Published

-

Windows Systems Infrastructure — Network & Server Design


🏢 Scenario

The project is based on a simulated client — Battlefield, a startup company headquartered in Toronto, Ontario.
The company operates a single main office and supports a total of 10 employees, including 2 system administrators responsible for IT infrastructure and maintenance.

As a 24/7 operation, Battlefield requires continuous internet connectivity, shared access to internal resources, and secure, reliable system availability for all departments. The network and system infrastructure must therefore be designed to ensure redundancy, scalability, and efficient management, while remaining cost-conscious to reflect the financial realities of a growing startup.

1. Design rationale and principles

Based on my preparation for the CCNP Encore exam and the knowledge I learned during the previous semesters, I designed the project following four principles: redundancy, security, optimization, and budget.

  1. Redundancy, I considered from three perspectives:

    a. Network. Layer 2 and 3 infrastructures should provide network reachability and path availability, and therefore need redundancy to maintain continuous connectivity. Use Virtual Router Redundancy Protocol (VRRP) or the Stack Over technique for L2/L3 redundancy.

    b. System. Every functional system should have redundancy. Database Availability Group (DAG) is used for the Exchange server, and multi-master replication is used for the domain controller.

    c. Data. Data redundancy should be multi-layer, including on-site (RAID) and periodic, encrypted off-site cloud backups.

  2. Security.

    a. Network: Three-zone-based security policy.

    b. Wireless: Extensible Authentication Protocol (EAP).

    c. System: Active Directory Domain Services (AD DS).

    d. Remote Access: VPN.

  3. Optimization.

    a. Network: VLANs, Link Aggregation (LAG/EtherChannel), Access Control List (ACL), and Network Address Translation (NAT).

    b. System-Level: Allocation of virtualization resources, storage performance optimization, and optimization of backup schedules.

    c. Budget. Because of the start-up business, I could not consider it solely from a technical perspective; instead, I should find a balance between risk mitigation and practical feasibility.

2. Architecture overview

Figure 1 shows the network architecture.

  1. There are three zones: the untrust zone (internet), the DMZ (servers), and the trust zone (internal).
  2. The two Layer 3 routers operate as a single logical device and connect to the firewall through two isolated interfaces (SPF+ ports). Each link is assigned to a parent VLAN that matches the security zone.
  3. In the trust (internal) zone, I designed the sub-VLANs for Layer 2 optimization by department, reducing the broadcast storm and improving the router performance.
  4. The sub-VLANs’ traffic is in the internal network; therefore, the firewall won’t get involved in the sub-VLANs’ traffic.
  5. All Layer 3 traffic between different parent VLANs must pass through the firewall.

Figure 2 shows the system virtualization and redundancy arrangements.

  1. Considering the data load of a start-up environment, I designed two physical servers with Type-1 hypervisors to host four functional systems.
  2. Each virtualized host has four virtual machines: a Domain Controller (DC), a Web server, an Exchange server, and a Data server. The Exchange servers are in a Database Availability Group (DAG) for mailbox availability, and the other three systems are in a multi-master replication to provide redundancy to the systems.
  3. The third physical server operates as a dedicated Data server, uses RAID 10 storage to provide on-site data redundancy. This server also provides daily encrypted off-site backups to the cloud for disaster recovery.
  4. The third physical server hosts the Exchange Witness role, which participates in quorum arbitration to support DAG stability during node failures.
  5. The Data servers on the two virtualized hosts can retrieve synchronized data from the cloud in case of a local Data server failure, providing limited continuity for critical business data.

3. Implementation and configuration highlights

Network Layer:

  1. hierarchical VLAN design (parent-VLANs and sub-VLANs)
  2. Network Address Translation (NAT)
  3. Rapid Spanning Tree Protocol (RSTP)
  4. Open Shortest Path First (OSPF) routing
ZoneVLAN IDVLAN NamePurpose / DepartmentIP SubnetGateway (L3)
Untrust10VLAN_UntrustISP / External AccessPublic IPN/A
DMZ20VLAN_DMZServers Zone (S1, S2, S3)192.168.20.0 /24192.168.20.1
Trust30VLAN_InternalInternal Corporate Network192.168.30.0 /24192.168.30.1
HR31VLAN_HR(HR Devices)192.168.31.0 /24192.168.31.1
IT32VLAN_IT(Admin, Servers)192.168.32.0 /24192.168.32.1
Sales33VLAN_Sales(Workstations)192.168.33.0 /24192.168.33.1
Guest Wi-Fi34VLAN_GuestGuest Wireless Network192.168.34.0 /24192.168.34.1

⬆ Table 1 VLAN and Zone Allocation

System Layer:

  1. Active Directory Domain Services (AD DS) with Group Policy is implemented to have centralized access control and authentication.
  2. Network services are Exchange Server, DHCP, and DNS.
OU / DepartmentGroup NameRole / Access LevelAssigned UsersExchange Mail Access
AdministrationDomain AdminsFull AD & Server AdminAdmin01, Admin02Global mailbox access, full control
AdministrationIT SupportLimited system supportTech01Internal email only
HRHR_StaffHR file & system accessHR01, HR02HR mailbox group
SalesSales_StaffSales apps & shared driveSales01-03Sales mailbox group
FinanceFinance_StaffAccounting data accessFin01, Fin02Finance mailbox group
GuestsGuest_WiFiInternet onlyGuest01No mailbox
Exchange SystemExchangeMailbox & DAGsvc_EX01, svc_EX02Service accounts only

⬆ Table 2 AD DS User and Access Design

Security Layer:

  1. Wireless security has EAP integrated with Active Directory for user authorization.
  2. Firewall policies are set based on zone-dependent communication policies.
  3. The guest wireless network has limited access to secure internal resources.

Maintenance and Automation: Day-to-day maintenance chores, such as backup administration, gathering of logs, and users’ accounts, are computer-automated with PowerShell scripts to minimize administrative labour and prevent configuration errors.

4. Reflection and summary

Strengths: For start-up companies, it is relatively balanced in terms of budget, reliability, and risk control. It has a clear security definition based on zone-level control, full multi-layer redundancy (data, system, and network), and a scalable form to support future growth. It shows high maintainability and flexibility for deploying in a small-to-medium enterprise.

Limitations: This existing single-firewall design still presents a possible single point of failure. Next generations can implement firewall clustering or a high-availability (HA) pair to remove this reliance.

Conclusion: In general, the design addresses the requirements of a start-up firm in terms of operating, security, and scale, but does so with realistic budgetary limitations. It shows a pragmatic engineering style that compromises performance, danger mitigation, and manageability.