Kenneth Anderson David Gonzales Logan Fernandez Topics covered in proposal: Server Personal Computers Network Personal training IT devices in the police headquarters: 65 IP telephones 29 IP printers 78 computers 2 servers Workstation & Server report It is a matter of note that the Server may be among the most important element of any computer network. Data Storage (15TB Raid Supported) Software Hosting •Mostly for digital Evidence & Virtual machine backup. •Also hosting sensitive files & logs from the workstations. •In addition to raw data storage capacity our server must be able to reliably host and run a few key Software applications. Connectivity Software Dispatch Software Mobility XE “Mobility XE® is mobile VPN software that boosts the productivity of your workers in the field and gives your business the security and management you need for all of your mobile field mobile devices.” www.netmotionwireless.com/m obility-xe.aspx DispatchNow Mobile “Tiburon’s DispatchNow Mobile is a robust solution for sharing immediate and accurate information between the dispatch center and the field. DispatchNow Mobile utilizes an innovative map-driven user interface to deliver essential information quickly and efficiently.” www.tiburoninc.com/Products /DispatchNow/DispatchNowM obile.aspx Physical Virtualized We believe that these systems can be made to run most reliably in a virtualized environment on the Server. To fulfill theses needs we have selected Dell the dell owing to Dell's history of solid hardware & support. After some discussion we decided to uses a Dell PowerEdge R520 Hardware Specifications of Dell PowerEdge R520: Server price: $15,392.00 Chassis Configuration 3.5" Chassis with up to 8 Hard Drives Processor Intel Xeon E5-2450 2.10GHz, 20M Cache, 8.0GT/s QPI, Turbo, 8C, 95W, Max Mem 1600MHz Additional Processor No Additional Processor Memory Configuration Performance Optimized Type Memory DIMM Type and 1600 MHz RDIMMS Speed Memory Capacity http://web.nmsu.edu/~kennya/I CT435/Server_preposal.html Operating System Licenses 2GB RDIMM, 1600 MT/s, Standard Volt, Single Rank, x8 Data Width Red Hat Enterprise Linux 6.2,Factory Install,x64,Req Lic&Sub Selection Red Hat Enterprise Linux,1-2SKT,3yr Subscription&License,1 virtual guest OS Media kits No Media Required RAID Configuration RAID 5 for H710P/H710/H310 (3-8 HDDs) RAID Controller PERC H710 Integrated RAID Controller, 512MB NV Cache Hard Drives 3TB 7.2K RPM Near-Line SAS 6Gbps 3.5in Hot-plug Hard Drive Embedded Systems Management Basic Management PCIe Riser Risers with up to 4, 3x8 PCIe Slots + 1x16 PCIe Slots Add-in Network Adapter Broadcom 5720 DP 1Gb Network Interface Card Add-in Network Adapter On-Board Dual Gigabit Network Adapter Power Supply Single, Hot-plug DC Power Supply (1+0), 1100W Power Cords NEMA 5-15P to C13 Wall Plug, 125 Volt, 15 AMP, 10 Feet (3m), Power Cord System Documentation Electronic System Documentation and OpenManage DVD Kit for R520 Virtualization Software Citrix XenServer 6.x (DIB) Virtualization Licenses and Subscriptions Hardware Support Services Citrix XenServer Enterprise Edition 3Yr Subscription Advantage 3 Year ProSupport and NBD On-site Service While the Server may be the most important element of this computer network, the workstations are where the real day-to-day work takes place. INTERCHANGEABILITY Owing to the logistical and technical issues that result from managing a mishmash of different hardware & software. We have decided that if we are to start ‘cold turkey’ that it would be best if all our systems were as identical to each other as possible. Such homogeneity would facilitate a quick and cheap recovery in the event of a serious problem either in software or in hardware (Due to recovery & reuse of interchangeable parts). UPGRADABILITY In order to meet a diversity of needs both now and in the next handful of years it is necessary that any generic system selected have the capacity to be upgraded. Proposed Hardware To fulfill theses needs we have selected the Dell Precision T1650 as our base system. Dell Precision T1650: Proposed Workstations Hardware specifications: To the right are the base System Hardware specifications We expect the base system to cost around: $708.00 For more advanced user system requirement we intend to simply upgrade theses machines in order to maintain the level of uniformity necessary to meet our goal of interchangeability. Processor Operating System Dell Precision T1650 Power Supplies Memory Graphics Hard Drive Configuration Boot Hard Drive 3rd Gen Intel Core i3-3220 Processor (Dual Core, 3.30GHz 3MB, w/HD2500 Graphics) Windows 7 Professional, No Media, 64-bit, English Dell Precision T1650, Standard Base 275W Power Supply, 65 Percent 2GB, DDR3 UDIMM Memory, 1600MHz, Non-ECC (1DIMM) Intel Integrated HD Graphics C1 SATA 3.5 Inch, 1 Hard Drive 250GB, 7200 RPM 3.5" SATA 6Gb/s Hard Drive DVD and Read16X DVD-ROM, SATA Write Devices Network AdapterIntegrated PCIE 10/100/1000 Monitor Dell E2011H 20 Inch Flat Panel Display Speakers No Speaker option Chassis Intrusion None Switch Port Adapter None Keyboard Dell USB Entry Business Keyboard, English Mouse Dell MS111 USB Optical Mouse Productivity Microsoft Office 2010 Pro Software Security Software None No computer does anyone any good without software, as such no statement on workstations can be said to be compete without discussing some of the Standard software that each station will come equipped with. Oracle’s Java platform has become a standard for modern software applications both on the web(Java Script) and on system applications. It is therefore logical to include Java on all systems as Standard. Adobe PDF is an extremely popular document format and while there are other applications capable of displaying Adobe’s PDF format more securely and quickly