Download RFPWoodgroveBankJBHickmanmODFQ03

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Computer network wikipedia , lookup

Server Message Block wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Dynamic Host Configuration Protocol wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

Lag wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Distributed firewall wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
WOODGROVE BANK
Proposal To Re-Design
The Woodgrove Bank
Network
Blake Hickman
3/2/2012
Contents:
1.
2.
3.
4.
5.
Executive Overview
Network Infrastructure Design
Security
Business Continuity Plan
Network Map
Proposal To Re-Design The Woodgrove Bank Network
1. Executive Overview
Over the last few years, Woodgrove Bank has suffered from a number of issues
including: hacker attacks, security issues involving missing security patches, outdated
virus protection, missing patches and updates to the operating systems throughout the
network. Woodgrove Bank is also in need of upgrading its’ business continuity plan to
respond to these and other issues. This has caused serious down time for Woodgrove
Bank and its clients. Due to the new overhaul of the entire Woodgrove Bank network and
addition of the new sites in North America, Woodgrove Bank will deploy a new network
infrastructure compliant with security requirements which will secure all new and
existing contracts with their clients.
The new design that I propose will improve security throughout the entire
network as well as individually at each site. It will have protection from hackers attacks
by upgrading all servers and computers to the latest and most secure operating systems:
Windows Server 2008 R2 and Windows 7 Service Pack 1. Monitoring applications will
be installed to help detect and deter attacks. Network configuration settings will be
enhanced which will help combat against unauthorized access to the network and data.
Security patches as well as updates to the operating systems will be updated regularly.
Virus protection will be updated and automated to insure the maximum protection
available. Remote Access to the network will be secure and limited to only those
computers that meet Woodgrove Bank’s access/security policy. Incorporating secure
authentication by Smart Card is a top priority. Performance will increase due to new
hardware and software configurations. Woodgrove Bank and their clients will have
minimal downtime and maximum availability for vital software and data. Backups and a
1
Proposal To Re-Design The Woodgrove Bank Network
detailed business continuity plan will be in place to handle internal and external threats,
prevention of and recovery from those threats, and plans for continued operations from
disruption from natural or man-made hazards.
The network design proposed here will save Woodgrove Bank thousands of
dollars because of the new room for future network growth, a more secure network, a
minimal downtime strategy, centralized and minimal administration structure, and the
many other benefits of my plan. This network layout is simple and cost effective, yet
exceeds industry standards. Using my proposal and the newest technology on today’s
market will insure Woodgrove Bank’s future in a highly competitive world.
2. Network Infrastructure Design
Hardware
Each individual sites network infrastructure will consist of a star topology, CAT
5e networking cables, gigabit network switches, and two new HP Hyper-V enabled
servers for redundancy (Microsoft). Microsoft Hyper-V Server 2008 R2 is a platform that
allows you to use one physical server to run multiple virtual sessions consolidating the
workload. It improves the server utilization, decreases costs, and has a small footprint and
little overhead (Microsoft). All servers will have RAID 10 (RAID 1+0) on each logical
drive (the OS has a dedicated drive) (Microsoft Support, 2006). The operating system
will be Windows Server 2008 R2 Enterprise Edition 64bit (which has licensing for 4
virtual machines per OS installation) on each physical server. All virtual servers will run
Windows Server 2008 R2 Standard or Windows Server 2008 Core. Windows 7
Professional Service Pack 1 will be used for all Woodgrove Bank desktops and laptops.
2
Proposal To Re-Design The Woodgrove Bank Network
Main Server Services Snapshot
Server 1 – Hyper-V - Windows Server 2008 R2 Enterprise Edition 64bit
1.
2.
3.
4.
VM – Primary DC, DNS, DHCP - Windows Server 2008 R2 Standard
VM – Print & File Services - Windows Server 2008 R2 Standard
VM – RRAS, NAP, WSUS, Antivirus - Windows Server 2008 R2 Standard
VM – Active Directory Certificate Services* - Windows Server 2008 R2 Standard
*Only on the Main Branch in NYC & turned off when not in use.
