Upload
patrick-hoover
View
191
Download
5
Tags:
Embed Size (px)
Citation preview
1
A Comprehensive Network Development Project
Submitted to the IT/Computer Network
Systems Program in Partial Fulfillment of the
Requirements for the Associate Degree
By:
Patrick Hoover
Anthony Davis
Jules Francis
William Johnson
Advisor: Brandon Champion
ITT Technical Institute
Springfield, VA
May, 2013
1
ContentsScope Documentation and Project Charter...........................................................................................4
Purpose..................................................................................................................................................4
Goals and Objectives...........................................................................................................................4
Success Criteria....................................................................................................................................6
Project Context......................................................................................................................................6
Project Deliverables..............................................................................................................................7
Scope Specifications............................................................................................................................8
Cost Matrix.................................................................................................................................................9
Out-of Scope Specifications..............................................................................................................11
Information Security:.......................................................................................................................11
Application Roles and Permission:...............................................................................................11
Physical Hardware Disposal:.........................................................................................................11
Software and hardware maintenance:.............................................................................................12
Assumptions........................................................................................................................................12
Constraints...........................................................................................................................................12
Project Scope Approval Signatures..................................................................................................13
Security Plan...........................................................................................................................................14
Introduction and Background............................................................................................................14
Quality Assurance Plan..........................................................................................................................15
Introduction..........................................................................................................................................15
Responsibility and Roles....................................................................................................................15
Time and Reporting............................................................................................................................16
Test Plan..................................................................................................................................................17
Purpose....................................................................................................................................................17
System Overview....................................................................................................................................17
Test Analysis...........................................................................................................................................17
Systems Test...........................................................................................................................................17
Requirements to be Tested...............................................................................................................18
Performance Test...................................................................................................................................18
Training Plan...........................................................................................................................................19
Implementation Plan...............................................................................................................................22
1
Implementation Activities.......................................................................................................................22
Purposed Solution..................................................................................................................................23
Disaster Recovery Plan.........................................................................................................................24
Emergency Contacts..........................................................................................................................24
Purpose................................................................................................................................................24
Scope...................................................................................................................................................24
In the event of a fire........................................................................................................................26
Plan Review and Maintenance.......................................................................................................27
Network diagrams...................................................................................................................................28
IP Addressing Scheme.......................................................................................................................29
1
Scope Documentation and Project Charter
Purpose
Currently, all of the offices use dated personal computers that are not capable of
accommodating certain modern medical insurance and information applications. These
offices also cannot support the processing demand of specific digital images of medical
graphics, dot matrix printers with proprietary software that date back to 1986 are still
used to manage the patients’ information. These computer systems (hardware and
software) will need to be upgraded and the existing data will need to be transferred into
the new computer systems.
Goals and Objectives
Inter-connect remote offices to central office
Develop local area networks for each site
Install & configure Wi-Fi access
Upgrade workstations and printers
Install & configure servers
Configure and implement security, disaster recovery, and risk analysis
Develop training for doctors and staff
Develop IT support package (internal or external)
Maximize end users’ ease of use.
Centralized administration at each location.
Enable remote monitoring and management of client machines.
1
Minimize or eliminate end user downtime post deployment.
Provide services and equipment in the most cost effective manner.
Ensure training of end users in as effective and time condensed manner as possible.
Provide regular progress reports.
Maintain a list of milestones and revisit the schedule at the milestone markers.
Apply for and make any changes in a timely manner while reconfiguring the timeline
to account for it.
Maintain communication so all team members know the project status at a given
moment.
Implement client machines at each location with new hardware and have them all
running Windows 7 Professional
Implement Windows 2008 servers.
Consolidate the domains onto a master DC in central location.
Upgrade to Office 2010 on terminal server to provide access to all.
Enhance the security of each of the servers.
Implement a fast connection to each site through the frame.
Implement the electronic archive backup system.
Run Category 6 cable throughout both buildings.
Provide file sharing and transfer access for faculty, while restricting it of students.
Implement centralized management of the network at the central location.
1
Success Criteria
Our goal is to complete this project within 6 months for no more than $800,000. The
success of this project will be measured in the amount of time taken, money spent, and
the financial return on investment within the first 6 months after project completion.
Project Context
This project is designed to update current systems and will help better serve a larger
customer base while maintaining compliance with applicable laws and regulations. It will
allow for a higher level of satisfaction for patients and allow the medical staff to be more
efficient.
