Senior Project Presentation

advertisement
Kenneth Anderson
David Gonzales
Logan Fernandez
Topics covered in proposal:




Server
Personal Computers
Network
Personal training




IT devices in the police headquarters:
65 IP telephones
29 IP printers
78 computers
2 servers
Workstation & Server report

It is a matter of note that the Server may be
among the most important element of any
computer network.
Data Storage (15TB Raid Supported)
Software Hosting
•Mostly for digital Evidence & Virtual machine
backup.
•Also hosting sensitive files & logs from the
workstations.
•In addition to raw data storage capacity our
server must be able to reliably host and run a
few key Software applications.
Connectivity Software
Dispatch Software
Mobility XE
“Mobility XE® is mobile VPN
software that boosts the
productivity of your workers in
the field and gives your business
the security and management
you need for all of your mobile
field mobile devices.”
www.netmotionwireless.com/m
obility-xe.aspx
DispatchNow Mobile
“Tiburon’s DispatchNow Mobile
is a robust solution for sharing
immediate and accurate
information between the
dispatch center and the field.
DispatchNow Mobile utilizes an
innovative map-driven user
interface to deliver essential
information quickly and
efficiently.”
www.tiburoninc.com/Products
/DispatchNow/DispatchNowM
obile.aspx
Physical
Virtualized
We believe that these
systems can be made to
run most reliably in a
virtualized environment
on the Server.
To fulfill theses needs we have selected Dell the dell owing to
Dell's history of solid hardware & support.
After some discussion we decided to uses a
Dell PowerEdge R520
Hardware
Specifications of Dell
PowerEdge R520:
Server price: $15,392.00
Chassis Configuration
3.5" Chassis with up to 8 Hard Drives
Processor
Intel Xeon E5-2450 2.10GHz, 20M Cache, 8.0GT/s QPI, Turbo, 8C,
95W, Max Mem 1600MHz
Additional Processor
No Additional Processor
Memory Configuration
Performance Optimized
Type
Memory DIMM Type and
1600 MHz RDIMMS
Speed
Memory Capacity
http://web.nmsu.edu/~kennya/I
CT435/Server_preposal.html
Operating System
Licenses
2GB RDIMM, 1600 MT/s, Standard Volt, Single Rank, x8 Data Width
Red Hat Enterprise Linux 6.2,Factory Install,x64,Req Lic&Sub
Selection
Red Hat Enterprise Linux,1-2SKT,3yr Subscription&License,1 virtual
guest
OS Media kits
No Media Required
RAID Configuration
RAID 5 for H710P/H710/H310 (3-8 HDDs)
RAID Controller
PERC H710 Integrated RAID Controller, 512MB NV Cache
Hard Drives
3TB 7.2K RPM Near-Line SAS 6Gbps 3.5in Hot-plug Hard Drive
Embedded Systems
Management
Basic Management
PCIe Riser
Risers with up to 4, 3x8 PCIe Slots + 1x16 PCIe Slots
Add-in Network Adapter Broadcom 5720 DP 1Gb Network Interface Card
Add-in Network Adapter On-Board Dual Gigabit Network Adapter
Power Supply
Single, Hot-plug DC Power Supply (1+0), 1100W
Power Cords
NEMA 5-15P to C13 Wall Plug, 125 Volt, 15 AMP, 10 Feet (3m), Power
Cord
System Documentation
Electronic System Documentation and OpenManage DVD Kit for R520
Virtualization Software
Citrix XenServer 6.x (DIB)
Virtualization Licenses
and Subscriptions
Hardware Support
Services
Citrix XenServer Enterprise Edition 3Yr Subscription Advantage
3 Year ProSupport and NBD On-site Service
While the Server may be the most important element of
this computer network, the workstations are where the
real day-to-day work takes place.
INTERCHANGEABILITY
Owing to the logistical and
technical issues that result from
managing a mishmash of
different hardware & software.
We have decided that if we are
to start ‘cold turkey’ that it
would be best if all our systems
were as identical to each other
as possible. Such homogeneity
would facilitate a quick and
cheap recovery in the event of a
serious problem either in
software or in hardware (Due to
recovery & reuse of
interchangeable parts).
UPGRADABILITY
In order to meet a
diversity of needs both
now and in the next
handful of years it is
necessary that any generic
system selected have the
capacity to be upgraded.
Proposed Hardware
To fulfill theses needs we have
selected the Dell Precision T1650
as our base system.
Dell Precision T1650:
Proposed Workstations
Hardware
specifications:
To the right are the base
System Hardware
specifications
We expect the base system to
cost around:
$708.00
For more advanced user
system requirement we
intend to simply upgrade
theses machines in order
to maintain the level of
uniformity necessary to
meet our goal of
interchangeability.
Processor
Operating
System
Dell Precision
T1650
Power Supplies
Memory
Graphics
Hard Drive
Configuration
Boot Hard Drive
3rd Gen Intel Core i3-3220 Processor (Dual
Core, 3.30GHz 3MB, w/HD2500 Graphics)
Windows 7 Professional, No Media, 64-bit,
English
Dell Precision T1650, Standard Base
275W Power Supply, 65 Percent
2GB, DDR3 UDIMM Memory, 1600MHz,
Non-ECC (1DIMM)
Intel Integrated HD Graphics
C1 SATA 3.5 Inch, 1 Hard Drive
250GB, 7200 RPM 3.5" SATA 6Gb/s Hard
Drive
DVD and Read16X DVD-ROM, SATA
Write Devices
Network AdapterIntegrated PCIE 10/100/1000
Monitor
Dell E2011H 20 Inch Flat Panel Display
Speakers
No Speaker option
Chassis Intrusion
None
Switch
Port Adapter
None
Keyboard
Dell USB Entry Business Keyboard, English
Mouse
Dell MS111 USB Optical Mouse
Productivity
Microsoft Office 2010 Pro
Software
Security Software None
No computer does anyone any good without
software, as such no statement on workstations
can be said to be compete without discussing
some of the Standard software that each station
will come equipped with.
Oracle’s Java platform has become a standard for
modern software applications both on the
web(Java Script) and on system applications. It is
therefore logical to include Java on all systems as
Standard.
Adobe PDF is an extremely popular document
format and while there are other applications
capable of displaying Adobe’s PDF format more
securely and quickly Adobe’s own reader is still
the standard. We have therefore decided to stick
to the standard.
While much of the web post IPhone boom has
been moving away from flash based applications
the number of Flash based websites is still quite
significant and therefore Adobe Flash player is
still a requirement. We have opted to include this
application despite its security issues due to the
need for functionality and compatibility.
Firefox is one of the most popular web browsers
in uses today and is much more frequently
updated (and therefore secure) than the default
Window’s web browser Internet explorer. Given
the number of web based application that the
Sheriff’s office must employ on a regular basis we
feel Firefox is a good pick as safe standard
browser to meet their needs.
It is difficult to find an office environments
without an office productivity software suite. (Be
it Microsoft Office, or Apache OpenOffice.) The
sheriff’s department is no exception to this rule.
So to fulfill the sheriff’s department's productivity
software needs we have selected the popular
Microsoft Office 2010 professional.
Proposed
Workstations
Software:
The standard software
needed on the
workstations are
comparable with most
business computers:
Java
Adobe Reader
Adobe Flash Player
Firefox web browser
Microsoft Office 2010
Professional
Specialized applications individual Officers may
require will have to be installed on each users
workstation by the Information Technology staff
on a case by case basis.