Adobe’s own reader is still the standard. We have therefore decided to stick to the standard. While much of the web post IPhone boom has been moving away from flash based applications the number of Flash based websites is still quite significant and therefore Adobe Flash player is still a requirement. We have opted to include this application despite its security issues due to the need for functionality and compatibility. Firefox is one of the most popular web browsers in uses today and is much more frequently updated (and therefore secure) than the default Window’s web browser Internet explorer. Given the number of web based application that the Sheriff’s office must employ on a regular basis we feel Firefox is a good pick as safe standard browser to meet their needs. It is difficult to find an office environments without an office productivity software suite. (Be it Microsoft Office, or Apache OpenOffice.) The sheriff’s department is no exception to this rule. So to fulfill the sheriff’s department's productivity software needs we have selected the popular Microsoft Office 2010 professional. Proposed Workstations Software: The standard software needed on the workstations are comparable with most business computers: Java Adobe Reader Adobe Flash Player Firefox web browser Microsoft Office 2010 Professional Specialized applications individual Officers may require will have to be installed on each users workstation by the Information Technology staff on a case by case basis. Subnetting and separation of groups Router choice Switch choice Setting up a private address scheme: Decided on a Class B address scheme: 172.16.0.1-172.31.255.254 /12 This will provide IP addresses needed for all the subnets, and leave room for additional addresses. VLSM will be used to preserve IP addresses Groups are separated by function. The groups are: Printers: 172.16.1.0-172.16.1.63 /26 62 hosts Phones: 172.16.0.0-172.16.0.127 /35 126 hosts Administrative: 172.16.128-172.16.159 /27 30 hosts Non-administrative (general): 172.16.0.128172.16.0.255 /25 126 hosts Server/video camera:172.16.1.64-172.16.1.127 /26 62 hosts Requirements of hardware: ACL capability Subnet configuration Trunking capability for multiple switches DMZ capability to protect servers Cisco 3925E Integrated Service Router : Capable of handling all subnetting and VLSM required. Can make virtual DMZ for servers. Cisco SGE2010 48-port gigabyte switch: Six would be used with VTP POE capable for IP phones Fast enough to handle load, and VLAN capable All sensitive, classified, case, personnel, and administrative files will be stored on the server in a system of encrypted directory shared individually to only select password protected personnel user accounts. Access to these files will be granted on an individual & group (such as rank, division, ect.) basis by department management on a need to know basis. We can set permissions on a user basis or a computer basis. We can control what server drives computers are mapped to base on the OU they’re in. However file permissions may be our biggest use for this technology. • No administrator accounts for non-IT users. This will prevent employees from installing any non approved software. • Where necessary we could modify minor account rights. • The primary focus here is to prohibit the instillation of non-work related software on work systems. • Possibly prevent viruses or Trojans from getting into the network. All Workstations will be configured to forward a copy of their logs to the server for archiving. We believe this measure will provide us with a far more secure record of what was done on each workstation for review in the event of an incident. Firewall will be implemented at the network edge to help protect the internal network from external threats. All incoming network traffic will logged for review of an incident. As with the workstation logs, these logs will be stored on the server It can be said without reservation that people are the most important part of any operation. That policy’s regarding the utilization of people is as such the cornerstone of any organized operation be it a fortune 500 company or a simple sheriffs department. Show them what screens should look like if Windows or the Anti-virus detects something. Grayed-out secure desktop, pop-up from the legitimate anti-virus. Everything else should be determined as a trojan. Nothing should be clicked on until IT support looks at it. If you receive an email from an unknown address: Do not open any attachment or click any links. Do not send any information back. Verify the address with your supervisor or with IT before doing anything. Scan flash drives for viruses before opening anything on the flash drive. It does not take that much time. By doing so you can root out some basic viruses. Autoruns will be disabled be default. Do not use social media sites while at work. Be careful what information you share while at home. The information you share can used to attack you and the office Even if you share with those that are friends or family. Accounts can be hacked and personal details shared can be used to aid hackers in compromising other systems. Get approval from your supervisor before taking copies of any work files home. Files deemed as evidence are monitored and all activity is logged. All file transfers from computers are also monitored and all activity is logged. Strong passwords will be required It is recommended that you follow Microsoft’s guide lines in creating your password. http://www.microsoft.com/security/onlineprivacy/passwords-create.aspx Keep your password safe and secure at all times. Do not share your password. Anything done under your name on the network is your responsibly and you will be held liable if anything occurs under your login.