Project Deliverables
1
Task Title Deliverables Date Comments
Milestone 1 WAN Design 01/14/2013 Establish a design that incorporates network redundancy and stability while maintaining a reasonable cost to the customers.
Milestone 2 LAN Design 01/14/2013 Establish a design for each of the five(5) office locations that is suited to the needs for each space while maintaining a reasonable cost to the customers
Milestone 3 Hardware 01/11/2013 Purchase all necessary hardware. This includes but is not limited to workstations, laptops, printers, servers and required server equipment, routers, and switches.
Milestone 4 Software 01/11/2013 Purchase all necessary software and licenses to enable the customers to function optimally while maintaining a reasonable cost to the customers.
Milestone 5 Install 05/22/2013 Complete installation of all hardware and software components.
Milestone 6 Configure 05/22/2013 Configure all hardware and software to meet the customer’s needs.
Milestone 7 Test & Troubleshoot
05/29/2013 Test and troubleshoot all hardware and software to ensure all components are functioning correctly and to the customer’s specifications.
Milestone 8 Training 06/05/2013 Establish and implement a training program to ensure employees are competent and comfortable utilizing the new system and software.
Scope Specifications
To design an infrastructure that connects each remote office to the central office that will
meet all stated requirements for the integrity, storage, and movement of related data
1
and the applications that process such data, including the networking and
communications infrastructure that supports such applications covering all desired
functions in security, redundancy, and operability, etc. The office computers, servers,
and all network-related equipment need to be upgraded to meet the requirements as
well. Workstations from all sites will need to be connected to the internet all the time for
research and web-based applications. The new partnership is also seeking professional
guidance and procedures on whether it makes sense to hire a full-time staff to manage
the networking/telecommunications infrastructure and related services, or if leaving
such services to an external consulting firm will be more effective and efficient. Each
office will have its own local area network (LAN) with an operating speed that will permit
data transfer at high speeds with minimum chance of bottlenecks. CIS is proposing that
it would be best to have the data accessed by all offices by each office being on be on
its own LAN. As of today, data sharing among workstations is minimal. Dedicated high-
speed internet access is not currently available at any site.
Cost Matrix
Main Site
Materials Quantity
Cost Total
1
Cisco 3925 Series Voice Bundle Router 1 $6,546.00
$6,546.00
Cisco Catalyst 3750X-24T-S Switch - 24 ports PoE
1 $2,256.00
$2,256.00
Cisco Aironet 1041 Wireless Access Point 3 $250.00 $750.00Cisco Small Business SPA 303 VoIP Phone 16 $65.00 $1,040.00Dell PowerEdge R420 Server 3 $6,989.
00$20,967.00
APC Smart-UPS X 3000 Rack/Tower 2.7kW 2 $1,439.00
$2,878.00
Dell 4220 42U Rack 1 $990.00 $990.0024 Port Patch Panels 1 $29.00 $29.00RJ-45 jack modules 36 $3.00 $108.00Modular Wallplates 23 $1.00 $23.0052'' Cable Ties 25 pack 5 $45.95 $229.75Cable Tray 7ft Sections 64 $43.84 $2,805.76Miscellaneous Building Materials $2,000.00Dell Inspiron 14z Ultrabook 5 $699.99 $3,499.95Xerox 6400X Color Laser 1 $3,210.
