System and Network Administration
Final Project Requirements
Introduction:
The final project tests your ability to put together the skills learned in previous weeks and present it as an application of your knowledge and skills to a small business network. So as you read through the requirements, consciously relate it to relevant work you've already completed.
The small business network represents the capstone of this course
- it is what all the previous assignments have led to, and is the reason that it takes the bulk of the assessment weighting. Some additional research and reading may still be required.
Any questions of clarification or requests for help for the Final Project should be raised on the Course Forum under the topic 'Final Project'.
The Scenario
You are required to setup and install a small network and set of servers to support a small company, which operates a tomato packing plant. The plant has 10 permanent employees and around 25 part- time and casual employees. Of the 10 permanent employees, 5 work full-time in the office and already have a fully configured networked workstation computer each. On high-capacity networked laser printer serves the entire plant.
The company requires a forward facing (connected to the Internet) Web Server that is located onsite in the main office. The National Broadband Network has just been enabled in the area so a high speed Internet connection is now available.
An existing computer, Wally, used by permanent employees to store various documents (spreadsheets, databases, etc), will need to be integrated as the File Server into the new network. Wally runs Microsoft Windows or MacOS* as the operating system and is backed up daily via physically attached high-speed tape drive with proprietary driver software. All new servers should mount a shared space on Wally to save backups to. These will then form part of the backup process already operating on the Wally server.
*if you are not using windows or mac as your host OS (hosting VirtualBox with your VM's) you can use whichever you do have, e.g. Linux.
The following items make up the Final Project submission.
1. A single Word document named TomatoPlant.docx, with table of contents, containing all installation, configuration, processes and procedures used to develop the system.
The document must include the following in the order listed:
a) Installation and configuration details of the servers DHCP, WEB, GATEWAY and IDPS.
b) Backup and recovery procedures that would allow any IT staff, even those not familiar with backup/recovery methods, to perform backup and recovery of all servers if needed.
c) Details of Failover arrangements and procedures in the event of failure of the primary DHCP server.
d) Details of the network configuration. This should consist of:
i. a table of servers with MAC addresses, allocated IP addresses, client IP address ranges and;
ii. a well labelled diagram of the entire network showing all network members. The diagram must be embedded and viewable in the Word document, do not attach as a separate file.
e) Details of general procedures and actions required to be taken in the event of an attempted attack/security breach. Assume that the attempt has been detected.
f) Details of general procedures and actions to be taken in the event of a significant security breach actually occurring e.g. unauthorised access to the Web Server. Assume that the breach has just occurred.
Hint: e) and f) differences: Your answers should reflect essential differences in response to attempted breaches and actual breaches.
g) Details of how support staff gain access to internal systems from outside of the network. This should be detailed enough to give a new support staff member a good idea of how they are supposed to access the internal systems from their home.
h) Details outlining how all servers have been hardened against security attacks.
i) Details of system/security alerts - what/where alerts are generated and where they are sent. Write this so that your boss, who is not a systems administrator and in your absence, could read it and understand exactly how alerts are generated and where they are sent.
j) Details of the password aging policy and implementation. The policy should be appropriate to the organisation, and detail exactly how it is implemented in the system.
Attachment:- Project Requirements.rar