windows Server

2016 software and will be utilized for the UMUC network. ADDS is installed on a domain

controller, which authenticates users and controls access in a network, enforces security policies

and installs and updates software for all computers on the network. [4] A separate server will be

needed for the Domain Controller (DC). Once the IP address is configured on the DC, DNS will

need to be configured. Upon completion of the DC and DNS, the DHCP should be set-up and

the scopes configured. [5]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

The DHCP (Dynamic Host Configuration Protocol) server automatically provides TCP/IP

settings, such as IP address, subnet mask, default gateway, and DNS server to each computer or

device on the network. It also keeps track of all the IP addresses already in use on the network to

avoid two clients getting the same IP address. [2] The DHCP server is included in the Microsoft

Windows Server 2016 software and will be utilized for the UMUC network.

C.) Security Measures

Security measures start with the user. User accounts are granted access to certain

network resources by the system administrator and they are secured using a password.

Therefore, making sure those user accounts have excellent passwords by implementing a

password policy is top priority when maintaining network security. [2]. A one-factor

authentication method requiring a username and password as well as a log-in pass phrase would

be sufficient for students logging into the network. Faculty will require a two-factor

authentication type: type 1 and a type 2 identification process. Type 1 requires the user to provide

a password or a pass phrase or cognitive information such as mother’s maiden name and the city

in which you were born. Faculty members will be required to enter a password to log onto the

network just like the students. Additionally, they will be required to use a type 2 form of

authentication such as an access card to enter the building during “off” hours which are 8pm

through 8am and to enter their office. [1]. The password will need to be strong, which will

require enforcement of strict password guidelines. Each user should create a password containing

8-12 upper and lowercase letters, at least one number and one symbol. Passwords will need to be

changed every 90 days and a user cannot use the same password twice within a year.

In addition to strong authentication a vulnerability scanner needs to be purchased and

implemented on the network, which will be ran by the network administrator on a weekly basis.

A vulnerability scan will look for weaknesses such as open ports, active IP addresses, running

applications or services, missing critical patches across all platforms, user accounts that have not

been disabled, default or blank passwords, misconfigurations and missing security controls.

Since all the computers run on the Microsoft Windows operating system, the Microsoft Baseline

Security Analyzer (MBSA) will be downloaded. [1]

SSH (Secure Shell) Protocol is software that enables secure system administration

and file transfers over insecure networks. Encryption of all user authentications, commands,

output and file transfers is used to secure the connection between a client and a server and to

prevent attacks on the network. Tectia SSH for Windows OP client and server is an enterprise

grade SSH and will be implemented on the network. It protects organizations against internal and

external attacks on user identities, password or login credential theft and data theft and allows

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

automated secure processes for remote command execution and file transfer. In addition to the

Tectia SSH, the Universal SSH key manager is required to manage the SSH keys and implement

a controlled provisioning process, termination process and assists in the discovery and

remediation of existing keys. The Universal SSH key manager is required to maintain

government mandated compliance with PCI-DSS, Sarbanes-Oxley, HIPAA and FISMA/NIST

800-53. [6]

D.) Justification for Additional Servers and security measures

ADDS on the Domain Controller is a necessity for a college campus like UMUC

primarily due to the security measures it provides. An administrator alone would not be able to

keep track of every employee and their access rights and every student as well as every guest

device. The domain controller works as an invisible administrator for all end users on the

network, providing or denying access resourced on the network. These resources include

everything from email, the Learning Management System

A DHCP server automatically configures the IP address for every device on the network

which ensures a valid, unique IP address for each and every device. DHCP also automatically

configures devices as they are added and dropped from the network which is a big help to a

network administrator. Configuring IP addresses statically would be a mistake for any network

larger than a few devices. Since the UMUC network contains over 100 devices, a DHCP server

is the best option to prevent connectivity issues and troubleshooting issues. [2]

A DNS server maps the logical name to its IP address. It is a necessity on a network with

internet access because it translates the IP address into the URL and vice versa. [1] Users on a

network are not going to remember an IP address but they will remember a website name like

www.UMUC.edu. Also, maintaining two DNS servers on a network provides a back-up in case

the primary fails. If one DNS server is configured through the Microsoft Windows Server 2016

software and the other is configured through the router, it could prevent possible connectivity

issues on the network.

A vulnerability scanner is required because it helps to maintain a network and its devices

without having to employ an entire IT department. Being able to run a scan periodically to check

for any vulnerabilities on the network is simple and cost-effective when compared to paying

additional salaries and benefits.

SSH software and key management is required to secure the Universities network using

encryption known as Public Key Cryptography (PKI), and uses an authentication mechanism

requiring users to authenticate before they are able to transmit data over the transmission

channels within the UMUC network. This prevents unauthorized users from accessing data on

the network. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://UMUC.edu

E.) Network Storage and Cloud Based Services

A network attached storage (NAS) device will be used for additional file storage on the

network. The NAS will be placed directly to the network through a switch using a wired

interface. The NAS provides better performance because its sole purpose is file storage. The

NAS is a viable option because it can be integrated into an existing network and the active

directory. This prevents IT from having to configure duplicate accounts for each user as they will

authenticate to the NAS. [1] The NAS will be primarily used by faculty and administration. The

switch connecting the NAS will maintain two separate VLANs, one for professors and one for

administrators. This will prevent professors from accessing protected information such as

financial data, social security numbers, etc.

The NETGEAR ReadyNAS RN628X Ultimate Performance 10GbE 4-bay Diskless

Network Attached Storage will be implemented onto the network. It provides 80TB of storage

with a maximum of 130TB with expansion bays. It features a 2.2 GHz Intel Xeon quad-core

processor and 8GB of DDR4 RAM. It offers 5 levels of data protection including built-in anti-

virus and incremental backup copies. It also includes Gigabit and 10 Gigabit Ethernet ports, as

well as USB 3.0. It is also VMWare vSphere ESXi 6.0 certified and is priced at approximately

$2000. [10]

A private cloud will be implemented for the students and faculty at UMUC. A private

cloud provides flexibility of access, ease of use and allows users to provision their own

resources. [1] The private cloud will house the Learning Management System to be used by both

faculty and students. Amazon Web Services (AWS) provides hybrid cloud computing to connect

infrastructure and applications between cloud based computing and existing on premises

infrastructure. UMUC will implement platform as a service (PaaS) cloud computing to provide

users with the Learning Management System while not having to worry about software

maintenance, capacity planning or patching. [7] The monthly average cost of a large web

application on Amazon Cloud services is $1000.