(This VM server will host the Enterprise Certification Authority)
Server 2 – Hyper-V - Windows Server 2008 R2 Enterprise Ed 64bit
1. VM – Backup DC, DNS, DHCP - Windows Server 2008 R2 Standard
2. VM – Backup Print & File Services - Windows Server 2008 R2 Standard
3. VM – Windows Server Backup & Symantec Backup- Windows Server 2008 Core
Server Configuration
For just the NYC site –
Summary: Two host servers with seven VM sessions.
3
Proposal To Re-Design The Woodgrove Bank Network
Server Configuration
For all other sites –
Summary: Two host servers with three VM sessions on each (total of six VM sessions).
Deployment Strategy
All servers will be initially built and configured at their respected sites; excluding
the new branch locations. In North America, Toronto will be the testing and distribution
center for its new branch locations: Vancouver and Calgary; and New York City will be
the testing and distribution center for Seattle and its new branch locations: Redmond,
Bellevue, Tacoma, and Spokane. Once the initial build-out is completed for the newly
added branches the servers will be sent to their respected locations (additional
configurations will be done after the new servers are in place). Once the servers are
online, a few test desktops will be added to the new network. Once testing is complete,
each required site Admin team will use Windows Deployment Services to push out
4
Proposal To Re-Design The Woodgrove Bank Network
unattended installations of Windows 7 to each desktop/laptop not already running that
version of the OS (Microsoft TechNet). The local site network Admin and management
can make the call if any desktops and/or laptop need to be replace in order to run the new
OS.
Active Directory
Active Directory Domain Services (AD DS) will be used on Woodgrove Bank’s
network. Replication will be enabled on all Domain Controllers (DC) at each site. Due to
the company’s size and physical locations, the existing forest model can be used in the
new design. The trust configuration can be a two-way relationship. The major
organizational units within the Woodgrove Bank domain would be modeled after the
location of the sites (ie. NYC, London, Tokyo, etc.). Each geographical container has
another container for every division within the company (ie. Servers, Desktops, IT,
Executives, Managers, Staff, etc.). Separate Group Policies can be added to each OU and
delegation of administrating the OU can be given to the acting Admin at each location
(Microsoft TechNet).
Physical Location
North America Network Region
NYC – Main Regional Branch
Miami – Secondary Site Branch
Toronto – Secondary Site Branch
Canada’s new branch locations connected to Toronto
Vancouver – Remote Site Branch
Calgary – Remote Site Branch
Newly acquired regional bank in Washington State
Seattle – Secondary Site Branch
Redmond – Remote Site Branch
Bellevue – Remote Site Branch
Tacoma – Remote Site Branch
Spokane – Remote Site Branch
5
Proposal To Re-Design The Woodgrove Bank Network
Europe Network Region
London – Main Regional Branch
Paris – Secondary Site Branch
Lisbon – Secondary Site Branch
Asia Network Region
Tokyo – Main Regional Branch
Beijing – Secondary Site Branch
DHCP
Woodgrove Bank will need to install two DHCP servers at each Site. Each site
will have its own scope (see Scope layout). Each site’s DHCP scope will be split between
the two DHCP servers. This configuration will provide fault tolerance and improve
DHCP performance on this subnet (Davis, 2008). DHCP will be split between the
primary DHCP server on the local subnet and the secondary DHCP server on the network
using the 80/20 rule. This rule will exclude 20% of the addresses on the primary DHCP
server, and 80% of the addresses on the backup DHCP server (Microsoft TechNet). Each
site will mirror this DHCP setup (80/20 rule). The primary DHCP server will have a
majority of the IP addresses and the backup DHCP server will have the remaining 20%.
I have decided to incorporate super subnetting for some sites for more IP address
on the same network (some sites need more than 254 addresses within the network).The
Main and Secondary Site Branch has super subnetting for consistency and growth. In
each scope, DHCP will have Exclusions and Reservations defined for the following
network objects:
Routers & Servers & Switches, Etc – Exclusions (static assignment)
Secure Computers/Laptop – Reservations (DHCP)
Public Computers/Laptop – Reservations (DHCP)
Printers, and other devices – Reservations (DHCP)
6
Proposal To Re-Design The Woodgrove Bank Network
IP scheme
Each Region and site has a huge private IP scope for updates and expansion.
