Upload
cody-porter
View
212
Download
0
Tags:
Embed Size (px)
Citation preview
Group N – December 4th, 2008
JEM Networking SolutionsJEM Networking Solutions
Critical PointsCritical Points A network planned and built around redundancy should be implemented
for facilitating XYZ Hospital’s needs and tasks. – 99.99% Uptime
A network that is easy to use, manipulate, and troubleshoot should be adopted.
As far as hardware it is XYZ Hospital’s best interest to disregard cost due to the nature of the business. However, JEM Networking will only supply the highest standards of price to quality products ratio.
All policies should govern the network to keep it secure, efficient, and productive.
A disaster recovery plan should be implemented in order to prepare for lost data, uncontrollable disasters, and hardware failure.
KightKight
Organized LayoutOrganized Layout Buildings connected through VPN Use of Switches, Routers, WAPs, P2PWAPs Simple and Efficient
DevicesDevices Routers/Switches
◦ Cisco - Linksys Gigabit Security Router with VPN RVS4000◦ Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD Multilayer
SW P2PWAP/WAPs
◦ 5GHz Complete Wireless Bridge Kit◦ Cisco - Linksys Wireless-G Exterior Access Points
CAT6 Cable
KightKight
LaptopsLaptops Dell Vostro 1310
◦ Windows XP◦ Core 2 Duo - 1.8GHz◦ 3GB DDR2◦ 160 GB Hard Drive
ServersServers Servers – Alpha / Bravo IBM System x3350
◦ Windows Server 2003◦ 8GB RAM◦ RAID 0+1, 5 Capable◦ Xeon 3.0Ghz/12MB/1333 MHz
WorkstationsWorkstations Dell Precision T3400
◦ Windows XP◦ Intel Q6600 2.4GHz
Processor◦ 2GB RAM, DDR2◦ 160 GB Hard Drive◦ 19” Widescreen Flat Panel
KennedyKennedy
Primary Server
172.16.0.1
Backup Server
172.16.0.2
Datacenter
P2P in case internet goes down,Data still accessible
P2P WAP
2 Router
2 Server
5 Switch
22Wireless
access point
4Laptop
computer
4 PC
5 Printer
1 Ethernet
2 Firewall
Symbol Count Description
Legend Subtitle
Legend
4 FL
1 FL
2 FL
3 FL
VPN
Hospital
DATA-Switch1:
172.16.0.3
DATA-RouterA:
90.44.22.5
MAIN-RouterA: 90.44.22.6
DATA-P2PWAP: 172.16.0.8
MAIN-P2PWAP: 172.16.0.9
.10 .11 .12 .13 .14
.15 .16 .17 .18 .19
.20 .21 .22 .23 .24
.25 .26 .27 .28 .29
MAIN-Switch1: 172.16.0.4
MAIN-Switch2: 172.16.0.5
MAIN-Switch3: 172.16.0.6
MAIN-Switch4: 172.16.0.7
MAINPRINTER1:
172.16.0.34
MAINPRINTER2:
172.16.0.35
MAINPRINTER3:
172.16.0.36
MAINPRINTER4:
172.16.0.37
DATAPRINTER1: 172.16.0.33
McCaughanMcCaughan
200'
ALPHA(Primary Server) BRAVO (Backup Server)
DATA-Router1
DATA-P2PWAP
DATA-Printer1
DATA-Switch1
Public OutreachCounseling
Office Manager
IT
VPN
200'
200'
To...MAIN-P2PWAP
McCaughanMcCaughan
Up
1' 2.5" Rise: 14' 6" Run
0' 8" Rise: 8' Run200'
200'
MAIN-Printer1
MAIN-WAP1A
MAIN-WAP1B
MAIN-WAP1C
MAIN-WAP1D
MAIN-WAP1E
Director
Reception/Patient Info
MAIN-P2PWAP
MAIN-Router1
MAIN-Switch1
Accounting/Billing/Human Resources
Chief Medical Officer
200'
200'
To...DATA-P2PWAP
VPN
McCaughanMcCaughan
McCaughanMcCaughanU
p
200'
200'
Reception/Patient Info
MAIN-WAP2A
MAIN-WAP2B
MAIN-WAP2C
MAIN-WAP2D
MAIN-WAP2E
MAIN-SWITCH2
MAIN-PRINTER2
Shared Doctors Office
200'
200'
McCaughanMcCaughanU
p
200'
200'
Reception/Patient Info
MAIN-WAP3A
MAIN-WAP3B
MAIN-WAP3C
MAIN-WAP3D
MAIN-WAP3E
MAIN-Switch3
MAIN-Printer3
200'
200'
KennedyKennedy
Quantity of Items Hardware/Devices Price
x2 IBM x3350 Server $5500 Each
x30 CyberPower Cp600LCD 340W $30 Each
x1 Guardian Elite 100 kW Generator