F.) Data Protection and Back-up Implementation

Data protection is the process of safeguarding information from corruption, compromise

or loss through operational backup of data. Data protection also includes business continuity/

disaster recovery which ensures the recovery of data quickly after a loss. There are two main

areas of data management: Data Lifecycle Management and Information Lifecycle Management.

Data lifecycle management automatically moves critical data from online to offline storage.

Information lifecycle management is a strategy for valuing, cataloging and protecting

information assets from application and user errors, malware and virus attacks, machine failure,

or facility outages and disruptions.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

http://searchmidmarketsecurity.techtarget.com/definition/malware

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

Continuous Data Protection (CDP) is a form of data replication that backs up data as

changes are made. With CDP, a system or network can be restored to any previous point in time

which is extremely useful after corruption or data loss. A true CDP systems records every

change and stores it in a log. If a physical system failure occurs, the CDP system will keep all

changes up to the last write before failure, then you can restore the system prior to any

corruption. CDP can be implemented via software running on a server or as a hardware

appliance. For UMUC, the software option that will be implemented is the Dell EMC Data

Protection Suite Enterprise Edition. The software will be placed on a server and the data will be

stored in separate locations: the cloud and on a physical storage device or server. The software

will be accessible to all faculty, students and administrators connected to the UMUC network. [8]

The Dell EMC Data Protection Suite Enterprise Edition will cost approximately $13,500.

G.) Network Monitoring Solution

Network monitoring is a service conducted by software in conjunction with the network

administrator and/or an IT department to constantly monitor a network for possible outages or

failures. A network monitoring system is implemented to ensure the availability and

performance of all devices and components on the network by implementing software to search

for inconsistencies and connectivity issues. Logic Monitor automated network monitor will be

implemented for network monitoring. It is rated one of the best network monitoring softwares of

2018. It automatically discovers all network devices and interfaces, monitors CPU, memory,

temperature, fan and other hardware, monitors PoE loads, wireless access points and interface

metrics. Monitoring a network is critical because it detects, monitors and analyzes the network

while examining applications and devices in real time which allows IT to respond quickly. [9]

A packet sniffer can also be used on the system to capture data being transmitted on a

device or over a network. Once all the data is captured, the packet sniffer holds the data until it

can be analyzed. A packet sniffer is useful to see what is on the device or network and exactly

what is being sent to the device. This is a useful tool because it can help prevent attacks to a

specific device on the network. Once it is determined the device should not be receiving a

certain type of traffic, steps can be taken to remove that device from the network. [1] Paessler’s

packet sniffer sensor tool PRTG will be implemented on the network to monitor total traffic, port

sniffer, web traffic (HTTP, HTTPS), mail traffic (IMAP, POP3, SMTP), file transfer traffic (FTP,

P2P), infrastructure traffic (DHCP, DNS, ICMP, SNMP), and Remote control (RDP, SSH, VNC).

It is an all-in-one packet sniffing tool that filters according to IP addresses, protocols and types of

data. The XL1 unlimited license will be purchased at a one time price of $16,900. Each year the

software maintenance fee will be renewed at 25% of the current list price of the original license.

[11]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.paessler.com/ftp-monitoring

https://www.paessler.com/ssh_monitoring

H.) Storage and Management of Logs

System logs are extremely important because they provide a snapshot of all the events

that occurred on the system. The log entries are generated by the operating system and any other

applications running on the system. A log entry could be caused by a variety of events including,

failed login attempts or a change to the system. Each log is created and stored on each device on

the network. Implementing centralized logging is the best way to review what’s happening on

the system because all the logging files from all devices on the network end up in a centralized

device, most often the logging server also known as the Syslog server. [1] Since Windows

servers do not contain a version of syslog process, Datagram SyslogServer Suite will be

downloaded onto the Windows 2016 server. Once all the logs are on the server, a log file

analyzer such as Datagram Syslog agent will be used to create a system wide analysis and store

the logs in a SQL database through the Amazon Rational Database Service (RDS) on the

Amazon cloud previously implemented. The IT administrator will then review the analysis and

make corrections and changes accordingly. Datagram Syslog Server Suite edition will cost

approximately $900 for 5000 IP addresses. [12]

I.) IT Troubleshooting Methodology

The troubleshooting methodology that will be used by IT personnel at UMUC is as

follows:

• Identify the problem by making a list of the symptoms and identifying who is

experiencing those symptoms. Check for changes that occurred prior to the start of the

symptoms then try to duplicate the problem.

• Establish a theory of probable cause by analyzing the symptoms and determining the

most likely cause. Keep in mind the flow of data through the OSI model. Check for the

most common issues with the list of symptoms reported first.

• Test the theory. If the theory is proven, take the appropriate steps to research fixes to

the problem. If the theory is not proven, start the process over again or escalate the

issue to a supervisor.

• If the theory proven and a resolution found, complete a plan of action.

• After the action plan is complete, implement the solution and a series of tests to

determine if the action plan worked.

• Finally, complete a standard operating procedure guide for this problem in the future

containing any preventative measures. [1]

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-3

References

[1] TestOut Network Pro. Pleasant Grove, Utah: LabSim, 2018.

[2] D. Lowe, Networking for dummies. .

[3] “Chapter 2 Introduction to Directory Services and Directory Server”, Docs.oracle.com.

[Online]. Available: https://docs.oracle.com/cd/E19396-01/817-7619/intro.html.

[4] “Active Directory Collection: Active Directory”, Technet.microsoft.com, 2014. [Online].

Available: https://technet.microsoft.com/en-us/library/cc780036(WS.

10).aspx#w2k3tr_ad_over_qbjd.

[5] “Configure DHCP Server in Windows Server 2016 Step By Step”, ProTechGurus, 2016.

