- Addressing
Schema
- Equipment Configuration
Configure Windows 2003
servers:
Domain Controller
Server- File server: Active Directory is installed in this server. Other
services are turned off. Users are divided into groups: student groups and admin
group. Students groups are named according to class name and semester. Storage
limit for a student account is set to 100 MB.
Backup Domain
Controller: Using dcpromo to
replicate between primary and backup domain controller servers. All other
services are turned off.
Configure Windows 2003
Galileo server: DHCP, DNS server
Configure DMZ
web-server:
- IP address of web
server : 192.168.7.10, public IP: 67.64.179.154 ?
www.dcsl-uhcl.net
- Web management system:
IIS 6.0.
- Default Web Site and
assigned IP address: 192.168.7.10.
- Anonymous Access
enabled to default web site
- Configured secure
access to subfolder private of website, using local user database
- Disabled irrelevant
services in the server e.g. remote login, web client.
Configure Cisco Router
2801:
Setup for Router:
- Ethernet ports are assigned to VLAN 10
- Firewall enabled
for incoming traffic between Fast Ethernet 0/0 (outside interface) and VLAN 10
(inside interface).
- Access Control Lists for outgoing traffic:
Network |
Permit |
Deny |
192.168.3.0 |
http, ftp |
All other protocols |
192.168.4.0 |
http, ftp |
All other protocols |
192.168.5.0 |
http, ftp |
All other protocols |
192.168.6.0 |
IP traffic |
|
192.168.7.10 |
IP traffic |
|
192.168.8.0 |
|
|
192.168.9.0 |
http, ftp |
All other protocols |
- Access Control Lists for incoming traffic:
To network/ host |
Permit |
Deny |
192.168.3.0 |
|
All protocols |
192.168.4.0 |
|
All protocols |
192.168.5.0 |
|
All protocols |
192.168.6.0 |
|
|
192.168.7.0
|
|
|
192.168.7.10 |
|
HTTP, FTP traffic |
192.168.8.10 |
|
All protocols |
192.168.9.0 |
|
All protocols |
192.168.9.2 |
|
AH (50), ESP (51) |
Firewalls
Configure PIX
firewall A:
Controls traffic to Web/FTP Server, AD/DNS/File
Server, Backup File Server, Control Server and Administration workstations:
- Public Interface: 192.168.9.3
- Private Interface: 192.168.6.19, connected to Cisco Catalyst 3550 Switch
- Private Interface: 192.168.7.9, connected to Web/FTP Server
Configure PIX firewall
B:
Controls traffic to Student network
- Public Interface: 192.168.9.4
- Private Interface: 192.168.10.254, connected to Cisco Catalyst 3550 Switch
Configure Cisco VPN
concentrator 3005:
Connection specifications for
remote access and site to site connection; authentication protocol, encryption
protocol.
Technical
Specifications:
- Private interface:
192.168.10.253
- Public interface
192.168.9.2
- Internet IP:
67.64.179.155
- IP address pool for
remote-access client: 192.168.10.150-192.168.10.200
- UHD private LAN
address: 172.16.1.0/24
- UHD internet IP:
68.91.105.61
- Pre-share
key:carbohydrates123
- Authentication:
ESP/MD5/HMAC-128
- Encryption: 3DES-168
Configure Cisco Secure
ACS:
Control the
authentication, authorization and accounting of users accessing the DCSL network
? VPN and wireless users. Authentication, authorization and accounting are all
enabled for AAA clients The list of AAA client:
Technical
Specifications:
IP address:
192.168.6.21
Secret key: secretkey
Protocols enabled:
RADIUS, TACACS+
Groups, accounts and
permission for groups:
Group name |
Users |
Services-protocols enabled |
Administrator |
|
|
Student |
|
http, https,
dns |
VPN client |
|
http, https,
dns |
Wireless client |
|
http, https,
dns |
Configure Linksys
Access Point:
Provide access to
Student Network for wireless users:
Technical
Specifications:
-
Name: AP3
- IP address:
192.168.5.254/24
- WPA algorithm: AES
- WPA pre-sharekey:
dcsld140
- SSID broadcast:
enabled
- SNMP: disabled
Network management
system: SMNP should be enabled on
servers and network equipment interfaces.
Top
|