A class B IPv4 network scheme:
REGION
North America
SUBNET RANGE
172.16.x.x – 172.20.x.x
Europe
172.21.x.x – 172.25.x.x
Asia
172.26.x.x – 172.30.x.x
Lab/Testing
172.31.x.x
North America Region Scopes:
Site
NYC
Site
NYC
SUBNET RANGE
172.16.0.1 – 172.16.255.254
SUBNET MASK
255.255.0.0
Miami
172.17.0.1 – 172.17.255.254
255.255.0.0
Toronto
172.18.0.1 – 172.18.253.254
255.255.0.0
Vancouver
172.18.254.1 – 172.18.254.254
255.255.255.0
Calgary
172.18.255.1 – 172.18.255.254
255.255.255.0
Seattle
172.19.0.1 – 172.19.251.254
Redmond
172.19.252.1 – 172.19.252.254
255.255.255.0
Bellevue
172.19.253.1 – 172.19.253.254
255.255.255.0
Tacoma
172.19.254.1 – 172.19.254.254
255.255.255.0
Spokane
172.19.255.1 – 172.19.255.254
255.255.255.0
Network Object
Routers & Servers
255.255.0.0
SUBNET RANGE
172.16.0.1 – 172.16.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.16.1.1 – 172.16.99.254
255.255.0.0
Public Computers/Laptop
172.16.100.1 – 172.16.199.254
255.255.0.0
Printers, & devices
172.16.200.1 – 172.16.255.254
255.255.0.0
Site
Miami
Site
Toronto
Network Object
Routers & Servers
SUBNET RANGE
172.17.0.1 – 172.17.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.17.1.1 – 172.17.99.254
255.255.0.0
Public Computers/Laptop
172.17.100.1 – 172.17.199.254
255.255.0.0
Printers, & devices
172.17.200.1 – 172.17.255.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.18.0.1 – 172.18.0.254
SUBNET MASK
255.255.255.0
7
Proposal To Re-Design The Woodgrove Bank Network
Site
Vancouver
Site
Calgary
Site
Seattle
Site
Redmond
Site
Bellevue
Site
Tacoma
Secure Computers/Laptop
172.18.1.1 – 172.18.99.254
255.255.0.0
Public Computers/Laptop
172.18.100.1 – 172.18.199.254
255.255.0.0
Printers, & devices
172.18.200.1 – 172.18.253.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.18.254.1 – 172.18.254.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.18.254.50 – 172.18.254.99
255.255.255.0
Public Computers/Laptop
172.18.254.100 – 172.18.254.149
255.255.255.0
Printers, & devices
172.18.254.150 – 172.18.254.254
255.255.255.0
SUBNET RANGE
172.18.255.1 – 172.18.255.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.18.255.50 – 172.18.255.99
255.255.255.0
Public Computers/Laptop
172.18.255.100 – 172.18.255.149
255.255.255.0
Printers, & devices
172.18.255.150 – 172.18.255.254
255.255.255.0
SUBNET RANGE
172.19.0.1 – 172.19.0.254
SUBNET MASK
255.255.255.0
Network Object
Routers & Servers
Network Object
Routers & Servers
Secure Computers/Laptop
172.19.1.1 – 172.19.99.254
255.255.0.0
Public Computers/Laptop
172.19.100.1 – 172.19.199.254
255.255.0.0
Printers, & devices
172.19.200.1 – 172.19.251.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.19.252.1 – 172.19.252.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.19.252.50 – 172.19.252.99
255.255.255.0
Public Computers/Laptop
172.19.252.100 – 172.19.252.149
255.255.255.0
Printers, & devices
172.19.252.150 – 172.19.252.254
255.255.255.0
SUBNET RANGE
172.19.253.1 – 172.19.253.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.19.253.50 – 172.19.253.99
255.255.255.0
Public Computers/Laptop
172.19.253.100 – 172.19.253.149
255.255.255.0
Printers, & devices
172.19.253.150 – 172.19.253.254
255.255.255.0
SUBNET RANGE
172.19.254.1 – 172.19.254.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.19.254.50 – 172.19.254.99
255.255.255.0
Public Computers/Laptop
172.19.254.100 – 172.19.254.149
255.255.255.0
Printers, & devices
172.19.254.150 – 172.19.254.254
255.255.255.0
Network Object
Routers & Servers
Network Object
Routers & Servers
8
Proposal To Re-Design The Woodgrove Bank Network
Site
Spokane
Network Object
Routers & Servers
SUBNET RANGE
172.19.255.1 – 172.19.255.49
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.19.255.50 – 172.19.255.99
255.255.255.0
Public Computers/Laptop
172.19.255.100 – 172.19.255.149
255.255.255.0
Printers, & devices