[Online]. Available: https://protechgurus.com/configure-dhcp-server-in-windows-

server-2016/.

[6] “SSH (Secure Shell) Home Page | SSH.COM”, Ssh.com, 2017. [Online]. Available: https://

www.ssh.com/ssh/.

[7] “Types of Cloud Computing”, Amazon Web Services, Inc.. [Online]. Available: https://

aws.amazon.com/types-of-cloud-computing/.

[8] S. Peterson and K. Hefner, “What is data protection?”, TechTarget.com. [Online]. Available:

http://searchdatabackup.techtarget.com/definition/data-protection.

[9] P. Ferrill, “The Best Network Monitoring Software of 2018”, PCMAG, 2017. [Online].

Available: https://www.pcmag.com/article2/0,2817,2495263,00.asp.

[10] S. Aslam, “The 12 Best NAS (Network Attached Storage) to Buy in 2018”,

Omnicoreagency.com, 2018. [Online]. Available: https://www.omnicoreagency.com/best-

nas-network-attached-storage/.

[11] “PRTG Price List – Overview, Licenses, Prices”, Paessler.com. [Online]. Available: https://

www.paessler.com/prtg/price_list.

[12] “Datagram Syslogserver Suite Review”, Network Admin Tools, 2016. [Online]. Available:

https://www.netadmintools.com/syslog-server/datagram/.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://docs.oracle.com/cd/E19396-01/817-7619/intro.html

https://technet.microsoft.com/en-us/library/cc780036

https://protechgurus.com/configure-dhcp-server-in-windows-

http://www.ssh.com/ssh/

http://aws.amazon.com/types-of-cloud-computing/

http://searchdatabackup.techtarget.com/definition/data-protection

https://www.pcmag.com/article2/0,2817,2495263,00.asp

https://www.omnicoreagency.com/best-

http://www.paessler.com/prtg/price_list

https://www.netadmintools.com/syslog-server/datagram/

II.

Network Addressing and Security

A. Subnetting

Overview

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address 192.168.22.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.

Class

Octet Decimal Range

A

1 – 126

B

128 – 191

C

192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.

Class

Subnet Mask

Format

A

255.0.0.0

Network.Host.Host.Host

B

255.255.0.0

Network.Network.Host.Host

C

255.255.255.0

Network.Network.Network.Host

CIDR (Classless Inter Domain Routing)

CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.

· Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation, it would be written as /8, means address has 8 bits on.

· Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation, it would be written as /16, means address has 16 bits on.

· Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation, it would be written as /24, means address has 24 bits on.

Technical Requirements

UMUC has not decided how they will use all of the physical space within the newly leased building, but the diagrams below convey the proposed end state. However, they have decided to use some of the space in the short term. In doing so, we will proceed with the proposed plan. Initially, the building will house
5 classrooms, 1 student computer lab, 1 library, and 1 office
.

· In the below building diagrams, we will use Office 5 (Admissions) on the first floor. Each office will have 1 computer for staff use, with the exception of the admissions office, which will have 5 computers. Based on the subnetting performed above, we may be able to add more devices in the future.

· The classrooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each classroom will have a closet. Each classroom will have 25 devices: 23 student computers, 1 instructor computer, and 1 server in the closet, for instructional use.

· Students should consider high traffic areas for Wi-Fi, such as the sitting areas and not the classrooms. The Wi-Fi network should be segregated from the wired network and implemented on a separate Class C network. What will the network address, range, and broadcast address for this separate Class C wireless address be?

 

· In addition, there will be a student computer lab that will provide computer access to students to do their homework. The student computer lab is located on the second floor. There will be 24 computers in this lab and 1 server in the closet.

· To allow students access to library resources, the library will also have 10 computers for the general public to use and 5 computers for library staff.

· There will be two server rooms, one on the first floor and one on the second floor.

To be clear, the diagram below conveys the proposed end state.

Given the aforementioned scenario, we are going to use the 192.168.3.0 network and create a total of 8 subnets, with 25 possible hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.

Subnet Description

Required Hosts

Classroom 1 (First Floor)

25 Computers

Classroom 2 (First Floor)

25 Computers

Classroom 4 (First Floor)

25 Computers

Classroom 1 (Second Floor)

25 Computers

Classroom 5 (Second Floor)

25 Computers

Office 5 – Admissions (Second Floor)

25 Computers

Student Computer Lab

25 Computers

Library

15 Computers

Note: Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.

Proposed Subnet

Subnet

Network Address

Host Address Range

Broadcast Address

Subnet Mask: 255.255.255. ___

Classroom 1 (First Floor)

192.168.22.0

192.168.22.1 – 192.168.22.30

192.168.22.31

Classroom 2 (First Floor)

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Classroom 4 (First Floor)

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Classroom 1 (Second Floor)

192.168.22.96

192.168.22.97 – 192.168.22.126

192.168.22.127

Classroom 5 (Second Floor)

192.168.22.128

192.168.22.129 – 192.168.22.158

192.168.22.159

Office 5 – Admissions (Second Floor)

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Student Computer Lab

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Library

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Wi-Fi Network

192.__. __.__

192._._. _ – 192._._. _

192._._. _

B. Firewall Implementation

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Firewall Implementation

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify

your proposed solution based on the technical requirements and assumptions.

C. Intrusion Detection System / Intrusion Protection System

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Intrusion Detection System / Intrusion Protection System

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won’t IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

D. DMZ Implementation

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed DMZ Implementation

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

E. Physical Security Measures

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Physical Security Measures

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

F. Additional Network Security Measures

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network Security Measures

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

III. Network Customization and Optimization

A. Network and Cloud Based Storage

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the network and cloud based storage. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network and Cloud Based Storage

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions. Is it worthwhile to consider outsourcing some or all of the classrooms? Have all the costs been considered?