00$3,210.00
Xerox 5550DT B/W Laser Printer 1 $3,177.00
$3,177.00
Xerox 8560MFP/N Color Solid Ink 1 $1,396.00
$1,396.00
Backup Generator 1 $2,792.00
$2,792.00
CAT6, 550-MHz Solid Bulk Cable 1000-ft 4 $149.95 $599.80
SoftwareMicrosoft Office 2010 18 $373.00 $6,714.00Windows 7 Professional 18 $109.00 $1,962.00AVG Enterprise Internet Security Suite 18 $50.96 $917.282 Socket Redhat Standard Tech Support 1 $799.99 $799.99Office AllyNagios Network monitoring Free
Materials Total $65,690.53
1
Satellite Sites
Materials Quantity
Cost Total
Cisco 3925 Series Voice Bundle Router 1 $6,546.00
$6,546.00
Cisco Catalyst 3750X-24T-S Switch - 24 ports PoE
1 $2,256.00
$2,256.00
Cisco Aironet 1041 Wireless Access Point 3 $250.00 $750.00Cisco Small Business SPA 303 VoIP Phone 16 $65.00 $1,040.00Dell PowerEdge R420 2008 2 $6,989.0
0$13,978.00
APC Smart-UPS X 3000 Rack/Tower 2.7kW 2 $1,439.00
$2,878.00
Dell 4220 42U Rack 1 $990.00 $990.0024 Port Patch Panels 1 $29.00 $29.00RJ-45 jack modules 36 $3.00 $108.00Modular Wallplates 23 $1.00 $23.0052'' Cable Ties 25 pack 10 $45.95 $459.50Cable Tray 7ft Sections 64 $43.84 $2,805.76Miscellaneous Building Materials $2,000.00Dell Inspiron 14z Ultrabook 5 $699.99 $3,499.95Xerox Phaser 5550DT B/W Laser Printer 1 $3,177.0
0$3,177.00
Xerox Phaser 8560MFP/N Color Solid Ink 1 $1,396.00
$1,396.00
Generac 5871 10,000 Watt Backup Generator 1 $2,792.00
$2,792.00
CAT6, 550-MHz Solid Bulk Cable 1000-ft 4 $149.95 $599.80
SoftwareMicrosoft Office 2010 18 $373.00 $6,714.00Windows 7 Professional 18 $109.00 $1,962.00AVG Enterprise Internet Security Suite 18 $50.96 $917.28Office AlleyNagios Network monitoring FreeMaterials Total $54,920.7
9
1
Total Budget: $800,000
Out-of Scope Specifications
Information Security:
A management framework should be established to initiate and control the
implementation of information security within the organization. Management should
approve the information security policy, clearly define and assign security roles, and
coordinate and review the implementation of security controls across the organization.
Application Roles and Permission:
Roles and permissions for all applications implemented by CIS will be established by
CIS.
Physical Hardware Disposal:
All hardware currently in place within the CIS offices will be placed in an area
designated by the CIS Project Manager, within the CIS facilities to be removed at the
doctors expense. Removal should be coordinated with the CIS Project Manager to be
sure removal of hardware does not interfere with active install times and spacing
requirements.
1
Software and hardware maintenance:
All patches, updates and warranty information will be provided to CIS during the project
and updated prior to project completion. After project completion CIS and all third party
vendors should work in cohesion to ensure proper patches, updates, upgrades and
warranties are maintained or implemented.
Assumptions
The project can be implemented within budget.
All require suppliers, resources, and services will available as needed.
All hardware and software will operate correctly.
All offices require new hardware and software.
All doctors and nurses are familiar with workstation functionality.
Project team will be given ample space to perform project task.
Constraints
We will have to perform majority of implementation tasks after work hours.
The economy is bad- the cost budget cannot be exceeded.
1
Project depends upon successful and timely completion of associated tasks.
Project environment is new and the components have not yet been successfully
integrated.
Project Scope Approval Signatures
Project Name: Doctors Office Network Project
Project Manager: Patrick Hoover
I have read the information in this Project Scope Statement and agree:
Name Role Signature Date(MM/DD/YYY)
The signatures above indicate an understanding of the purpose and content of this document by thosesigning it. By signing this document, they agree to this as the formal Project Scope Statement document.
1
Security Plan
Introduction and Background
CIS is responsible for maintaining all hardware asset control until final sign off on project
release and handover occurs. All hardware purchased and not yet placed into site will
be the sole responsibility of the CIS team. When asset has been moved onto site,
customer will be solely responsible for the physical security of all hardware. All
application security will be initiated through CIS and turned over before project
completion during a knowledge sharing meeting at project end.
Information and Software Security
All the workstations, laptops and servers will be configured and implement with an
approved centrally managed virus protection software (AVG Software). Users should
not be permitted to disable, bypass, suspend, or alter the state of the software to reduce
vulnerability.
All Company applications implemented by CIS are required to be configured to prevent
unauthorized access to information held in application systems, control user access and
protect from malicious software that is capable of overriding or bypassing system or
application controls.
Physical Security
apC/8X Advanced Processing Controller is an access control for all outer doors and
rooms requiring restricted access. This also allows for access card entry and control for
employees, alarm monitoring, which will serve as a basic building block for building
1
security management. Door card reader will provide performance, reliability, and
security.
A red LED flashes green and the beeper sounds when reader is presented with a
proximity card. The multicolor LED and beeper can also be controlled individually by the
host system controls.