172.19.255.150 – 172.19.255.254
255.255.255.0
Europe Region Scopes:
Site
London
Site
Paris
Site
Lisbon
Site
London
SUBNET RANGE
172.21.0.1 – 172.21.255.254
SUBNET MASK
255.255.0.0
Paris
172.22.0.1 – 172.22.255.254
255.255.0.0
Lisbon
172.23.0.1 – 172.23.253.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.21.0.1 – 172.21.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.21.1 – 172.21.99.254
255.255.0.0
Public Computers/Laptop
172.21.100.1 – 172.21.199.254
255.255.0.0
Printers, & devices
172.21.200.1 – 172.21.255.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.22.0.1 – 172.22.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.22.1.1 – 172.22.99.254
255.255.0.0
Public Computers/Laptop
172.22.100.1 – 172.22.199.254
255.255.0.0
Printers, & devices
172.22.200.1 – 172.22.255.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.23.0.1 – 172.23.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.23.1.1 – 172.23.99.254
255.255.0.0
Public Computers/Laptop
172.23.100.1 – 172.23.199.254
255.255.0.0
Printers, & devices
172.23.200.1 – 172.23.255.254
255.255.0.0
Asia Region Scopes:
Site
Tokyo
Beijing
Site
Tokyo
SUBNET RANGE
172.26.0.1 – 172.26.255.254
SUBNET MASK
255.255.0.0
172.27.0.1 – 172.27.255.254
255.255.0.0
Network Object
Routers & Servers
SUBNET RANGE
172.26.0.1 – 172.26.0.254
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.26.1.1 – 172.26.99.254
255.255.0.0
Public Computers/Laptop
172.26.100.1 – 172.26.199.254
255.255.0.0
9
Proposal To Re-Design The Woodgrove Bank Network
Site
Beijing
Printers, & devices
172.26.200.1 – 172.26.255.254
Network Object
Routers & Servers
SUBNET RANGE
172.27.0.1 – 172.27.0.254
255.255.0.0
SUBNET MASK
255.255.255.0
Secure Computers/Laptop
172.27.1.1 – 172.27.99.254
255.255.0.0
Public Computers/Laptop
172.27.100.1 – 172.27.199.254
255.255.0.0
Printers, & devices
172.27.200.1 – 172.27.255.254
255.255.0.0
DNS
It is essential that the design of the DNS namespace be created with Active
Directory in mind and that the namespace that exists on the Internet does not conflict
with Woodgrove Bank’s internal namespace (Microsoft Support, 2011). All DNS
namespaces for Woodgrove Bank, both external and internal, are being re-created as
follows:
External namespace:
WoodgroveBank.com
Internal namespace:
North America Network Region
internal.nyc.na.woodgrovebank.com
internal. miami.na.woodgrovebank.com
internal. toronto.na.woodgrovebank.com
internal. vancouver.na.woodgrovebank.com
internal. calgary.na.woodgrovebank.com
internal. seattle.na.woodgrovebank.com
internal. redmond.na.woodgrovebank.com
internal. bellevue.na.woodgrovebank.com
internal. tacoma.na.woodgrovebank.com
internal. spokane.na.woodgrovebank.com
Europe Network Region
internal. london.eur.woodgrovebank.com
internal. paris.eur.woodgrovebank.com
internal. lisbon.eur.woodgrovebank.com
Asia Network Region
internal. tokyo.asia.woodgrovebank.com
internal. Beijing.asia.woodgrovebank.com
10
Proposal To Re-Design The Woodgrove Bank Network
Each site will have internal and external DNS servers in addition to backup DNS
servers. The external DNS will be configured to use the ISP’s DNS servers. Active
Directory-integrated zone will be used to hold zone data in Active Directory. This will
provide writeable copies of the zone data, fault tolerance, and security. Secure Dynamic
DNS (DDNS) is only supported on Active Directory-integrated zones (Microsoft
TechNet). With secure DDNS, only domain members can register DNS records, and only
the same computer can modify those records. By increasing the number of servers that
have a copy of the zone database, you improve DNS performance. Each site will be
subdivided into child zones and site administrators will be delegated their part of the
domain name space (Microsoft TechNet). Multiple DNS servers at each site will provide
redundancy in case a server fails.