B. Data Protection and Backup

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the data protection and backup. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Data Protection and Backup

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Consider disaster recovery and options available for conducting classes, but also day to day operations of the offices. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

C. Network Monitoring

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to network monitoring. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network Monitoring

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What monitoring systems are available and of them which would be the most advantageous for the UMUC to implement? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

D. Log Storage and Management

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the log storage and management. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Log Storage and Management

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What aggregating and analysis solutions are there and which one is best to choose from for UMUC? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

E. Troubleshooting Methodology

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the troubleshooting methodology. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Troubleshooting Methodology

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Present the isolation method for equipment and how you could find one bad end point or a cable that is bad between classroom 1 and the IT server closet. Student should be specific when discussing the methods, test equipment, and results.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 2

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Network Design Proposal:

Network Addressing &

Security (Part 2)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

!

!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

Part A: IP Addressing

Proposed Subnet

Subnet Description Required Hosts

Classroom 1 (First Floor) 25 Computers

Classroom 2 (First Floor) 25 Computers

Classroom 4 (First Floor) 25 Computers

Classroom 1 (Second Floor) 25 Computers

Classroom 5 (Second Floor) 25 Computers

Office 5 – Admissions (Second Floor) 25 Computers

Student Computer Lab 25 Computers

Library 15 Computers

Subnet Network Address Host Address Range Broadcast
Address

Subnet Mask: 255.255.255.0

Classroom 1
(First Floor)

192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31

Classroom 2
(First Floor)

192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63

Classroom 4
(First Floor)

192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95

Classroom 1
(Second Floor)

192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127

Classroom 5
(Second Floor)

192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159

Office 5 –
Admissions
(Second Floor)

192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191

Student
Computer Lab

192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223

Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255

Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Part B: Security

C.) Firewall: Network Based – Cisco ASA 5540 Series $3000

A Firewall is a device that secures a network from intruders. It acts as a lock between the

internet and a LAN requiring all traffic from the internet to pass through the firewall before

accessing any device within the network. There are two different types of firewalls: a host

based, which is a built in firewall that runs on a server or a network based, which is a hardware

appliance. For this campus, a network based firewall was chosen because they offer a stronger

defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)

5540 series firewall is an identity-based network firewall which allows certain users and groups

to access the network. This enables simplified policy configuration, so administrators can write

policies that correspond to business rules—for increased security, enhanced ease of use, and

fewer policies to manage. [1]

D.) IDS vs. IPS

An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from

accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs

advanced IPS software that provides proactive, full-featured intrusion prevention services to stop

malicious traffic, including worms and viruses, before they can affect a network. [1] For the

security of the University, the IPS module is the best option. An IDS (Intrusion Detection

System) wouldn’t prevent the malicious software from entering the network, which would be

detrimental to the University. Protecting University hardware and devices from cyber threats and

malware is one of the most important requirements of network security officer.

E.) DMZ

A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private

network and an untrusted network such as the internet. [2] A DMZ zone is a network

configuration designed to segregate computers on each side of a firewall. A commercial DMZ

creates a separate subnet outside of the firewall containing one or multiple computers to better

protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the

DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be

established using one or two firewalls. The single firewall solution uses multiple interfaces to

create multiple DMZ’s with multiple security zones. Each security zone can be created for

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

different levels of security: low, medium and high and anything in between. [2] For the

University campus, the best option is to create the DMZ’s using the existing hardware which is

the Cisco ASA firewall.

F.) Physical Security

Physical security is protection of the University’s information assets, IT services and

resources as well as ensuring safety of faculty and students. Physical security requires three

different areas of focus: prevention, detection and recovery. Prevention is key in any type of

security outline. It is easier to prevent an attack than it is to recover from an attack. [2]

Protecting the perimeter of the network and making sure the network is extremely difficult to

access helps prevent an attacker from attempting to breach the security in place. If a breach

occurs, being able to detect who breached the network and when, what was accessed and if it is

missing or damaged is of utmost importance. Finally, how a network recovers is paramount after

a breach to prevent any additional occurrences. If the network is breached, a review of the

physical security policy is required to determine how the breach occurred and if the security

profile has been sufficiently hardened. After review of the security policies in place, the

weakness allowing the breach should be corrected to prevent future attacks on the network. [2]

Protecting the buildings with S2 NetBox Online cloud-based access control system works

with existing infrastructure and peripheral devices allowing for seamless integration. The S2

System is scalable and allows the integration of third party access control devices such as the

Sargent Assa Abloy door locks.

The first step to take in physical security is protecting the buildings themselves with

Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever

and mortise box, the Harmony lock includes all access control capabilities such as card reader,

door position switch and request to exit monitoring sensors. The hardware is compatible will all

popular access control systems, such as the S2 NetBox Online system, and supports a variety of

openings while industry leading Grade 1 hardware offers the highest degree of physical security

available in access control locks. [5] These locks and the access control system will allow IT

professionals and administrators to prevent unauthorized access into the buildings on campus.

The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These

locks provide a cost-effective, future-proof solution for the campus while providing simultaneous

support for multiple credentials and offers an easy migration path to higher security credentials

and mobile access. [5] In addition to the locks, each faculty member will be assigned an access

card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

The interior and exterior doors will automatically lock at 8pm every night, barring entrance with

the exception of faculty with access cards. The doors will re-open at 8am every morning, again

with the exception of faculty access cards which will be permitted to access the buildings at any

time. The doors will allow exit with the request to exit monitoring sensors.

For access to the computers, each student will be given a username and password, which

will expire every 90 days. Students are permitted to access the buildings between the hours of

8am and 8pm. The students will only be able to access the network based computers with a

student log-in and password, provided by administration at time of registration. The password

will expire at the end of every semester and will only renew if the student is in good academic

standing, academically and financially.

The second step in physical security is protecting the perimeter of the buildings with

video surveillance of all exits and entrances within the two buildings. There should also be video

surveillance in common areas such as the lobby and stairways, the computer lab and library and

placed strategically throughout the hallways in both buildings. Surveillance should also be

placed outside the buildings on the lamp posts along the pathways connecting the two buildings.

The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision

bullet style surveillance cameras will be installed throughout the two new campus buildings.

They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an

83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night

vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be

placed in each building connecting all the cameras together. Each switch will cost $280 and will

be connected to the router and the router connected to the Network Video Recorder (NVR). The

NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of

incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6

terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on

all 32 channels. One benefit of using a 4K security system is the additional resolution needed

during an incident, which will offer the best chance to capture useful evidence such as distinct

facial features. [6]

This hardware will be used to provide optimal security on the University campus. The

electronic locks will be used to help prevent a physical security breach in one of the buildings.