Quality Assurance Plan
Introduction
CSI has all right and is responsible for maintaining all hardware asset control until the
final sign off on the project release and handover. All hardware that was purchased and
not have been put into the site will be the sole responsibility of CSI. When the assets
have been moved onto the site locations, the customer will be responsible for the
physical security of all hardware. All of the security applications will be initiated through
CSI and turned over to the doctors before the project completion during the final
meeting at the end of the project.
Responsibility and Roles
All of the doctor assets handled by CSI will be accounted for by using the Equipment
List and Gant Chart. The equipment list may be delegated by the owner as appropriate
to the process; however the owner remains responsible for the proper protection of the
assets.
CSI will secure all hardware off site during the project period and will replace any stolen
or lost items at their expense. The contacts are listed below in case of an asset event.
Name Position Phone Number
1
Patrick Hoover Project Manager 301-898-7789Jules Francis Security 301-897-8899
CSI will install, test and oversee training the new training place on all application
security software agreed upon with the doctors/nurses need to ensure the company
compliance and standard are met.
Time and ReportingThe maintenance and documentation of the equipment list will become the responsibility
of the doctors/nurses at the end of the project. Any assets movement will be approved
by the project manager 24 hours prior to move and the assets site location verification
will be accessed by the same project manager within 12 hours of move.
1
Test Plan
PurposeThe purpose of this test plan is to ensure all systems are working to expected level. This
would include software and hardware alike.
System Overview
Hardware and software are both CIS’s responsibility to test during implementation
process. All tests will be performed with the 3rd party vendors.
Test Analysis
Connectivity tests, LAN and WAN, will be done to ensure proper and stable
connectivity to office's servers and the internet.
Security, internal and external, will be tested for intrusion detection and prevention.
User access, rights, and privileges will be tested in alignment with the doctors
needs.
Install measures will be set and tested
All application software install will be tested with 3rd party vendors after install and
during all configuration changes
1
Systems Test
The system tests will focus on the behavior of the system. User scenarios will be
executed against the system as well as error message testing. Overall, the system test
will test the integrated system and verify that it meets the requirements defined in the
requirements document.
Requirements to be Tested
AVG Enterprise Internet Security Suite will be used to test its security holistically of any
malware or attacks of any kind. The result has a respectable capability to fully block
malicious attacks. Microsoft Server 2008 R2 will be used to test user access, rights, and
privileges which will meet HIPPA law and privacy of patient’s demographic.
Performance Test
Performance test will be conducted to ensure that the network system’s response time
meet the user expectations and does not exceed the specified performance criteria.
During these tests, response times will be measured under heavy stress and/or volume.
1
Training Plan
Introduction
All training will be performed by CIS team members with the exception of Office Ally which will be conducted by Office Ally training staff. All training is outlined with a specified schedule.
Purpose
The purpose of this training plan is to ensure that all employees know what will be expected of them during the training phase of this project.
Scope
All training is provided by Capital IT Solutions with the exception of Office Ally software.
System Overview
Systems to be included in training are:
-General computer knowledge
-Basic computer skills
-Windows 7 Professional (OS)
-Microsoft Office 2010
1
General Training Outline
Training schedules are included in the timeline and must be completed no later than 2
weeks prior project hand off. Training will be done at one of the four sites with staff as
the customer schedules. Each training session will be conducted in a class type
environment to include no more than 10 staff members at time.
Roles and Responsibilities
All training material and execution will be handled by Jules Francis, Patrick Hoover and Antony Davis.
Techniques and Tools
Training will be conducted in a classroom type setting on site with computer-based
instruction, hands-on practical sessions, written manuals, and peer-to-peer practice
time. Training can extend on an individual basis for up to 3 hours on each training day
and is included in the cost.
Curriculum
Course Offering
Audience Method When/How Often
Trainer
Computer Skills Training
All office Staff to include medical staff
Hands on training, classroom type environment
TBD Patrick Hoover or Jules Francis and a member of the management staff
Microsoft Office Suite
All office Staff to include medical staff
Hands on training, classroom type environment
TBD Antony Davis or Jules Francis and a member of the management staff
Operating All office Hands on TBD Patrick Hoover or
1
Sysem (Win7Pro)
Staff to include medical staff
training, classroom type environment
Jules Francis and a member of the management staff
Tracking and Reporting
All training classes will be signed into on hard copy forms and returned to office staff for
attendance review. Clock in for such training will be the responsibility of the office
management and not CIS.