Subnetting and separation of groups
Router choice
Switch choice
Setting up a private address scheme:



Decided on a Class B address scheme:
172.16.0.1-172.31.255.254 /12
This will provide IP addresses needed for all
the subnets, and leave room for additional
addresses.
VLSM will be used to preserve IP addresses
Groups are separated by function. The groups are:





Printers: 172.16.1.0-172.16.1.63 /26
62 hosts
Phones: 172.16.0.0-172.16.0.127 /35
126 hosts
Administrative: 172.16.128-172.16.159 /27
30 hosts
Non-administrative (general): 172.16.0.128172.16.0.255 /25
126 hosts
Server/video camera:172.16.1.64-172.16.1.127 /26
62 hosts
Requirements of hardware:




ACL capability
Subnet configuration
Trunking capability for multiple switches
DMZ capability to protect servers
Cisco 3925E Integrated Service Router :


Capable of handling all subnetting and VLSM
required.
Can make virtual DMZ for servers.
Cisco SGE2010 48-port gigabyte switch:



Six would be used with VTP
POE capable for IP phones
Fast enough to handle load, and VLAN capable
All sensitive, classified, case,
personnel, and administrative files
will be stored on the server in a
system of encrypted directory
shared individually to only select
password protected personnel user
accounts. Access to these files will
be granted on an individual &
group (such as rank, division, ect.)
basis by department management
on a need to know basis.

We can set permissions on a user basis or a
computer basis. We can control what server
drives computers are mapped to base on the
OU they’re in. However file permissions may
be our biggest use for this technology.
• No administrator accounts for non-IT users. This will prevent
employees from installing any non approved software.
• Where necessary we could modify minor account rights.
• The primary focus here is to prohibit the instillation of non-work
related software on work systems.
• Possibly prevent viruses or Trojans from getting into the
network.


All Workstations will be configured to forward
a copy of their logs to the server for archiving.
We believe this measure will provide us with a
far more secure record of what was done on
each workstation for review in the event of an
incident.



Firewall will be implemented at the network
edge to help protect the internal network from
external threats.
All incoming network traffic will logged for
review of an incident.
As with the workstation logs, these logs will be
stored on the server

It can be said without reservation that people
are the most important part of any operation.
That policy’s regarding the utilization of
people is as such the cornerstone of any
organized operation be it a fortune 500
company or a simple sheriffs department.

Show them what screens should look like if
Windows or the Anti-virus detects something.
Grayed-out secure desktop, pop-up from the
legitimate anti-virus.
 Everything else should be determined as a trojan.

 Nothing should be clicked on until IT support looks at
it.

If you receive an email from an unknown
address:
Do not open any attachment or click any links.
 Do not send any information back.
 Verify the address with your supervisor or with IT
before doing anything.





Scan flash drives for viruses before opening
anything on the flash drive.
It does not take that much time.
By doing so you can root out some basic
viruses.
Autoruns will be disabled be default.


Do not use social media sites while at work.
Be careful what information you share while at home.
 The information you share can used to attack you and the
office
 Even if you share with those that are friends or family.
 Accounts can be hacked and personal details shared can
be used to aid hackers in compromising other systems.



Get approval from your supervisor before
taking copies of any work files home.
Files deemed as evidence are monitored and all
activity is logged.
All file transfers from computers are also
monitored and all activity is logged.

Strong passwords will be required
It is recommended that you follow Microsoft’s guide
lines in creating your password.
 http://www.microsoft.com/security/onlineprivacy/passwords-create.aspx
 Keep your password safe and secure at all times.

 Do not share your password.
 Anything done under your name on the network is
your responsibly and you will be held liable if anything
occurs under your login.
Download