Preview

Nt1330 Unit 7 6.2 Conclusion

Good Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 7 6.2 Conclusion
6. Deployment, Limitations and Conclusion

6.1. Deployment

We installed our project on the virtual box program, through this program we installed the server and the client to withdraw, as we set Windows Server 2008 R2 and Windows 7 for the client, and give each one IP address. The virtual machine designed for one network in Ghantoot Group Company.
The static IP address of the server set because this is a condition to be DNS server and domain controller. Then put Active Directory services even on the server side of the DNS. Then it was fixed in many roles and configured on the server. Those involved DHCP, file services and print services roles. Then the client the limits of their network configuration.
The client is configured to use DHCP
…show more content…
This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured …show more content…
They can just do simple thing such as surf the Internet, send and receive e-mail messages and use some of the Microsoft Office products (Word, Excel and PowerPoint). More exercise may be necessary for users to benefit more from the network. Work especially in the field site where users log on from any device on the network and they provide the network relatively Connection Sharing from internal or external storage. Users also need to be skillful in how to cooperate and share Microsoft Office documents correctly.
Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .
To configure the access point

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The following IP schema is designed to fit the needs of the Warehouse Company. The company has purchased and installed all of the required equipment for the network infrastructure. After consulting with their design team and gathering the required documentation and network designs, we are ready to proceed.…

    • 248 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Unit 2 homework

    • 364 Words
    • 2 Pages

    Check the workstations using ipconfig /all and find out if the ip range is within the address range you assigned, if it is a different address then the workstation failed to contact the DHCP server and has gone into apipa mode. The Network Interface Card might be assigned an incorrect driver. Another possible cause of the problem is that the patch cable is not plugged into the Network Interface Card, or is not connected to a switch on the other end. However, it could be that the server has run out of IP addresses that it can assign to clients. You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199. If this still doesn’t solve the problem make sure that the DHCP server is still authorized by the Active Directory to lease IP addresses. You should also check to verify that the scope is active, and that the necessary services are running on the DHCP server.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    Now that you have finished testing DNS and DHCP you will now configure the Windows Server 2008 machine as a replica Domain Controller. In this exercise you will install the Active Directory Domain Services Role on Server##A.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    graph 1.0 shows that out of ten respondent 5 are rated outstanding, 1 are rated very good and 4 are rated good with regards of the maintainability of the Point of Sale System…

    • 1214 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (i) No, in a datagram network the routing table cannot contain two same destination addresses, since all of the destination addresses are distinct (unique) in a datagram based network i.e. it’s impossible to have duplicates in a routing table because of the distinctiveness…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3.1 Essay

    • 488 Words
    • 2 Pages

    MITM attacks are difficult to avoid because even if they are occurring you do not often know about them. The best we can do is mitigate the chance of them occurring by making it more difficult for attackers by using cryptographic techniques. This can then be followed up with other techniques to further enhance the secureness and private-ness of our communications. We want to protect against MITM attacks to keep our sensitive data private and avoid any negative implications that releasing this data may…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will be configured with VLans. This will depend on the amount of VLANS needed. For example, if a wireless hotspot is required in the conference room for visiting clients or suppliers, we will supply a wireless connection through a VLan that will enable them to access the internet without access to our operations network. This can also be implemented for scenarios like students vs operations. This will isolate traffic allowing for internal security.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Advanced System

    • 12812 Words
    • 52 Pages

    Server provides all applications, files and messages. If a client wants applications from the server, the server grant permission to the particular Client according to their authentication level, i.e., applications are shared between server and clients. The client access the printer which are attached to the server when a request is provided. The applications from the server are sent to the requested client by the provider. Resources include devices such as CD, Floppy and Printer. The client access these devices which are attached to the server when a request is provided.…

    • 12812 Words
    • 52 Pages
    Powerful Essays