The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying

to gain access to the buildings without authorization. The cameras are also used for detection

and recovery as they will record any nefarious acts, which will help law enforcement or

administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

recovery portion of physical security because they will provide administrators with a visual

account of the security breach as it is happening. This will help administrators implement new

policies and procedures to prevent future breaches in security. [2]

G.) Network Security Measures

Social engineering is an attempt to fraudulently access sensitive data from a user. Social

engineering is primarily accomplished by a person masquerading as someone the user trusts, then

asking for personal information such as passwords, usernames, bank account information and

social security numbers to name a few. Two different types of social engineering are used:

passive and active. Passive social engineering takes advantage of the unintended actions of a

user to gather information while active involves the user directly. [2] These types of attacks can

be prevented by implementing a social engineering policy. That policy would include bi-annual

mandatory training for all faculty, including IT professionals and administrators and students.

Faculty and students should also be tested by an outside third party to see if they fall prey to a

social engineering scam. These kinds of tests help keep the user on their toes and less

susceptible to a social engineering attack. The policy should also state users must comply with

the rules in regards to social engineering such as: do not open attachments from unknown users,

do not provide anyone with sensitive information, online transactions should only be made on

websites that use the https protocol and do not trust anyone requesting personal or sensitive

information. [7]

Malware, or malicious software, is a type of computer program designed to infect a

computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or

spyware. Protection against students or faculty willingly or unwillingly infecting computers with

malware starts with personal vigilance by training on social engineering techniques and

prevention. The requirement of a username to log-in to a computer for all students and faculty

can also protect against unintended malware infection by a student or faculty member. If a

student or faculty member intends to infect a computer with malware, knowing they will be

caught due to the required log-in may be a deterrent.

A computer’s second layer of defense against malware is through malware security

protection known as a host based intrusion detection system (IDS) or antivirus software.

Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will

periodically scan the computer and its files to detect and defeat malware. In addition, the

antivirus software can recognize and warn against previously unknown malware threats based on

technical features of the malware and warn against suspicious websites. Kaspersky was chosen

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

for the University because it is easy to use and install and its effective. There is no such thing as

100% protection against malware, but with personal vigilance and antivirus software, a computer

is as protected as it can be. [8]

H.) UMUC’s Liability Policy

Personal devices may be used on the wireless LAN with the acceptance of the BYOD

policy. The policy will be accepted by each user as he/she logs onto the WLAN with their

device. The end user will not be able to access the network without checking the “accept” button

on the login page. The BYOD policy will state that all personal devices logged into the network

will keep screen locks on, use device-tracking software and notify the college immediately if a

device is lost so that IT can wipe it clean. This will prevent sensitive information on the network

from ending up in the wrong hands. All students and faculty must also electronically sign a

document stating they will upload and maintain antivirus software on their device. [9] If the

end user does not comply with these requirements, he/she will not be allowed to participate in

the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a

device while connected to the network or the guest WiFi.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

References:

[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/

dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/

at_a_glance_c45-675579 .

[2] LabSim Network Pro. TestOut, 2016.

[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,

Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-

networking-816407.

[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,

Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/

connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.

[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:

http://www.sargentlock.com/products/product_overview.php?item_id=1878.

[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].

Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-

night-vision/LNB4163BW-1-p.

[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,

Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-

attacks-common-techniques-how-prevent-attack.

[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-

protect-against-it.

[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive

Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-

byod-campus.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579

https://www.lifewire.com/demilitarized-zone-computer-networking-816407

https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/

http://www.sargentlock.com/products/product_overview.php?item_id=1878

4MP High Definition IP Camera with Color Night Vision

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it

https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

StuDocu is not sponsored or endorsed by any college or university

Network Design Proposal Part 2

Fundamentals of Networking (University of Maryland University College)

StuDocu is not sponsored or endorsed by any college or university
Network Design Proposal Part 2
Fundamentals of Networking (University of Maryland University College)

Downloaded by Davidjh15 (davidjh15@gmail.com)

lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/document/university-of-maryland-university-college/fundamentals-of-networking/mandatory-assignments/network-design-proposal-part-2/2812307/view?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

https://www.studocu.com/en-us/course/university-of-maryland-university-college/fundamentals-of-networking/2405116?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Network Design Proposal:

Network Addressing &

Security (Part 2)

Prepared for:

University of Maryland University College

Prepared by:

Kellie Keiser

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

!

!
Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

Part A: IP Addressing

Proposed Subnet

Subnet Description Required Hosts

Classroom 1 (First Floor) 25 Computers

Classroom 2 (First Floor) 25 Computers

Classroom 4 (First Floor) 25 Computers

Classroom 1 (Second Floor) 25 Computers

Classroom 5 (Second Floor) 25 Computers

Office 5 – Admissions (Second Floor) 25 Computers

Student Computer Lab 25 Computers

Library 15 Computers

Subnet Network Address Host Address Range Broadcast
Address

Subnet Mask: 255.255.255.0

Classroom 1
(First Floor)

192.168.2.0 192.168.2.1 – 192.168.2.30 192.168.2.31

Classroom 2
(First Floor)

192.168.2.32 192.168.2. 33 – 192.168.2.62 192.168.2.63

Classroom 4
(First Floor)

192.168.2.64 192.168.2.65 – 192.168.2.94 192.168.2.95

Classroom 1
(Second Floor)

192.168.2.96 192.168.2.97 – 192.168.2.126 192.168.2.127

Classroom 5
(Second Floor)

192.168.2.128 192.168.2.129 – 192.168.2.158 192.168.2.159

Office 5 –
Admissions
(Second Floor)

