0% found this document useful (0 votes)
34 views

Network Proposal

This document proposes a network for a small business with 18 workstations. It will require hardware like routers, switches and servers, as well as firewalls and other software. The network will be divided into different areas - a DMZ to separate external servers from the internal network, and private offices and workstations. Network security measures like firewalls, SSL encryption and a web filter will protect the network from unauthorized access and limit employee internet usage.

Uploaded by

Fredrick Murithi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Network Proposal

This document proposes a network for a small business with 18 workstations. It will require hardware like routers, switches and servers, as well as firewalls and other software. The network will be divided into different areas - a DMZ to separate external servers from the internal network, and private offices and workstations. Network security measures like firewalls, SSL encryption and a web filter will protect the network from unauthorized access and limit employee internet usage.

Uploaded by

Fredrick Murithi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SMALL BUSINESS NETWORK PROPOSAL

Student’s Name:

Institutional Affiliation:

Course:

Instructor:

Due Date:
Introduction

The project is a network proposal for a small business. The business has 18 workstations on a

one-floor office. the workstations consist of 4 private offices and 14 workstations divided into

cubicles. The office already has internet from a local internet service provider. The network will

require different firewalls to ensure the protection of databases. In this project, we will determine

the hardware and software requirements for the Local Area Network as well as provide protected

internet access.

There are various network components required including hardware and software. The hardware

components include routers, switches, access points, and servers. The software is mainly the

firewalls needed for network protection. The LAN will require the configuration of IP addresses.

All these requirements will be analyzed in-depth in the inventory.

The network illustration will give a visual description of the requirements mentioned in the

inventory. This will show the layout of the network and how all the components will be

interconnected.

Security is paramount for any network. Network security protocols like firewalls will be key

components of this project. The network requires protection from access by unauthorized users.

Secondly, the workstation and given servers are required to be inaccessible from the internet. We

will create an internal area that cannot be accessed from the internet and still allow the business

an online presence though the web and mail servers.


Inventory

The business is run solely on one floor hence requires 3 (10 ports) switches for the servers

workstations. There will be one access point and 1 router. Servers needed for the internal area are

DHCP, Proxy, and database servers. The DHCP server is needed for the IP address

configuration. The web and mail servers will be accessible from the internet bastion host server.

To be able to create an internal area in the network, we will require the DMZ network to create a

barrier that prohibits access from the internet with 2 routers. Web filter firewall will be used to

prohibit employees access to specified websites. We need a network security protocol like a

secure socket layer (SSL) to safeguard internal data from access by unauthorized personnel.

ITEM QUANTITY
1. Access point 1
2. Router 3
3. Switch 3
4. Firewalls 2
5. Network security protocol 1
6. DHCP server 1
7. Proxy Server 1
8. Database Server 1
9. Web Server 1
10. Mail Server 1
11. Bastion Host 1

IP Address Range

ADDRESS RANGE
192.158.1.38 192.158.1.38.0- 192.158.1.38.18
Hostname Range- main computer is SOHO, the hostname range is 1.SOHO.com-18.soho.com.
NETWORK DIAGRAM

External firewall
ISP

Publicly accessible servers Web Bastion Mail


Internal firewall
Server Host Server

Proxy Internal Area

Server router
DHCP

Server
Database

server

PRIVATE OFFICES
switch
PC

PC PC PC PC

PC PC
PC PC
C3 C2 C1
PC PC
PC
PC
PC PC

PC
PC
PC
Network Security

The security requirements for this project are;

a) To prohibit the access of the DHCP, Proxy, and Database servers as well as the

workstation from being accessed from the internet.

b) To prevent unauthorized personnel from accessing the network’s data.

c) To limit the employee’s website access.

In order to prohibit the access of a specific part of the network from the internet, we will use the

DMZ. The DMZ is a perimeter network that creates an internal and external firewall by the use

of two routers. The external firewall will allow access of the internet and protects from known

attacks. The internal firewall which sits between the perimeter network and the LAN ensures

strong protection for the internal servers and workstations.

The network security protocols will be essential in ensuring the data is not accessed by

unauthorized personnel. In this case, we recommend the SSL (system security layer) as it ensures

end to end encryption of the data in the internal network area. this will guarantee security in case

the data is accessed then it will be difficult to decrypt.

Moreover, the business requires its employees to be barred from accessing various websites in

order to maximize productivity. For this, we will use a web filter firewall. This will prohibit the

access of specific websites from the workstations. The employees will face fewer distractions at

the workstation.

You might also like