Wireless
At each site there will be two wireless networks using an infrastructure topology.
Having wireless networks will provide flexibility, productivity and scalability. It allows
people to move around and provide capabilities which traditional wired network
infrastructures cannot do. Users will be able to access resources in hard to reach places.
You can easily add hosts without increasing administrative efforts.
There will be one public wireless network for guests and another wireless network
secure and private for company use. The private network will use 802.1x as an
enforcement point for both wired and wireless clients (See Security Policy for more
information on 802.1x). The enforcement point will be configured as a RADIUS client to
the NAP server. On an 802.1x switch, VLANs will be defined to create compliant and
non-compliant networks. Client computers are assigned to the appropriate VLAN based
11
Proposal To Re-Design The Woodgrove Bank Network
on health compliance. In the Network Policies on the NAP server, identify the VLAN
that corresponds to the compliant and non-compliant networks (guests will be sent to the
non-compliant network and will not have access to the private network). As an additional
security measure, the Service Set Identifier (SSID) will be hidden.
RRAS
For remote access to the network, Woodgrove Bank will be using Routing and
Remote Access (RRAS). Routing and Remote Access in Windows Server 2008 has
enhanced security and manageability (Microsoft TechNet). With a Server Manager for
managing, SSTP tunneling protocol, VPN enforcement for Network Access Protection,
and a new cryptographic support, communication will be secure and meet the
requirements for VPN security (Microsoft TechNet).
This is part of the Network Policy and Access Services (NPAS) role which will
provides services for configuring network access for LAN and remote clients throughout
the network. Network Policy Server (NPS) will employ a RADIUS server and health
policies used with Network Access Protection (NAP).
Network Policy and Access Services will use Health Registration Authority
(HRA) to enforceme NAP security, Remote Access Service to provide Virtual Private
Networking (VPN) in conjunction with RRAS, Routing will provide Network Address
Translation (NAT) (Microsoft).
Network Access Protection (NAP) allows system health requirements
enforcement for connecting clients. It allows administrators to regulate network access
and communication based on a computer's compliance with health requirement policies.
NAP gives you the ability to restrict access for non-compliant computers as well as to
12
Proposal To Re-Design The Woodgrove Bank Network
provide access to updates or health update resources to allow computers to become
compliant.
Secure Socket Tunneling Protocol (SSTP) which uses HTTP over SSL to
establish the VPN connection will also be used. This will allow easier access through
firewalls and maintain a secure VPN connection.
WSUS
A Windows Server Update Services (WSUS) will be installed at each location to
allow a centralized point for updating software at that site. Having a WSUS server
installed will keep all computer operating systems updated and compliant. Employing a
WSUS service gives Woodgrove Bank the ability to control which updates computers can
receive, enforce the application of updates throughout the network, and significantly
reduce the traffic on the WAN by receiving updates from local WSUS servers rather than
using Internet links to receive updates (Sanders, 2008). The WSUS server at each site
will be synchronized using a parent-child relationship. Since each region is fairly
independent from the other regions, Woodgrove Bank will have a parent-child
relationship within each region. New York City, London, and Tokyo will each host a
parent WSUS server. From these parent WSUS servers, the approval lists and/or updates
will synchronize between all child servers. At the other locations a downstream child
WSUS server will be configured to point back to the parent WSUS server in their region.