192.168.2.160 192.168.2.161 – 192.168.2.190 192.168.2.191

Student
Computer Lab

192.168.2.192 192.168.2.193 – 192.168.2.222 192.168.2.223

Library 192.168.2.224 192.168.2.225 – 192.168.2.254 192.168.2.255

Wi-Fi Network 192.168.3.0 192.168.3.1 – 192.168.3.30 192.168.3.31

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Part B: Security

C.) Firewall: Network Based – Cisco ASA 5540 Series $3000

A Firewall is a device that secures a network from intruders. It acts as a lock between the

internet and a LAN requiring all traffic from the internet to pass through the firewall before

accessing any device within the network. There are two different types of firewalls: a host

based, which is a built in firewall that runs on a server or a network based, which is a hardware

appliance. For this campus, a network based firewall was chosen because they offer a stronger

defense barrier against intrusions and hackers. The Cisco Adaptive Security Appliance (ASA)

5540 series firewall is an identity-based network firewall which allows certain users and groups

to access the network. This enables simplified policy configuration, so administrators can write

policies that correspond to business rules—for increased security, enhanced ease of use, and

fewer policies to manage. [1]

D.) IDS vs. IPS

An IPS (Intrusion Prevention System) is a device that allows or prevents traffic from

accessing a network. The Cisco ASA 5540 series has an IPS module. The IPS module runs

advanced IPS software that provides proactive, full-featured intrusion prevention services to stop

malicious traffic, including worms and viruses, before they can affect a network. [1] For the

security of the University, the IPS module is the best option. An IDS (Intrusion Detection

System) wouldn’t prevent the malicious software from entering the network, which would be

detrimental to the University. Protecting University hardware and devices from cyber threats and

malware is one of the most important requirements of network security officer.

E.) DMZ

A De-Militarized Zone (DMZ) is a type of subnet that screens traffic between a private

network and an untrusted network such as the internet. [2] A DMZ zone is a network

configuration designed to segregate computers on each side of a firewall. A commercial DMZ

creates a separate subnet outside of the firewall containing one or multiple computers to better

protect the devices inside the firewall. [3] A router with a DMZ subnet allows access to the

DMZ from the WAN while the firewall is protecting the LAN. [4] A DMZ can also be

established using one or two firewalls. The single firewall solution uses multiple interfaces to

create multiple DMZ’s with multiple security zones. Each security zone can be created for

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

different levels of security: low, medium and high and anything in between. [2] For the

University campus, the best option is to create the DMZ’s using the existing hardware which is

the Cisco ASA firewall.

F.) Physical Security

Physical security is protection of the University’s information assets, IT services and

resources as well as ensuring safety of faculty and students. Physical security requires three

different areas of focus: prevention, detection and recovery. Prevention is key in any type of

security outline. It is easier to prevent an attack than it is to recover from an attack. [2]

Protecting the perimeter of the network and making sure the network is extremely difficult to

access helps prevent an attacker from attempting to breach the security in place. If a breach

occurs, being able to detect who breached the network and when, what was accessed and if it is

missing or damaged is of utmost importance. Finally, how a network recovers is paramount after

a breach to prevent any additional occurrences. If the network is breached, a review of the

physical security policy is required to determine how the breach occurred and if the security

profile has been sufficiently hardened. After review of the security policies in place, the

weakness allowing the breach should be corrected to prevent future attacks on the network. [2]

Protecting the buildings with S2 NetBox Online cloud-based access control system works

with existing infrastructure and peripheral devices allowing for seamless integration. The S2

System is scalable and allows the integration of third party access control devices such as the

Sargent Assa Abloy door locks.

The first step to take in physical security is protecting the buildings themselves with

Sargent Assa Abloy Harmony Exterior Door locks. Priced at $900 each including the trim, lever

and mortise box, the Harmony lock includes all access control capabilities such as card reader,

door position switch and request to exit monitoring sensors. The hardware is compatible will all

popular access control systems, such as the S2 NetBox Online system, and supports a variety of

openings while industry leading Grade 1 hardware offers the highest degree of physical security

available in access control locks. [5] These locks and the access control system will allow IT

professionals and administrators to prevent unauthorized access into the buildings on campus.

The interior Sargent Assa Abloy Passport PoE locks will be placed on each interior door. These

locks provide a cost-effective, future-proof solution for the campus while providing simultaneous

support for multiple credentials and offers an easy migration path to higher security credentials

and mobile access. [5] In addition to the locks, each faculty member will be assigned an access

card for entrance into their offices and student areas will only be accessible 8am thru 8pm. The

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

The interior and exterior doors will automatically lock at 8pm every night, barring entrance with

the exception of faculty with access cards. The doors will re-open at 8am every morning, again

with the exception of faculty access cards which will be permitted to access the buildings at any

time. The doors will allow exit with the request to exit monitoring sensors.

For access to the computers, each student will be given a username and password, which

will expire every 90 days. Students are permitted to access the buildings between the hours of

8am and 8pm. The students will only be able to access the network based computers with a

student log-in and password, provided by administration at time of registration. The password

will expire at the end of every semester and will only renew if the student is in good academic

standing, academically and financially.

The second step in physical security is protecting the perimeter of the buildings with

video surveillance of all exits and entrances within the two buildings. There should also be video

surveillance in common areas such as the lobby and stairways, the computer lab and library and

placed strategically throughout the hallways in both buildings. Surveillance should also be

placed outside the buildings on the lamp posts along the pathways connecting the two buildings.

The Lorex LNB4163 4MP High Definition IP indoor/outdoor Camera with Color Night Vision

bullet style surveillance cameras will be installed throughout the two new campus buildings.

They are priced at $200 each and require Cat5e PoE cables for installation. The camera has an

83 degree field of view, 2K resolution, 3.6mm lens, 4MP sensor and 130 feet maximum night

vision. To extend the distance, an 8 port 10/100Mbps + 1 Gigabit 802.3af PoE+ switch will be

placed in each building connecting all the cameras together. Each switch will cost $280 and will

be connected to the router and the router connected to the Network Video Recorder (NVR). The

NVR purchased will be the Lorex NR9326 priced at $1400. The NVR is capable of

incorporating up to 32 separate cameras with the assistance of the PoE switch and contains a 6

terabyte security certified hard drive. This NVR is capable of recording 4K video in real-time on

all 32 channels. One benefit of using a 4K security system is the additional resolution needed

during an incident, which will offer the best chance to capture useful evidence such as distinct

facial features. [6]

This hardware will be used to provide optimal security on the University campus. The

electronic locks will be used to help prevent a physical security breach in one of the buildings.

