By Md Muhtashim Jahin
This project involved the end-to-end deployment of an enterprise IT infrastructure designed for centralized management, security, and monitoring. The infrastructure consists of 7 Windows 22 Servers, 1 Ubuntu Server, 3 Client Machines (Windows 10), 2 Switches, and 2 Firewalls (FortiGate & Palo Alto), all configured as a corporate network. PRTG Network Monitor and Zabbix are being used for Network Monitoring, Device Health, and Application Monitoring.
This project showcases my skills in IT Infrastructure Deployment & Design, System Administration, Network Configuration, Domain Management, VPN Implementation, Storage Provisioning, and Enterprise-Grade Monitoring using both PRTG Network Monitor and Zabbix Server & Application Monitoring.
Network Diagram
Services & Roles Deployed
Each Windows Server was assigned a dedicated role to ensure modular design and clear separation of services:
Active Directory Domain Services (ADDS) – Primary domain controller for centralized authentication.
Sub-Domain Controller – Facilitating organizational segmentation within the directory hierarchy.
DHCP Server – Dynamic IP address assignment across the internal network.
DNS Server – Internal name resolution for domain-based resources.
Remote Access VPN Server – Secure connectivity for remote users using RAS VPN.
iSCSI SAN Server – Centralized storage using iSCSI target services.
PRTG Monitoring Server – Real-time monitoring of network health, availability, and performance.
Zabbix Ubuntu Server is configured with Zabbix, providing Servers, Clients, and Applications monitoring and visibility.
Client-side implementation included:
2 On-Site Clients: One joined to the root domain and the other to the sub-domain, simulating department-based access and policy segmentation.
1 Remote Client: Securely connected via Remote Access VPN to simulate external workforce access to internal network resources
A FortiGate firewall was configured to manage traffic flow, implement security policies, and enable VPN services, while two network switches handled VLAN segmentation and internal communication.
Deploy Domain Controller (ADDS Server) and add a client to the Domain (adatum.com)
Installing the ADDS Role on our Domain Controller Server
Promote the Server to Domain Controller
Add Client to the Domain
Create a child domain (Sub-Domain)
Promote the server to Domain Controller and configure it as a Child Domain.
Deploy a DHCP Server, Authorize the DHCP Server & Create a DHCP Scope
Deploy The DHCP Server
Authorizing the DHCP Server
Create a DHCP Scope and Testing
Test the DHCP Server
Congratulations! The DHCP Server is working.
Deploy DNS Server and Create Forward Lookup Zones (Secondary zone)
Deploy the DNS Server
Configure Forward Lookup Zones (Secondary Zone)
iSCSI SAN Server
Multiple protocols can be used to configure SANs. Fiber Channel SAN is expensive to implement. iSCSI SAN storage gives us an inexpensive and simple way to configure a connection to remote disks.
Create a Storage Pool and a Storage Space
Create New Virtual Disk
Install iSCSI Target Server
Create an iSCSI Virtual Disk
Configure iSCSI Initiator
Remote Access Service (RAS) VPN Server
If you are doing it on a Virtualized Environment, then make sure to use a different Network Adapter on your Remote Client and add another adapter to your RAS VPN Server. If you are in a real environment, deploy a separate client and create 2 Firewall Policies to send and receive packets from 192.168.239.0/24 and 172.16.30.0/24 (Remote) subnets.
DC Server RAS VPN Server Remote Client
Install and Configure Remote Access Service (RAS) VPN
Configure the Windows Firewall
Create VPN Group and VPN User
Configure Network Policy Server
Network Policy Server performs centralized authentication, authorization, and accounting for wireless authenticating switches and VPN connections.
Configure Remote Client (VPN Client)’