Hardware, Network and Security Requirements

This section will discuss the hardware, network and security requirements of the Online Tech-support Information Service.

OTIS Server

OTIS Server

The Network

The network is the computer.

The OTIS project is heavily dependant on the network to provide services to clients located within the corporate network and outside of corporate network.

Cisco Catalyst 3500 Series Switch

Cisco Catalyst Switch

Each switch has 48 autosensing 10/100 Ethernet ports that use the standard RJ-45 connectors
Two 1000BaseX ports that accept 1000BaseX GBIC (GigaBit Interface Converter) modules.
The GBIC module slots can support the following Cisco modules to provide flexibility in media and distance options:

All Catalyst switches are assigned IP addresses. This provides the ability to telnet into a particular switch or connect through the console and monitor network usage and troubleshoot connectivity issues and is supported by the Cisco IOS command-line interface (CLI) management feature.

All 10/100 Ethernet data connections are handled by Category 5 (CAT 5) Ethernet cables.

Computer Drama

User Access to OTIS

OTIS server is accessible as a URL from all client computers.
The user request is first forwarded to the authentication server which issues a security token for that session.
Then the request is sent back to the OTIS server which attends to the cleint's request.

This project considers access from two types of clients based on their location: internal clients and external clients.

Internal clients use machines that are connected directly to the corporate Ethenet.

External client machines are located outside the corporate network and are aloowed access through a firewall.

This setup allows users to connect to OTIS from home or field office.

Therefore this project takes into account a common situation where more and more users are
now working outside the corporate officeses, at a diffrent location or at home and need
to access services provided by the corporate network and most importantly, OTIS.

 

Security Clearence

Security

The Authentication Server

The access control list (ACL) on the authentication server determines access rights on OTIS.

There are three main types of security tokens used to access services on OTIS server:



  1. User account: this is the account issued to the general staff with minimum access rights.


  2. Management account: administrators and department heads with intermediate access rights. Enables access all TTs of a particular dept. and report generation and printing capabilities.


  3. IT account: with full access rights and access to ALL TTs, including the above.

Services provided by other Servers: LDAP (Light-weight Directory Access Protocol) Server