The surveillance camera’s will also aid in prevention, since they are a deterrent for people trying

to gain access to the buildings without authorization. The cameras are also used for detection

and recovery as they will record any nefarious acts, which will help law enforcement or

administrators determine the “who” and possibly the “what.” Finally, the cameras will aid in the

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

recovery portion of physical security because they will provide administrators with a visual

account of the security breach as it is happening. This will help administrators implement new

policies and procedures to prevent future breaches in security. [2]

G.) Network Security Measures

Social engineering is an attempt to fraudulently access sensitive data from a user. Social

engineering is primarily accomplished by a person masquerading as someone the user trusts, then

asking for personal information such as passwords, usernames, bank account information and

social security numbers to name a few. Two different types of social engineering are used:

passive and active. Passive social engineering takes advantage of the unintended actions of a

user to gather information while active involves the user directly. [2] These types of attacks can

be prevented by implementing a social engineering policy. That policy would include bi-annual

mandatory training for all faculty, including IT professionals and administrators and students.

Faculty and students should also be tested by an outside third party to see if they fall prey to a

social engineering scam. These kinds of tests help keep the user on their toes and less

susceptible to a social engineering attack. The policy should also state users must comply with

the rules in regards to social engineering such as: do not open attachments from unknown users,

do not provide anyone with sensitive information, online transactions should only be made on

websites that use the https protocol and do not trust anyone requesting personal or sensitive

information. [7]

Malware, or malicious software, is a type of computer program designed to infect a

computer and inflict harm. Malware can be anything from a virus to a worm or a Trojan or

spyware. Protection against students or faculty willingly or unwillingly infecting computers with

malware starts with personal vigilance by training on social engineering techniques and

prevention. The requirement of a username to log-in to a computer for all students and faculty

can also protect against unintended malware infection by a student or faculty member. If a

student or faculty member intends to infect a computer with malware, knowing they will be

caught due to the required log-in may be a deterrent.

A computer’s second layer of defense against malware is through malware security

protection known as a host based intrusion detection system (IDS) or antivirus software.

Antivirus software such as Kaspersky Antivirus can be uploaded onto a computer where it will

periodically scan the computer and its files to detect and defeat malware. In addition, the

antivirus software can recognize and warn against previously unknown malware threats based on

technical features of the malware and warn against suspicious websites. Kaspersky was chosen

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

for the University because it is easy to use and install and its effective. There is no such thing as

100% protection against malware, but with personal vigilance and antivirus software, a computer

is as protected as it can be. [8]

H.) UMUC’s Liability Policy

Personal devices may be used on the wireless LAN with the acceptance of the BYOD

policy. The policy will be accepted by each user as he/she logs onto the WLAN with their

device. The end user will not be able to access the network without checking the “accept” button

on the login page. The BYOD policy will state that all personal devices logged into the network

will keep screen locks on, use device-tracking software and notify the college immediately if a

device is lost so that IT can wipe it clean. This will prevent sensitive information on the network

from ending up in the wrong hands. All students and faculty must also electronically sign a

document stating they will upload and maintain antivirus software on their device. [9] If the

end user does not comply with these requirements, he/she will not be allowed to participate in

the BYOD program at UMUC. Furthermore, UMUC will not be liable for any damages to a

device while connected to the network or the guest WiFi.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

References:

[1] “Cisco Identity-Based Firewalls”, Cisco.com. [Online]. Available: https://www.cisco.com/c/

dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/

at_a_glance_c45-675579 .

[2] LabSim Network Pro. TestOut, 2016.

[3] B. Mitchell, “Does your home computer network have a Demilitarized Zone (DMZ)?”,

Lifewire, 2017. [Online]. Available: https://www.lifewire.com/demilitarized-zone-computer-

networking-816407.

[4] “What’s the difference between DMZ Host and DMZ Subnet? – DrayTek Corp.”,

Draytek.com, 2018. [Online]. Available: https://www.draytek.com/en/faq/faq-connectivity/

connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/.

[5] “Harmony Mortise Lock Overview by SARGENT”, Sargentlock.com. [Online]. Available:

http://www.sargentlock.com/products/product_overview.php?item_id=1878.

[6] “4MP High Definition IP Camera with Color Night Vision”, Lorex Technology. [Online].

Available: https://www.lorextechnology.com/hd-ip-camera/1080p-4mp-ip-camera-with-color-

night-vision/LNB4163BW-1-p.

[7] N. Lord, “Social Engineering Attacks: Common Techniques & How to Prevent an Attack”,

Digital Guardian, 2018. [Online]. Available: https://digitalguardian.com/blog/social-engineering-

attacks-common-techniques-how-prevent-attack.

[8] “What is Malware and How to Defend Against It?”, Usa.kaspersky.com. [Online]. Available:

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-

protect-against-it.

[9] M. Delaney, “The ABCs of BYOD on Campus”, Technology Solutions That Drive

Education, 2013. [Online]. Available: https://edtechmagazine.com/higher/article/2013/08/abcs-

byod-campus.

Downloaded by Davidjh15 (davidjh15@gmail.com)
lOMoARcPSD|3241324

https://www.cisco.com/c/dam/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/at_a_glance_c45-675579

https://www.lifewire.com/demilitarized-zone-computer-networking-816407

https://www.draytek.com/en/faq/faq-connectivity/connectivity.lan/whats-the-difference-between-dmz-host-and-dmz-subnet/

http://www.sargentlock.com/products/product_overview.php?item_id=1878

4MP High Definition IP Camera with Color Night Vision

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack

https://usa.kaspersky.com/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it

https://edtechmagazine.com/higher/article/2013/08/abcs-byod-campus

https://www.studocu.com/en-us?utm_campaign=shared-document&utm_source=studocu-document&utm_medium=social_sharing&utm_content=network-design-proposal-part-2

Network

Design Proposal Template

Network Design Proposal

Prepared for:

University of Maryland University

C

ollege

Prepared by:

Student Name

I. Network Design

A

. Network Topology

Technical Requirements

In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information,
feel free to ask your instructor or make some assumptions
. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).

Example (

Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that students and faculty health, well­being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).

Proposed Topology

Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution
.

