Nt1330 Unit 3 Assignment 1

Superior Essays
ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results.

Servers
For the servers we are recommending that they use the Cisco UCS B230 M2 Blade server, this server is a well-rounded product that features an Intel Xeon E7-2800/8800 processor and can be used with multiple operating systems such as vSphere, Windows 2008R2, 2012, 2012 R2, Linux, and Solaris among others. We are recommending that all servers use Windows Server 2008 R2. The Cisco UCS B230 M2
…show more content…
Firewall We are recommending that ABC Company uses the Cisco ASA with Fire Power Services. Firewalls are the protection between the network and the internet, and is a must in all locations. The Cisco ASA provides a multilayered threat protection that focuses on the next generation of threats, constantly updating to provide continuous protection (Cisco ASA, 2015). It also has advanced malware protection and industry leading network visibility (Cisco ASA, 2015).
Cisco ASA 5506-X
Advantages – This firewall is inexpensive and very powerful. Easy to install and easy to maintain.

WAP
We are recommending that the ABC Company use Cisco Aironet 3700 Series access point in all of the locations for their wireless needs. The Cisco Aironet 3700 Series Access Points will integrate easily with the Cisco switches and routers already being used at each location. These wireless access points also come with the newest 802.11ac technology. They are also equipped with dual bank 2.4 and 5 GHz for better bandwidth

Related Documents

  • Improved Essays

    To do Cable calculation it has to meet the requirements from BS 7671. Design Current First thing to do is calculate the design current. (Ib) I= Watts/Volts. You do this so you can find out the total current.…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    “Ubuntu Server brings economic and technical scalability to your datacenter, public or private. Whether you want to deploy an OpenStack cloud, a Hadoop cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available” (Ubuntu.com). The Ubuntu Server release schedule fits in with your business needs. Ubuntu Server 16.04 LTS is a long-term support release, which means it is supported for five years. Whether you want to deploy a web farm or deploy a cloud, Ubuntu Server supports the most popular hardware and software.…

    • 1782 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1. As per my knowledge, students can --> contact the Student Help Desk by phone at 610.372.4721 ext. 5171, or by email at helpdesk@racc.edu and they will get help, or --> go to this website https://myracc.racc.edu/cas/login?service=https:%2F%2Fmyracc.racc.edu%2Fc%2Fportal%2Flogin and upon clicking on "Forgot Password", they should enter their username and click "OK". To reset the password, they should enter their username.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Stakeholder Concerns In order to optimize and upgrade the Leonard Cooper Network, I will have to understand and solve the current concerns of the stakeholders. The results from the interview conducted on four stakeholders indicate that: the existing network sometimes gets congested, collisions proliferate, and the network’s throughput slows down when the teachers report simultaneously on attendance and check emails. The existing bandwidth of the network is 10Mb and the fifty networked printers occasionally get all filled up. As such, the HVAC technician deems it convenient for wireless access points to be installed and all the 23 classrooms located in the new wing be added to the network.…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A network device should allow for wireless connection for the student lobby. Network devices should be able to be secured and maintained with ease. The network devices should fit the needs of 524 potential hosts. Proposed Network Devices Switches in the closets and server rooms should be used over hubs. One 48 port switch is used for each classroom closet and server room.…

    • 1558 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Goods: Security systems  Customer’s needs Now a day’s Security systems are play a very important role in our life. Security systems are required. Security systems are needs to live protect and save life. …

    • 1562 Words
    • 7 Pages
    Improved Essays