$18,800 Each
x6 1000ft Shielded CAT6 Cable $170 Each
x1 Cisco Basic 5GHz Complete Wireless Bridge Kit
$1000 Each
x20 The Linksys Wireless-G Exterior Access Point
$500 Each
x25 Dell Precision T3400 $1020 Each
x200 Dell Vostro 1310 Laptops $729 Each
x5 Cisco 24 Port 10/100btx 2- GBIC Ports DC-Pwrd STD
Multilayer SW
$3200 Each
x4 Linksys 4 Port Gigabit Security Router with VPN RVS4000
$160 Each
x5 Dell 2335dn Laser Printer $449 EachTotal: $232,905
ESET ESET Firewall Virus Protection Anti-Spam Mail Filter
WPA2WPA2 Wi-Fi Protected Access Wi-Fi Alliance Approved
PGPPGP Pretty Good Privacy Data Encryption
Security SoftwareSecurity Software
BarkiewiczBarkiewicz
Hot SiteHot Site CA ARCserve Replication and Failover to a replica server Dual Back Up Variety of OS support Base Suite
UtilitiesUtilities Onsite Hardware
o Gas Generatoro Backup Device Batteries
BarkiewiczBarkiewicz
Disaster RecoveryDisaster Recovery
PolicesPolices Natural Disasters Differential Backup Utilization Dual Back-Up Planning UPS
◦ Testing◦ Usage
RAID 5 System
Disaster RecoveryDisaster Recovery
BarkiewiczBarkiewicz
Hardware Computers System Network ApplicationsDown Time: MAX 10 Minutes MAX 10 Minutes MAX 10 Minutes
Email Policy◦ Prohibit creation or distribution of offensive
messages◦ Accounts not to be used for personal reasons◦ No expectation of privacy
Internet Hardware Policy◦ Equipment must be administered by approved
personnel◦ Must be configured accordingly
MachnicMachnic
Internet Access Policy◦ Prohibited uses including sites with blocked content◦ May not illegally copy material that is copyrighted◦ No communication of sensitive material◦ Must access Internet through approved firewall◦ Users waive right to privacy
Wireless Communication Policy◦ All wireless devices must comply with company policy◦ Use of authentication techniques
MachnicMachnic
Naming Conventions◦ Primary server named Alpha; secondary named
Bravo◦ Other components use abbreviated hierarchy
including building, department, component type, and number MAINHRWS1 – MAIN building, Human Resources
Department, Workstation, 1
MachnicMachnic
SecuritySecurity Passwords
◦ Minimum 14 characters for administrators◦ Minimum 7 characters for other users◦ Combination of:
Numbers, letters and symbols Both upper and lower case characters No dictionary words
◦ Changed every 90 days◦ Not based on personal information◦ Ensures security to systems
Physical◦ Computers and towers locked down at all times◦ Activated password protection screen savers◦ Biometric hand scanner used for securing server room
Security PoliciesSecurity Policies
MachnicMachnic
LoggingLogging Firewall
◦ Configured to detect emergencies◦ Detects alerts, critical conditions and error
messages◦ Logs and detects multiple failed login attempts
Retention◦ Health information: 6 Years◦ Network and System logs: 90 days includes:
Operating system logs Email records Software violation logs IDS software logs
Security PoliciesSecurity Policies
MachnicMachnic
AccessAccess User Account
◦ Made by management◦ Consequences for misuse
Degrading performance of systems Controlling systems Create programs to gain unauthorized access
◦ Personal devices are prohibited
Wireless◦ WAP abide by regulations and laws◦ Require user authentication ◦ Wireless Passwords and data must be encrypted
Security PoliciesSecurity Policies
MachnicMachnic
Group NGroup N