Question: Based on the information provided below please diagram the existing network security design. Then diagram the proposed network security design . Company XYZ remote sales,

Based on the information provided below please diagram the existing network security design.

Then diagram the proposed network security design.

Company XYZ remote sales, warehousing, and distribution centers are all located in commercial-space settings within shopping malls. They are spaces with separate entrances and exits that have common walls with the neighboring businesses. Some of the locations have a common basement or attic space that they share as storage space with the existing businesses in the mall. These locations will include your backbone network devices (routers, switches), domain controllers, DNS, mail servers, and firewall and intrusion detection systems that allow users to work locally in the event of a broader system failure. Data on the servers is replicated twice a day from your local sites to the global locations to ensure safe and secure date transactions between sites and help with a speedy data recovery in times of disasters.

The network is segmented into 10 global virtual LANs that logically separate into the following user groups:

Information Technology.

Management.

Finance.

Human Resources.

Marketing and Sales.

Product Development.

Training.

Remote Users.

Security and Facilities Departments.

All other users.

Locations

Headquarters: Phoenix, Arizona.

Distribution sites: A total of three sites: New York, San Francisco, and New Orleans.

Globally, the organization includes six locations: Germany, India, China, Australia, South Africa, and Dubai.

Employees

Phoenix, Arizona (about 1,200 users).

Distribution sites: New York (45 users), San Francisco (30 users), and New Orleans (25 users).

Global locations: Germany (15 users), India (12 users), China (10 users), Australia (8 users), South Africa (6 users), and Dubai (5 users).

Main Infrastructure Items

Hosts are primarily Windows 8, but there are examples of both Macintosh- and Linux-based systems that have been approved for use at some sites.

Cisco routers and switches: Each site includes their local routers and switches, connected directly to the main data center located at the main headquarters in Arizona.

Firewalls: The headquarters and distribution sites have redundant ASA firewalls at the edge of their networks, and the global locations rely on the host-based Windows firewalls to protect their systems.

Intrusion detection: The malware solution for the organization is purchased and managed by each location and is the only form of IDS that is currently in place.

Domain servers running Windows 2008.

DNS servers.

DHCP servers.

Active Directory.

Exchange mail servers.

File and print servers.

ERP system (such as PeopleSoft).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!