The WSUS service will be configured as replica mode so that both updates and approvals
are synchronized to child servers. This will allow for centralized administration (Sanders,
2008). The exception to this are the Remote Site Branches: Vancouver, Calgary,
13
Proposal To Re-Design The Woodgrove Bank Network
Redmond, Bellevue, Tacoma, and Spokane. These will still have access to the MS
updates approval list but will download updates from the Microsoft Update Center.
File Servers
Each site will have a File server. Using the File Server role service adds the Share
and Storage Management console where you can manage the shared folders that are
available to network users, offline file settings on folders that allow for synchronization
of files in shared folders when the user disconnects and reconnects to the shared folder,
and disk partitions, volumes, and drive letters assigned to volumes.
File Server Resource Manager (FSRM) will also be used to help manage folders
and files on the file server. Using quotas, Woodgrove Bank can monitor or limit the disk
space used by files within a folder. Using file screening, they can monitor or control the
file types that can be saved in a folder. The reporting tools in FSRM will easily gather
statistics about files.
Adding the Distributed File System (DFS) service will provide a way to store
copies of shared folders on multiple servers. Using DFS provides fault tolerance of
shared folders by creating multiple copies, and improves shared folder access by placing
copies (replicas) of shared folders on servers that are closer to the users. Separate DFS
services will be on each region keeping them relatively independent from the other
regions.
Print Server
Each site will also have the Print Server role service installed. This will allow for
printer permissions which will control the actions that users can perform on a printer.
Printer permissions apply to both local and shared printers. In this network re-build we
14
Proposal To Re-Design The Woodgrove Bank Network
will be adding new network printers to each location. They will be listed in Active
Directory and deploy with Group Policy.
With the Print Server role Woodgrove Bank can use multiple printer objects for a
single physical print device to customize access to the printer based on job roles. When
configured, this will give priority to managers and executives. Printer pooling will also be
employed to provide load balancing between the printers.
3. Security Policy
Windows Server 2008 offers many tools for securing Woodgrove Bank’s servers.
Windows’ Security Configuration Wizard, Security Templates snap-in, and Security
Configuration and Analysis snap-in are some of those tools that Woodgrove Bank will be
using. Security Configuration Wizard will be used to create and apply server security
policy and keep Woodgrove Bank’s computers secure by checking for vulnerabilities.
Security Templates will be used to automatically restrict some privileges or local policies
for the network and allow for custom security policy to be built. Security Policy can be
applied by using Group Policy objects. Security Configuration and Analysis will be used
to ensure a sufficient level of security on each computer and analyze and configure local
computer security (Microsoft TechNet). Auditing will be enabled in the local security
policy or the Group Policy as needed.
802.1x authentication for both wired and wireless networks will use smart card
devices to authenticate wireless clients. In order to provide secure authentication, 802.1x
authentication will require a RADIUS server to centralize user account and authentication
information. A centralized database for user authentication is required to allow wireless
15
Proposal To Re-Design The Woodgrove Bank Network
clients to roam between cells but authenticate using the same account information. At a
minimum, the RADIUS server must have a server certificate. To support mutual
authentication, each client must also have a certificate.
Certificates
Certificates and encryption will be used to ensure security throughout the
network. Using existing certificates or after obtaining a certification from a reputable
vender, Woodgrove Bank will incorporate an Enterprise Certification Authority (CA). An
additional virtual machine will be built on the NYC server and configured as the root CA.
Afterwards it will be shut down and only reactivated when needed for additional security
(Zacker, 2009). Each other site will each have subordinate enterprise CA issued from the
parent CA in New York City.
4. Business Continuity Plan
Backup and Recovery
Backups would consist of a combination of Symantec backups to tape and local
Windows Server Backups. All virtual sessions will be backed up to tape every Saturday
using Symantec (each site has its own dedicated backup server and software) and those
tapes will then be stored off site at a secure location (Symantec). However, copies of each
VM session will be stored locally in addition to the copies on tape. Local Windows
Server Backups will be done weekly as well (Microsoft TechNet). This will insure that
all data and system states are recoverable.
16
Proposal To Re-Design The Woodgrove Bank Network
Disaster Recovery
Since all the servers are built on virtualization, rebuilding the infrastructure would
be as simple as restoring the latest backups of each VM session to new servers.
