20
Group N – December 4 th , 2008 JEM Networking Solutions JEM Networking Solutions

Group N – December 4 th, 2008 JEM Networking Solutions

Embed Size (px)

Citation preview

Page 1: Group N – December 4 th, 2008 JEM Networking Solutions

Group N – December 4th, 2008

JEM Networking SolutionsJEM Networking Solutions

Page 2: Group N – December 4 th, 2008 JEM Networking Solutions

Critical PointsCritical Points A network planned and built around redundancy should be implemented

for facilitating XYZ Hospital’s needs and tasks. – 99.99% Uptime

A network that is easy to use, manipulate, and troubleshoot should be adopted.

As far as hardware it is XYZ Hospital’s best interest to disregard cost due to the nature of the business. However, JEM Networking will only supply the highest standards of price to quality products ratio.

All policies should govern the network to keep it secure, efficient, and productive.

A disaster recovery plan should be implemented in order to prepare for lost data, uncontrollable disasters, and hardware failure.

KightKight

Page 3: Group N – December 4 th, 2008 JEM Networking Solutions

Organized LayoutOrganized Layout Buildings connected through VPN Use of Switches, Routers, WAPs, P2PWAPs Simple and Efficient

DevicesDevices Routers/Switches

◦ Cisco - Linksys Gigabit Security Router with VPN RVS4000◦ Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer

SW P2PWAP/WAPs

◦ 5GHz Complete Wireless Bridge Kit◦ Cisco - Linksys Wireless-G Exterior Access Points

CAT6 Cable

KightKight

Page 4: Group N – December 4 th, 2008 JEM Networking Solutions

LaptopsLaptops Dell Vostro 1310

◦ Windows XP◦ Core 2 Duo - 1.8GHz◦ 3GB DDR2◦ 160 GB Hard Drive

ServersServers Servers – Alpha / Bravo IBM System x3350

◦ Windows Server 2003◦ 8GB RAM◦ RAID 0+1, 5 Capable◦ Xeon 3.0Ghz/12MB/1333 MHz

WorkstationsWorkstations Dell Precision T3400

◦ Windows XP◦ Intel Q6600 2.4GHz

Processor◦ 2GB RAM, DDR2◦ 160 GB Hard Drive◦ 19” Widescreen Flat Panel

KennedyKennedy

Page 5: Group N – December 4 th, 2008 JEM Networking Solutions

Primary Server

172.16.0.1

Backup Server

172.16.0.2

Datacenter

P2P in case internet goes down,Data still accessible

P2P WAP

2 Router

2 Server

5 Switch

22Wireless

access point

4Laptop

computer

4 PC

5 Printer

1 Ethernet

2 Firewall

Symbol Count Description

Legend Subtitle

Legend

4 FL

1 FL

2 FL

3 FL

VPN

Hospital

DATA-Switch1:

172.16.0.3

DATA-RouterA:

90.44.22.5

MAIN-RouterA: 90.44.22.6

DATA-P2PWAP: 172.16.0.8

MAIN-P2PWAP: 172.16.0.9

.10 .11 .12 .13 .14

.15 .16 .17 .18 .19

.20 .21 .22 .23 .24

.25 .26 .27 .28 .29

MAIN-Switch1: 172.16.0.4

MAIN-Switch2: 172.16.0.5

MAIN-Switch3: 172.16.0.6

MAIN-Switch4: 172.16.0.7

MAINPRINTER1:

172.16.0.34

MAINPRINTER2:

172.16.0.35

MAINPRINTER3:

172.16.0.36

MAINPRINTER4:

172.16.0.37

DATAPRINTER1: 172.16.0.33

McCaughanMcCaughan

Page 6: Group N – December 4 th, 2008 JEM Networking Solutions

200'

ALPHA(Primary Server) BRAVO (Backup Server)

DATA-Router1

DATA-P2PWAP

DATA-Printer1

DATA-Switch1

Public OutreachCounseling

Office Manager

IT

VPN

200'

200'

To...MAIN-P2PWAP

McCaughanMcCaughan

Page 7: Group N – December 4 th, 2008 JEM Networking Solutions

Up

1' 2.5" Rise: 14' 6" Run

0' 8" Rise: 8' Run200'

200'

MAIN-Printer1

MAIN-WAP1A

MAIN-WAP1B

MAIN-WAP1C

MAIN-WAP1D

MAIN-WAP1E

Director

Reception/Patient Info

MAIN-P2PWAP

MAIN-Router1

MAIN-Switch1

Accounting/Billing/Human Resources

Chief Medical Officer

200'

200'

To...DATA-P2PWAP

VPN

McCaughanMcCaughan

Page 8: Group N – December 4 th, 2008 JEM Networking Solutions

McCaughanMcCaughanU

p

200'

200'

Reception/Patient Info

MAIN-WAP2A

MAIN-WAP2B

MAIN-WAP2C

MAIN-WAP2D

MAIN-WAP2E

MAIN-SWITCH2

MAIN-PRINTER2

Shared Doctors Office

200'

