Network
The network of IDnet is a complex set of interconnected networks, local and remote providing services to local users and external internet users. Regarding the servers, most of the network systems are built on the Linux operating system for reasons of security, performance, functionality and cost. The operating systems versions used by the servers is either the last version of Debian Linux or Windows server 2012. The choice of the specific operating system versions came from statistical analysis about network safety and efficiency.
The hardware on which the servers of the network are built covers all present company needs and systems are designed in such a way that there is the possibility of immediate correction of errors and problems with the least possible delay. Each machine contains two network cards, one of which is active (primary NIC) and the other in readiness state for operation (backup NIC). Also the system disks on machines provide high usability based on RAID, which guarantees perfectly smooth operation even if discs are damaged.
As for the system of electronic mail and Domain Name Hosting which is the most important, the services are provided by two entirely separate machines for maximum reliability. If irreparable damage occurs to the primary server, the secondary server takes over to fulfill the duties of the faulty one.
The rest of the network equipment is Cisco and MikroTik routers and switches and Hewlett Packard servers. The choice of routers was based on the exorbitant opportunities provided for networking but also based on the construction of the systems for durability and long uptimes. Also these systems provide many security features as being essentially the doorway of the network to the Internet. The servers are Hewlett Packard and have permanently installed backup systems by the same firm for data security. There are also the APC UPS installed in all individual systems for uninterrupted operation.
Finally, the Hewlett Packard switches are used purely for security issue. They are high level programmable switches which can have block ports for operation only with allowed systems and also support the creation of VLAN which further increases the security level of the network.
Services
The services provided by the systems of the network are divided into three categories. The first category is the customer service and this includes mail services, websites hosting and data storage on the Internet. The second category includes security services for the systems from external factors and the remote sub-networks and finally, the third category is the intercom systems and mission statistics and problems via email to the manager network monitoring.
The services provided by the system to customers are:
- Mail services. The servers of the network provide email service for customers of the company. There are antiviruses and anti-spam ware embedded in this service to protect the mail from viruses and junk mail. This is achieved by using two different antiviruses (BitDefender and ClamAV) and three repulsion systems for spam messages. All five sub-systems are updated from servers on the Internet daily or hourly, depending on the need. This way better protection can be achieved for the users.
- Web hosting services. The company's customers have the ability to host web pages on the Internet through the company's servers. In addition, there is the possibility of maintaining websites with programs written in PHP and a database which can cooperate with them. In the case of a sensitive program, there is also the possibility of buying SSL certificate and install it on the system for secure communication between clients and the server (if user passwords are required). Finally the customers can see stats on their websites, such as how many people have visited, what hours they visited and what they are looking for, etc.
- Data storage services. This service allows the company's customers to store files and data on the Internet safely. Access to the data storage is done using username and password.
The security services running on the system are:
- Firewall. The router is set up with a system limiting access from the Internet to the internal network. Access is permitted only to the ports that provide services to customers of the company. Also on each server there is a separate rigged Firewall to prevent access from any other threats.
- Intrusion Prevention System (IPS). This system prevents unwanted access to company servers from the Internet thereby ensuring the continued and proper operation of equipment from hacker attacks.
- Automatic checking and parsing of logs. With each act performed by a server a line to a log file is added which describes what happened. All the systems have automated programs inspecting the logs to see if there is a problem.
- VPN. Communications between different system components via the Internet occur using secure VPN tunnels. Through these connections all important internal network data is sent to the central servers for safe storage and use.
The information services provided by the system are:
- Logs. After the automatic checking of the logs from the system if a problem is found the system reports a mail with information on the matter to the administrator. This is a process that runs every hour in each system.
- IPS report. Once the checking process for unauthorized users in the system is complete, a message is sent to the administrator with information.
- Instant messaging. In case there is a problem or error in any service on the system a message is sent to the administrator at that time.