Our Business Is A Franchise From Big Insurance Corporation

Submitted By sluggo44
Words: 1454
Pages: 6

1. Our business is a Franchise from “Big Insurance Corporation”. a. We offer insurance for all of your needs. b. Our insurance company has a total of 12 employees. We expect to growth 20% in the next 2 years (from 12 employees to 15 employees). c. We are offering: auto, motorcycle, homeowners, and life insurance. We receive auto and property claims from customers by phone or online. d. Locations: Lakewood = 10 employees, Arvada = 1 employee, Highlands Ranch = 1 employee. e. Network Topology: Physical Star Topology with a central switch and a router in each location. Each office will have workstations that will form a LAN and the routers will provide communicate between each LAN and with the central insurance office. i. The location of each switch and router is going to be separated from the main offices, in a small climate controlled room under lock and key. ii. We are going to have fault tolerance and daily backups. iii. UTP cabling Category 6. iv. We will not have wireless provided to employees. 2. IP Scheme. f. Lakewood : 8 computers with private addresses and public addresses: using 8 now and reserving 4 for future expansion. v. 10.0.0.1.192.168.1.1 vi. 10.0.0.2.192.168.1.2 vii. 10.0.0.3.192.168.1.3 viii. 10.0.0.4.192.168.1.4 ix. 10.0.0.5.192.168.1.5 x. 10.0.0.6.192.168.1.6 xi. 10.0.0.7.192.168.1.7 xii. 10.0.0.8.192.168.1.8 g. Arvada: 1 computer with private addresses and public addresses: using 1 for now and reserving 2 for future expansion. xiii. 10.0.0.13.192.168.1.13 h. Highlands Ranch: Same as above. xiv. 10.0.0.16.192.168.1.16 3. Network Security i. We will be using NAT j. Port blocking: xv. 7 = Echo protocol: was originally for testing and measurement of round trip IP Networks. Replaced by ICMP and the ping utility. xvi. 23 = Telnet: provide access to a command-line-interface on a host remote. Have serious security issues specially on internet. xvii. 70 = Uses the Diagram Protocol, a communication protocol for the Internet network layer, transport layer, and session layer. This protocol when used over port 70 makes possible thee transmission of a datagram message from one computer to an application running on another computer. This port was flagged because a virus/Trojan has used this port to communicate in the past. xviii. 71 = Remote Job Entry: sending jobs to mainframe computers from remote workstations; this is connected to the host by a modem or a LAN. xix. 79 = Finger Protocol: was created for users who wanted information on other users of the network. Was a form of presence information for remote users. Not available because of security concerns. xx. 109 = POP V2 ( POP2): is an application layer internet protocol for local e-mails. Clients were allowed to retrieve e-mails from remote server over the TCP/IP connection. xxi. 110 = POP V3 (POP3): Post Office Protocol Version 3. Most widely used client e-mail protocol. Used by mail clients to collect mail off of server. Security concerns: Re-usable cleartext password, no auditing of connections and attempts. Uses TCP protocol which guarantees delivery of packets. This port has been used by viruses/Trojans in the past. 4. Network Hardware k. We will be looking at using Category 6 UTP cabling inhouse for each location, primarily to save on costs; using Comcast Business plan for our ISP service, as well as remote access. l. At the central site, a Cisco 1760 Access Router provides an all-in-one for connecting to the service provider (and the public internet). It integrates a router, firewall, encryption and tunneling services, password protection, and a high-speed link to the central site’s LAN. It also provides a data, voice, and video solution.…