Академический Документы
Профессиональный Документы
Культура Документы
DOCUMENTATION
PREPARED BY ARUL ARUNACHALAM
Introduction
This is a description about the server configuration along with the hardware peripherals and
network connection established in LSME (London School of Management Education). BT is the
telecom provider and Soho is the linker used. The connections are obtained via RDC (Remote
Desktop Connection), as the staff can login using their login details remotely. Each and every
employee is given their IP addresses and login details prior. The domain details have all been
listed at the back of every individual computer for the staff to use up and access.
Hardware peripherals that are used:
1.
2.
3.
4.
5.
6.
7.
DSL modems.
Cisco Interlinks.
Net gear wireless routers.
Ciscos patch panels.
Manageable Linksys switches.
Server for LSME.
And the respective domains available in LSME.
To start off with, the server room of the LSME is fixed up in the second floor called the
link server room. The line from BT is connected to the modem which gives the internet signals
as the output which is then fed into 8 port switch and connected to the CCTV surveillance.
Another internet link is connected to a NET gear wireless router for the staff to wirelessly access
the internet within the floor. Then the connections are taken over to the patch panels and directed
to the manageable link sys switches which obtains the connection from the server. Also, all the
domain computers are connected over the manageable Linksys switches.
Apart from the link server room, there are two classrooms with one computer for each room
installed for the staff i.e. the lecturer to use while taking classes for the students.
In the third floor above, there is an auditorium with just a single use computer connected to the
server and can be accessed only by the staff during any seminars or training sessions.
Second, its the IT lab with 26 systems connected to the server via Linksys switch.
There are certain limitations given to all the systems placed in the lab. Since students may have
to access the relevant data for their lab assessments and practicing to be done periodically.
The final part of the server connection is linked to the ground floor via a switch and a wireless
network router is provided for wireless internet access.
The ground floor consists of,
1. The reception which has a system and a printer that is connected to the network,
2. A staff room with four systems for the staff to access,
3. The director and the principal have their corresponding rooms with the director having a
sophisticated system and a Ricoh network printer in the room; while the principals room
has a system everything connected to the internet and accesses the server.
4. There is a Dr.Dollv rooms with two systems which is connected.
4
Hence the server configuration and connection in LSME has been detailed.
NOTE: CISCO routers are used. All the system details are provided in the rear. Student
accessible systems are all connected with certain restrictions of accessibility.
A remote access server is the computer and associated software that is set up to handle users
seeking access to network remotely. Sometimes called a communication server, a remote access
server usually includes or is associated with a firewall server to ensure security and a router that
can forward the remote access request to another part of the corporate network. A remote access
server may include or work with a modem pool manager so that a small group of modems can be
shared among a large number of intermittently present remote access users.
A remote access server may also be used as part of a virtual private network (VPN).
6
Remote user
When a person is working on a computer that is in another location, they are what is referred to
as a remote user. These connections are made using LAN using some form of remote access.
For example, someone using Windows Remote Desktop Connection to access another computer
in LSME is a remote user.
A remote user is a user who is operating a hardware device or accessing software from an off-site
location. IT professionals might also use this term to refer to someone accessing data through
various virtual computing models. Students are restricted to access data from server.
Networks have been able to accommodate remote users for quite some time, although brand-new
technologies are increasing the commonality of remote user situations. As the Internet developed,
tech products and services developed to allow remote servers to send data over Internet Protocol
resulting in a lot more remote users. Systems like network virtualization, which replaces physical
networking structures with a collection of remote endpoints, are prime tools for allowing even
more remote access to hardware and software systems.
Remote users are not allowing to view other users and admin files and
folders.
Remote users are not allowing to change or modify System date and time.
Remote users are not allowing to edit update or delete other users and admin
files and folders.
Remote users are not allowing to view and access System partitions and
network and harddrives.
Remote users are not allowing to install hardware peripherals like printers
etc.,
Remote users are not allowing to view external audio or video files.
Services
(AD DS)
environment
through
the
Group
Policy
Updated
Policy caching
New
Event logging
Updated
10
New
Updated
New
New
Sign-in optimizations
Updated
Fast Startup
New
New
Updated
Registry.pol changes
Updated
Updated
New
New
12
13
ADS Integration
Web Anti-Phishing Filter
Firewall (Inbound-Outbound Traffic Monitor & Control)
Privacy Protection/Browser Security
Endpoint Security with Application Control
Data Theft Prevention with USB / Firewire Control
File Reputation Services
Asset Management Tool & Network Activity Monitor
Support for SYSLOG, SNMP, NAC/NAP and VMware
Windows-based Rescue Disk
eScan Remote Support (ERS) / RDP
eScan Auto Back Up and Restore
Automatic Download of Critical Windows Hotfix
Self Protection Services
Automatic Compressed Updates
MailScan for Mail Servers***
Web Registration & Activation
Features of eScan
Real-Time AV Scanning
Winsock Layer Protection
Advanced Proactive Detection
Anti-Spyware, Anti-KeyLogger, Anti-Rootkit
On-Demand Scan
Anti-Spam (NILP, RBL, SURBL)
Two Way Firewall
Mail Anti-Phishing
Malware URL Filter
Rescue mode
Print Activity
USB Vaccination
Sample Upload
Web Protection
Web Anti Phishing
Privacy Protection
Export and Import Settings
Endpoint Security
USB Blocking with Password Management
Device Control
Blocking of AutoPlay of USB Devices
Recording of Files Copied to USB
17
Conclusion
18
has presented a strong security and back up data in user friendly manner. The following
document provides IP address for every system connected with the network.
19