Вы находитесь на странице: 1из 11

LAN Network

Design Plan

Taylor & Sons Financial Consulting

Presentation Agenda
1.
1. Physical
Physical Design
Design
2.
2. Logical
Logical Design
Design
3.
3. Information
Information Access
Access
4.
4. Security
Security
5.
5. Software
Software
6.
6. Recovery
Recovery Plan
Plan

Physical LAN Design


Third Floor Switch

Computers

Server
Second Floor Switch

Internet

Firewall

First Floor Switch

Computers

Computers

Logical
LAN
Agenda
or Summary
Design Layout
Comput
er

Compute
r
Switch

Server

Internet
Compute
r

Comput
er

Star Topology

Access

Information

Three Levels of Access


Executives (First Level)
Full access to all data,
information, and
computer applications
and software.
Administrator access to
change
all of the (Second Level)
Regular
Employees
employee
Access to login
computer data and all of its
information,
applications set specific
Temporary
Employees/Interns
(Third Level)
restrictions,
and have
proper
Read-only
access
to computer applications
access
to monitor
and its data.
computer
usage.

Information Access
Setup
IP Addresses
Each access level is going to have their
specific and own ranges of IP addresses.

Active Directory
Restrictions and their permissions for the individual employees
will have to be set by the executive staff according to what
position that employee holds within the company.
This specific directory is going to be used to create employees
usernames and passwords for each individual

Security
Firewall
Firewalls will have to be
set in place to protect
the access between
switches that are located
on each of the floors,
including the main server
Windows Server 2008 will
be used extensively to
set up the security
measures, as well as the
firewall.

Login
Security

Access is only going to be


allowed internally, within
the computer that is
located and part of the
network.
Unique and individual
logins are going to help
with security measures, as
the individual employees
will have their own
password. This is going to
help prevent any unwanted
access to unauthorized

Security
Continued

Restrictions

Computer systems will have their own restrictions.


This will help to prevent worms, viruses, and software
from slipping through a firewall and possibly getting
downloaded to the server.

MAC IP Addresses
A MAC IP address filter will be integrated within the
respected network. This will help prevent access to
the network.

Virus Protection
Every workstation is going to have Symantec Virus
Protection installed.
A weekly scan will be performed on every computer
on the network.

Software
Windows 7 Professional
All company computers will be using Windows 7 as their operating system
Windows 7 is able to allow a good connection between the system
workstations and the main server. Some, but not full access of file sharing
will be granted.
Primary email sources for the company will be ran through Windows live
mail.

Windows Server 2008

Windows Server 2008 will be the server software as well as a server.


This will make the access easier to deploy, as well as create
Windows Server 2008 also has a high quality firewall built in.

Symantec Virus Protection


All of the computer systems, as well as the server will have a virus
protection installed before connecting to the internet or used by any
employee.

Disaster Plan

Battery
Backup

Having a battery
backup is
important, in
case of a failure
in the servers
main power
supply.
Power Generator.

Data Backup
Hard drive back
up of the server
will be
completely on a
weekly basis.

Application
Backup

RAID system for


applications.

Questions
?

Вам также может понравиться