ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ops300 Project(3)
1. 1
Course project: Design and deploy enterprise
infrastructure for a small community college
This is a group project. Groups from 2 to 4.
XYZ community college decided to upgrade their IT infrastructure. They want to reduce hardware
requirements for their operational needs. Therefore they decided to migrate into virtualized
environment and automate as much as possible all IT deployment/operational tasks. You have been
given the responsibility of design and setting up their new IT infrastructure.
Since community college has very limited IT budget, they can afford only open source or free
software. They have purchased licenses for several Windows Servers and Windows Desktops. XYZ
has purchased 4 server computers for you to configure for all their IT services.
Businessrequirements
The community college requires the following IT services:
1. Learning management system a software application for the administration, documentation,
tracking, reporting and delivery of educational courses or training programs. They help the
instructor deliver material to the students, administer tests and other assignments, track
student progress, and manage record-keeping.
2. Community college email server
3. Content management system a software application for the creation and management of
digital content. The corporative website will be built on the content management system.
4. VPN a software for creating secure connection to community college from home
5. Linux Labs a virtual compute class. There are X flavors of different Linux desktop (VMs).
Instructors specify quantity and flavor of the Lab computer then IT department will need to spin
off these Lab computers. Some flavors of Linux Lab computers need Internet Access.
6. Windows Labs a virtual compute class. X flavors of different Windows desktop (VMs).
Instructors specify quantity and flavor of the Lab computer then IT department will need to spin
off these Lab computers. Some flavors of Linux Lab computers need Internet Access.
7. Interactive KIOSK a computer terminal (Desktop VM) that provides access to information
and applications for communication, commerce, entertainment, or education. All KIOSK is a
single use device. KIOSK are Linux and Windows based.
8. Single Sign Off is to gain access to all software systems/IT with a single ID and password.
Multifactor authentication (MFA) is desired, but it is not a requirement.
9. On demand service is to allow users to provision raw IT resources at run time, when and
where needed. This requires to automate all IT processes.
10.Collaboration software
2. 2
IT requirements
IT department has server requirements:
1. IP settings should be dynamically assigned. Every exception should be approved by IT
representative (Course Instructor)
2. Every end-point, server can be accessed by its names
3. IT assets should be protected using the best industrial practices
4. Collect all audit trail in one central location
5. Collect all log data available in one central location
6. Configure audit trail for all IT services
7. Setup anti-virus on all physical/virtual computers
Projectphases:
Phase 1 Proposal At this stage, you will submit proposal document which outline your proposed
solution. The document will include detail network diagram, explain lower level design detail and
implementation plan (name, ip addresses, software name, software versions). You will submit excel
with the following columns (You may add additional columns):
1. Requirement number
2. Requirement description
3. Your plan Explanation on how do you plan to meet this requirement
4. Software
5. Licenses
6. IP Configuration
7. Network VLAN
8. Firewall
Phase 2 Virtualization environment Your team will revise your proposal document/excel. The
main goal is to demonstrate that your virtualization environment is functional correctly. To meet this
milestone, you will create 4 VMs: 3 of the servers will be domain controllers, 1 server will be their file
and print server. You will deploy hosting web server. You will create the following IT accounts: Mary
Kay, Bill Gates, Stephen Harper, David Agnew. In addition, you will create home directories for
each of these 4 users and share them so only the user has access to its home directory. Finally, you
will create a WordPress virtual webhosting.
3. 3
Phase 3 Central Logging Your team will submit the final proposal. You will demonstrate that
meet all requirements from Phase2 and you will demonstrate two additional VMs: Linux and Windows
workstations. Both workstations will be connected to AD. It means all AD’s users would be able to
logging on to any workstations. After users logging on workstation, they should have access to their
shared folder. Finally, all system logs will be collected on central logging system.
Delivery Method
1. In class on the due date, arrange an appointment with the instructor to demonstrate what you have
done
2. As part of this project, you should produce professional report. The project report will include the
following information:
a. Detail description of your implementation including detail network diagram, IP schema and
name convention
b. Justification your design decisions and motivation choices you have made during configuration
phase
c. Explanation on how you proved configuration correctness and verified your deployment meet all
IT and Business requirements. All your functional and non-functional test cases have to be
documented
d. Explanation of your rationale (from a security perspective) for the choices you have made in
securing each system
e. Description of the best practices, industrial standards you have followed during the project
f. Reflection of this project and lesson learned
g. Justification virtualization technology chooses (e.g. VM, LXC containers, Docker, Swarm,
vSwitch)
Grading schema
Grade Minimum requirements
D All team members can demonstrate system, explain configuration files and
answer on all questions
Phase 3 is successfully completed
Project report is a professional document includes:
o Network diagram, IP schema and name convention
o Explanation on how you proved configuration
o Reflection of this project and lesson learned
C All team members can demonstrate the system, run test cases, explain
configuration files and answer on all questions
Phase 3 is successfully completed.
4. 4
Develop scripts for account management tasks (e.g. create user /delete user
/modify user)
Your system meets at least 75% functional business and IT requirements
excluding automation requirements
All Linux OS must be secure using this document
(http://www.puschitz.com/SecuringLinux.shtml#General) as a guideline
Project report is a professional document includes
o point 2.a, 2.b, 2.f
o list all fully functional business/IT requirements
o and explanation on how you proved configuration
B All team members can demonstrate system, justify design chooses,
demonstrate ability to configure any part of the system, run test cases, explain
configuration files and answer on all questions
Your system meets all functional business and IT requirements excluding
automation requirements.
All IT computers are secure using the checklist from The University of Texas at
Austin
(https://wikis.utexas.edu/display/ISO/Operating+System+Hardening+Checklists)
Automate 40% of IT operations including provisioning/ decommissioning IT
services
Project report is a professional document includes answers on 2.a-2.f
A All team members can demonstrate system, justify design chooses, justify
implementation chooses, run test cases, demonstrate ability to configure any
part of the system, explain configuration files and answer on all questions
Your system meets all functional business and IT requirements including
automation requirements.
All IT computers are secure using the checklist from The University of Texas at
Austin
(https://wikis.utexas.edu/display/ISO/Operating+System+Hardening+Checklists)
Automate 100% of IT operations
Network traffic is properly segregated using Firewall, VLANs
Project report is a professional document includes all required information (See
2.a-2.g)