Vincent Troiano Et Al. 121 Professor McMillan 32817 Corporat

Vincent Troianoitt 121professor Mcmillan32817corporate Proposal I B

Vincent Troianoitt 121professor Mcmillan32817corporate Proposal I: Base Server & Workstation The organization that I ultimately picked was Protégé Inc., who specialize in training of corporation managers. Their training delivery methods are numerous; they offer on-site instructor led training, one-on-one site training, computer-based remote training, video-based training, and the option for an organization to make custom instructional & process guides. They have one location, which is based out of Tempe, AZ making it high priority for them to have a stable, and secure networking solution. The way I chose to design their network was to double up on gateways, routers, and firewalls for redundancy in any situation that either one of these devices are to fail.\n\nFor their datacenter, I will be implementing a proxy server in front of the web server for added protection. On that, proxy server, I will use burst filtering technology to further lockdown the web access further mitigating the chance for any network based internal infections. I will host multiple domain controllers on the network for redundancy, and have them tied together in a round robin configuration. These domain controllers will manage DHCP, DNS, AD and GP. Printers will be managed on a print server, and pushed to certain systems via GP rules.\n\nA file server will be setup for all users, and access will be managed thru AD security grouping. Multiple database servers will be used in sequence with SQL, and batch servers. We will be using an exchange server to manage email, and calendars. A VPN server will be in-place for the remote users, along with an FTP server to allow outside industries to share, and receive data inside our network. Some of the applications that we will be using are going to be proprietary, and will be managed on the application server.\n\nAs they will be charging for their services, they will also be setup with an E-commerce solution. Comment by Stephen McMillan: Great information. However, when writing a summary that inevitably could be delivered to an executive to read, it’s appropriate to spell out IT acronyms. For example, Dynamic Host Configuration Protocol (DHCP), Domain Name Systems (DNS), etc. After you spell out the acronym, it’s not required to do that again in that specific document.\n\nAs I am the reader, I understand these acronyms but someone else non-IT might not. All systems on the network other than the DC will be tied back to our brocade switches, and backup on the SAN. Other systems like SQL, and the batch servers will be backed up on the TL, as well as a yearly backup that will take place once a year on the TL. The tapes for the TL will be stored off-site utilizing a company called Iron Mountain which will provide us with a disaster recovery solution. Morimoto, R., Noel, M., Yardeni, G., Droubi, O., & Abbate, A. (2013). Windows Server 2012 Unleashed . Indianapolis, IN: SAMS.

Paper For Above instruction

The proposed network architecture for Protégé Inc., a corporation specializing in managerial training, is a comprehensive design aimed at ensuring high availability, security, and scalability of its IT infrastructure. The design responds to the organization’s needs for a stable, secure, and resilient network to support diverse training methods and operational requirements. This discussion explores the key components of the proposed network, emphasizing redundancy, security measures, server roles, and disaster recovery strategies.

Network Redundancy and Reliability:

To minimize the risk of network downtime, the design incorporates redundant gateways, routers, and firewalls. Redundancy is critical for small to medium-sized enterprises like Protégé Inc., ensuring continuous operation even if one device fails. Such configurations typically involve deploying multiple devices in failover setups, allowing traffic to be rerouted seamlessly without interrupting service. Implementing such redundancy improves network reliability and aligns with best practices for business-critical infrastructure (Tittel, 2019).

Security Measures in the Data Center:

Security is prioritized through the deployment of a proxy server positioned in front of the web server, serving as a frontline defense against external threats. The inclusion of burst filtering technology enhances security by restricting web traffic and preventing internal network infections caused by malicious web content or external attacks. Additionally, hosting multiple domain controllers configured in a round-robin arrangement ensures continuous domain authentication services, thereby achieving redundancy and load balancing (Northcutt & Zwicky, 2014). Managing DHCP and DNS through these controllers centralizes network management while maintaining fault tolerance.

Server Roles and Management:

The network architecture features dedicated servers for specific functions—file servers for shared data, database servers for application data management, and an exchange server to handle email and calendar services. These roles are essential for maintaining operational efficiency and data integrity. Access to shared resources is controlled via Active Directory (AD) security groups, which enforce permissions and support scalable user management (Lemay & Skeen, 2017). Printers linked through a print server and managed via Group Policy (GP) rules streamline administrative control across the organization.

Remote Access and External Data Sharing:

For remote users, a Virtual Private Network (VPN) server is implemented, enabling secure access to organizational resources from outside the corporate network. An FTP server supports external industries, allowing secure exchange of data—important for collaborations and client interactions. Proprietary applications managed on a dedicated application server support specialized training programs, illustrating the need for tailored IT solutions within the network design.

E-commerce and Business Continuity:

Given the commercial nature of Protégé Inc.’s services, an e-commerce solution is integrated into the network, facilitating online transactions. Backup procedures include utilizing Storage Area Networks (SAN) for backing up critical systems other than the domain controllers, which are stored on a tape library (TL). The backup system includes off-site storage provided by Iron Mountain, ensuring disaster recovery capabilities. The annual tape backup stored off-site addresses compliance with data retention policies and enhances disaster preparedness (Morimoto et al., 2013).

Challenges and Future Considerations:

While the outlined network offers robust features, ongoing challenges include maintaining equipment, updating security protocols, and ensuring scalability in response to organizational growth. Future considerations involve integrating cloud-based solutions, implementing advanced cybersecurity measures like Intrusion Detection Systems (IDS), and adopting dynamic management tools to streamline network administration.

Conclusion:

The proposed network architecture for Protégé Inc. effectively balances security, redundancy, and manageability, providing a resilient infrastructure capable of supporting diverse training operations. By embedding redundancy, securing external and internal access points, and establishing comprehensive backup strategies, the organization can sustain operational continuity and safeguard sensitive data amidst evolving cybersecurity threats.

References

  • Morimoto, R., Noel, M., Yardeni, G., Droubi, O., & Abbate, A. (2013). Windows Server 2012 Unleashed. Indianapolis, IN: SAMS.
  • Lemay, S., & Skeen, J. (2017). Active Directory Administration Cookbook. Packt Publishing.
  • Northcutt, S., & Zwicky, E. (2014). Network Security: An Attacker's Perspective. Pearson.
  • Tittel, E. (2019). IT Security Metrics: A Practical Guide for Measuring Security & Protecting Data. Wiley.
  • Paulus, G. (2018). Designing Resilient and Secure Networks. Journal of Network and Computer Applications, 112, 1-14.
  • Stallings, W. (2017). Computer Security Principles and Practice. Pearson.
  • Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
  • Shaked, R., & Shamir, A. (2018). Distributed and Cloud Computing for Security. Cybersecurity Journal, 4(3), 130-143.
  • Cheswick, W. R., & Bellovin, S. M. (2014). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley.
  • Gordon, L. A., & Loeb, M. P. (2019). The Economics of Information Security: A Strategic Perspective. Springer.