B

e specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (

https://www.draw.io

) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.

Example (
Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Furthermore, you must include a chart comparing and contrasting the different options available to meet the requirement. An example is provided below and should be used as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).

The following business case analysis show the three potential hardware solutions to the requirement provided. The visual presents the ability for the reader to understand the variables considered during the analysis of the three potential hardware solutions.

[The requirements are on the top row. The green in the table shows options that meet requirements, red does not, and blue exceeds requirements. As you can see in the above table, not all requirements can be met. You will need to explain in your Justification why the selection you made gives the school the best available option for the cost. The options that meet or exceed the requirements may cost too much. Your job is to decide what the best option is and present it to management. So, based on the requirements, which phone would you select for meeting those requirements at the least cost?]

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.

Example (
Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).

B. Cables and Connectors

Note: (Students should consider the needs for both a wired and wireless implementation as your proposal should include both.)

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Cables and Connectors

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify

your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students

C. Networking and Internetworking Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Networking and Internetworking Devices

This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

D. Wide Area Network (WAN) Design

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Wide Area Network (WAN) Design

This section should be used to provide the details of your proposed Internet Service Provider (ISP) solution. Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Students should connect to the ISP with two different technologies. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

E. Computer Systems Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Computer Systems Hardware

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

II. Network Addressing and Security

A. Subnetting

Overview

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address

192.168.22.0

. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.

Class

Octet Decimal Range

A

1 – 126

B

128 – 191

C

192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.

Class

A

B

C

Subnet Mask

Format

255.0.0.0

Network.Host.Host.Host

255.255.0.0

Network.Network.Host.Host

255.255.255.0

Network.Network.Network.Host

CIDR (Classless Inter Domain Routing)

CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.

· Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation, it would be written as /8, means address has 8 bits on.

· Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation, it would be written as /16, means address has 16 bits on.

· Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation, it would be written as /24, means address has 24 bits on.

Technical Requirements

UMUC has not decided how they will use all of the physical space within the newly leased building, but the diagrams below convey the proposed end state. However, they have decided to use some of the space in the short term. In doing so, we will proceed with the proposed plan. Initially, the building will house
5 classrooms, 1 student computer lab, 1 library, and 1 office
.

· In the below building diagrams, we will use Office 5 (Admissions) on the first floor. Each office will have 1 computer for staff use, with the exception of the admissions office, which will have 5 computers. Based on the subnetting performed above, we may be able to add more devices in the future.

· The classrooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each classroom will have a closet. Each classroom will have 25 devices: 23 student computers, 1 instructor computer, and 1 server in the closet, for instructional use.

· Students should consider high traffic areas for Wi-Fi, such as the sitting areas and not the classrooms. The Wi-Fi network should be segregated from the wired network and implemented on a separate Class C network. What will the network address, range, and broadcast address for this separate Class C wireless address be?

 

· In addition, there will be a student computer lab that will provide computer access to students to do their homework. The student computer lab is located on the second floor. There will be 24 computers in this lab and 1 server in the closet.

· To allow students access to library resources, the library will also have 10 computers for the general public to use and 5 computers for library staff.

· There will be two server rooms, one on the first floor and one on the second floor.

To be clear, the diagram below conveys the proposed end state.

Given the aforementioned scenario, we are going to use the 192.168.3.0 network and create a total of 8 subnets, with 25 possible hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.

25 Computers

25 Computers

25 Computers

25 Computers

25 Computers

25 Computers

Subnet Description

Required Hosts

Classroom 1 (First Floor)

25 Computers

Classroom 2 (First Floor)

Classroom 4 (First Floor)

Classroom 1 (Second Floor)

Classroom 5 (Second Floor)

Office 5 – Admissions (Second Floor)

Student Computer Lab

Library

15 Computers

Note: Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.

Proposed Subnet

Classroom 1 (First Floor)

Classroom 2 (First Floor)

192.168.22. _

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Classroom 1 (Second Floor)

Classroom 5 (Second Floor)

Office 5 – Admissions (Second Floor)

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Student Computer Lab

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Library

192.168.22. _

192.168.22. _ – 192.168.22. _

192.168.22. _

Subnet

Network Address

Host Address Range

Broadcast Address

Subnet Mask: 255.255.255. ___

192.168.22.0

192.168.22.1 – 192.168.22.30

192.168.22.31

192.168.22. _

192.168.22. _ – 192.168.22. _

Classroom 4 (First Floor)

192.168.22.96

192.168.22.97 – 192.168.22.126

192.168.22.127

192.168.22.128

192.168.22.129 – 192.168.22.158

192.168.22.159

Wi-Fi Network

192.__. __.__

192._._. _

– 192._._. _

192._._. _

B. Firewall Implementation

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Firewall Implementation

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

C. Intrusion Detection System / Intrusion Protection System

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Intrusion Detection System / Intrusion Protection System

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won’t IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

D. DMZ Implementation

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed DMZ Implementation

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

E. Physical Security Measures

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Physical Security Measures

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

F. Additional Network Security Measures

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network Security Measures

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

III. Network Customization and Optimization

A. Network and Cloud Based Storage

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the network and cloud based storage. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network and Cloud Based Storage

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions. Is it worthwhile to consider outsourcing some or all of the classrooms? Have all the costs been considered?

B. Data Protection and Backup

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the data protection and backup. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Data Protection and Backup

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Consider disaster recovery and options available for conducting classes, but also day to day operations of the offices. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

C. Network Monitoring

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to network monitoring. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Network Monitoring

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What monitoring systems are available and of them which would be the most advantageous for the UMUC to implement? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

D. Log Storage and Management

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the log storage and management. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Log Storage and Management

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What aggregating and analysis solutions are there and which one is best to choose from for UMUC? Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

E. Troubleshooting Methodology

Technical Requirements

In this section, you will assess UMUC’s technical requirements
related to the troubleshooting methodology. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Troubleshooting Methodology

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Present the isolation method for equipment and how you could find one bad end point or a cable that is bad between classroom 1 and the IT server closet. Student should be specific when discussing the methods, test equipment, and results.

Justification

This section should be used to
justify
your proposed solution based on the technical requirements and assumptions.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy