6.1. Deployment
We installed our project on the virtual box program, through this program we installed the server and the client to withdraw, as we set Windows Server 2008 R2 and Windows 7 for the client, and give each one IP address. The virtual machine designed for one network in Ghantoot Group Company.
The static IP address of the server set because this is a condition to be DNS server and domain controller. Then put Active Directory services even on the server side of the DNS. Then it was fixed in many roles and configured on the server. Those involved DHCP, file services and print services roles. Then the client the limits of their network configuration.
The client is configured to use DHCP …show more content…
This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured …show more content…
They can just do simple thing such as surf the Internet, send and receive e-mail messages and use some of the Microsoft Office products (Word, Excel and PowerPoint). More exercise may be necessary for users to benefit more from the network. Work especially in the field site where users log on from any device on the network and they provide the network relatively Connection Sharing from internal or external storage. Users also need to be skillful in how to cooperate and share Microsoft Office documents correctly.
Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .
To configure the access point