5. Network Map
17
Proposal To Re-Design The Woodgrove Bank Network
Bibliography
Davis, D. (2008, 9 8). How to Install and Configure Windows Server 2008 DHCP Server.
Retrieved 12 11, 2011, from WindowsNetworking.com:
http://www.windowsnetworking.com/articles_tutorials/How-to-Install-ConfigureWindows-Server-2008-DHCP-Server.html
Microsoft. (n.d.). Hyper-V Features. Retrieved 12 11, 2011, from Microsoft:
http://www.microsoft.com/en-us/server-cloud/windows-server/hyper-vfeatures.aspx
Microsoft Support. (2006, 11 1). Overview of Redundant Arrays of Inexpensive Disks
(RAID). Retrieved 12 11, 2011, from Microsoft Support:
http://support.microsoft.com/kb/100110
Microsoft Support. (2011, 9 11). DNS Namespace Planning. Retrieved 12 11, 2011, from
Microsoft Support: http://support.microsoft.com/kb/254680
Microsoft TechNet. (n.d.). 80/20 Rule. Retrieved 12 11, 2011, from Microsoft TechNet:
http://technet.microsoft.com/en-us/library/cc958936.aspx
Microsoft TechNet. (n.d.). Active Directory Structure and Storage Technologies.
Retrieved 12 11, 2011, from Microsoft TechNet: http://technet.microsoft.com/enus/library/cc759186(WS.10).aspx
Microsoft TechNet. (n.d.). How DNS Support for Active Directory Works. Retrieved 12
11, 2011, from Microsoft TechNet: http://technet.microsoft.com/enus/library/cc759550(WS.10).aspx
Microsoft TechNet. (n.d.). Namespace planning for DNS. Retrieved 11 12, 2011, from
Microsoft TechNet: http://technet.microsoft.com/enus/library/cc759036(WS.10).aspx
Microsoft TechNet. (n.d.). p-by-Step Guide for Windows Server 2008. Retrieved 12 11,
2011, from Microsoft TechNet:
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0
CGkQFjAA&url=http%3A%2F%2Ftechnet.microsoft.com%2Fenus%2Flibrary%2Fcc770266(v%3Dws.10).aspx&ei=LzLlTqX0CYqU2wXS9qC6
BA&usg=AFQjCNHfEi3WRXjOQ5or1w8ZYhqSM9uWTg&sig2=wZA6QqWOwGyNs9HHHAYhw
Microsoft TechNet. (n.d.). Routing and Remote Access. Retrieved 12 11, 2011, from
Microsoft TechNet: http://technet.microsoft.com/en-us/network/bb545655
Microsoft TechNet. (n.d.). Server Security Policy Management in Windows Server 2008.
Retrieved 12 11, 2011, from Microsoft TechNet: http://technet.microsoft.com/enus/library/cc754373(WS.10).aspx
Microsoft TechNet. (n.d.). What's New in Routing and Remote Access in Windows Server
2008. Retrieved 12 11, 2011, from Microsoft TechNet:
http://technet.microsoft.com/en-us/library/cc730711(WS.10).aspx
Microsoft TechNet. (n.d.). Windows Deployment Services. Retrieved 12 11, 2011, from
Microsoft TechNet: http://technet.microsoft.com/enus/library/cc772106(WS.10).aspx
Sanders, C. (2008, 5 6). Deploying Microsoft Windows Server Update Services. Retrieved
12 11, 2011, from WindowsNetworking.com:
http://www.windowsnetworking.com/articles_tutorials/deploying-microsoftwindows-server-update-services.html
18
Proposal To Re-Design The Woodgrove Bank Network
Symantec.com. (n.d.). Virtual Machine Protection with Symantec NetBackup 7. Retrieved
12 11, 2011, from Symantec.com:
http://eval.symantec.com/mktginfo/enterprise/white_papers/bsolution_overview_data_protection_vm_prot_with_sym_nbu7_WP_21003628.en
-us.pdf
Zacker, C. (2009). Windows Server 2008 Administrator. In C. Zacker, Windows Server
2008 Administrator (pp. 350-351). Hoboken: John Wiley & Sons.
19