200'

Page 9: Group N – December 4 th, 2008 JEM Networking Solutions

McCaughanMcCaughanU

p

200'

200'

Reception/Patient Info

MAIN-WAP3A

MAIN-WAP3B

MAIN-WAP3C

MAIN-WAP3D

MAIN-WAP3E

MAIN-Switch3

MAIN-Printer3

200'

200'

Page 10: Group N – December 4 th, 2008 JEM Networking Solutions

KennedyKennedy

Quantity of Items Hardware/Devices Price

x2 IBM x3350 Server $5500 Each

x30 CyberPower Cp600LCD 340W $30 Each

x1 Guardian Elite 100 kW Generator

$18,800 Each

x6 1000ft Shielded CAT6 Cable $170 Each

x1 Cisco Basic 5GHz Complete Wireless Bridge Kit

$1000 Each

x20 The Linksys Wireless-G Exterior Access Point

$500 Each

x25 Dell Precision T3400 $1020 Each

x200 Dell Vostro 1310 Laptops $729 Each

x5 Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD

Multilayer SW

$3200 Each

x4 Linksys 4 Port Gigabit Security Router with VPN RVS4000

$160 Each

x5 Dell 2335dn Laser Printer $449 EachTotal: $232,905

Page 11: Group N – December 4 th, 2008 JEM Networking Solutions

ESET ESET Firewall Virus Protection Anti-Spam Mail Filter

WPA2WPA2 Wi-Fi Protected Access Wi-Fi Alliance Approved

PGPPGP Pretty Good Privacy Data Encryption

Security SoftwareSecurity Software

BarkiewiczBarkiewicz

Page 12: Group N – December 4 th, 2008 JEM Networking Solutions

Hot SiteHot Site CA ARCserve Replication and Failover to a replica server Dual Back Up Variety of OS support Base Suite

UtilitiesUtilities Onsite Hardware

o Gas Generatoro Backup Device Batteries

BarkiewiczBarkiewicz

Disaster RecoveryDisaster Recovery

Page 13: Group N – December 4 th, 2008 JEM Networking Solutions

PolicesPolices Natural Disasters Differential Backup Utilization Dual Back-Up Planning UPS

◦ Testing◦ Usage

RAID 5 System

Disaster RecoveryDisaster Recovery

BarkiewiczBarkiewicz

Hardware Computers System Network ApplicationsDown Time: MAX 10 Minutes MAX 10 Minutes MAX 10 Minutes

Page 14: Group N – December 4 th, 2008 JEM Networking Solutions

Email Policy◦ Prohibit creation or distribution of offensive

messages◦ Accounts not to be used for personal reasons◦ No expectation of privacy

Internet Hardware Policy◦ Equipment must be administered by approved

personnel◦ Must be configured accordingly

MachnicMachnic

Page 15: Group N – December 4 th, 2008 JEM Networking Solutions

Internet Access Policy◦ Prohibited uses including sites with blocked content◦ May not illegally copy material that is copyrighted◦ No communication of sensitive material◦ Must access Internet through approved firewall◦ Users waive right to privacy

Wireless Communication Policy◦ All wireless devices must comply with company policy◦ Use of authentication techniques

MachnicMachnic

Page 16: Group N – December 4 th, 2008 JEM Networking Solutions

Naming Conventions◦ Primary server named Alpha; secondary named

Bravo◦ Other components use abbreviated hierarchy

including building, department, component type, and number MAINHRWS1 – MAIN building, Human Resources

Department, Workstation, 1

MachnicMachnic

Page 17: Group N – December 4 th, 2008 JEM Networking Solutions

SecuritySecurity Passwords

◦ Minimum 14 characters for administrators◦ Minimum 7 characters for other users◦ Combination of:

Numbers, letters and symbols Both upper and lower case characters No dictionary words

◦ Changed every 90 days◦ Not based on personal information◦ Ensures security to systems

Physical◦ Computers and towers locked down at all times◦ Activated password protection screen savers◦ Biometric hand scanner used for securing server room

Security PoliciesSecurity Policies

MachnicMachnic

Page 18: Group N – December 4 th, 2008 JEM Networking Solutions

LoggingLogging Firewall

◦ Configured to detect emergencies◦ Detects alerts, critical conditions and error

messages◦ Logs and detects multiple failed login attempts

Retention◦ Health information: 6 Years◦ Network and System logs: 90 days includes:

Operating system logs Email records Software violation logs IDS software logs

Security PoliciesSecurity Policies

MachnicMachnic

Page 19: Group N – December 4 th, 2008 JEM Networking Solutions

AccessAccess User Account

◦ Made by management◦ Consequences for misuse

Degrading performance of systems Controlling systems Create programs to gain unauthorized access

◦ Personal devices are prohibited

Wireless◦ WAP abide by regulations and laws◦ Require user authentication ◦ Wireless Passwords and data must be encrypted

Security PoliciesSecurity Policies

MachnicMachnic

Page 20: Group N – December 4 th, 2008 JEM Networking Solutions

Group NGroup N