Sustainability
Training will be scheduled by the Project manager and the office team to isolate dates,
and this will be reviewed regularly until the training dates begin. All training feedback
will be submitted in the form of a status report by the training to the Project manager
and then submitted to the office team for review. If any changes or suggestions are to
be submitted by the office team, it needs to be given to the project manager within 24
hours of next scheduled training session.
1
Implementation Plan
The configuration of workstations, servers, routers, and switches will happen offsite
prior to actual installation. CIS will then begin with the central office and run cabling to
accommodate plan specifications, after connectivity has been established CIS will start
hardware install only at the central office. After installs and test have been completed at
the central office, the other office implementations will commence at the satellite sites.
Implementation Activities
By following the implementation plan, setup of the infrastructure should satisfy all
requirements set forth in the Scope Document and Project Charter. The ultimate
outcome of implementing our plan is to have each office set up with a modern, reliable,
high-speed Local Area Network, with connectivity to each office through the Wide Area
Network. This will include new servers, new workstations and a vastly more reliable
backup and data retrieval system.
1
Purposed Solution
CIS will develop a solution that will impact all of the five doctors to provide excellent
service to patient without impacting normal business operations. We will have a network
diagram that will incorporate all submitted requirements to allow success for the
business and project growth. We will have full details for all network connections,
configurations, networks, and a level of security settings.
Each office should meet all security and disaster plan recovery plan including all of the
HIPAA requirements at a reasonable cost. For our security system we will have
identification for authentication, authorization, and public key infrastructure at each
location. Each location will also have a network LAN and WAN design to have the ability
to communicate between locations.
CIS will provide training to all of the staff/employees. This training will be provided to all
the doctors, nurses, supervisors, managers, billing collection department, and financial
manager. We will have backup plans and disaster recovery plans to protect the
company information. For the disaster recovery plan the financial manager, billing
department, supervisors will receive training. Our project will be completed once we
1
have successfully implemented the network that meets the client’s needs/wants, the
budget and deadlines.
Disaster Recovery Plan
Emergency Contacts
Name Address Home Phone Mobile/Cell Phone
Patrick Hoover (111)222-2222 (555)666-6666
Anthony Davis (222)333-3333 (666)777-7777
Jules Francis (333)444-4444 (777)888-8888
William Johnson (444)555-5555 (888)999-9999
PurposeThe purpose of this disaster recovery plan (DRP) is to prepare the doctors in the event
of communication interruptions due to events out of the control of the CIS Staff (man-
made or natural disasters). All locations that are connected to the WAN are expected to
implement preventative measures wherever possible to offset the time needed to
recover operational network communications. This plan identifies vulnerabilities and
recommends necessary measures to prevent extended network outages. It is a plan
that covers all locations network operations.
1
ScopeThe scope of this plan is limited to the areas of the doctors operations, specific to their
facilities and CIS installed data lines. This is a disaster recovery plan (DRP), not a daily
problem resolution procedures document.
DRP Objectives
To serve as a guide for the doctors IT data and network recovery teams
Refers and points to the site of network operational data outside this document
Provides procedures and resources needed to assist in network recovery
Identifies vendors and customers to be notified when a network outage occurs
Helps to assist in the avoidance of confusion experienced during a network outage
by keeping proper documentation, testing, and reviewing recovery procedures
To identify alternate sources for network equipment, services, power supply, and
other resources
Documentation of storage, safeguard, and retrieval procedures needed for network
records and other data relevant to business operations
Emergency management standards
Backup policy
Full and incremental backups protect and preserve corporate network information
and should be performed on a regular basis for system logs and technical
documents that are not easily replaced, have a high replacement cost or are
considered critical. Backup media should be stored in a secure and geographically
separate location from the original and isolated from environmental hazards.
1
Backup network components, cabling and connectors, power supplies, spare parts
and relevant documentation should be stored in a secure area on-site as well as at
other corporate locations.
Network-specific data and document retention policies specify what records must be
retained and for how long. All network organizations are accountable for carrying
out instructions for records management in their organization.
System databases
A copy of the most current network and system databases must be made at least
twice per month or based on frequency of changes made.
These backups must be stored offsite.
The lead network administrator is responsible for this activity.
Offsite storage procedures
Access to backup databases and other data is tested annually.
Data backups will be stored through Carbonite (carbonite.com) hosted facilities.
In the event of a fire
If fire or smoke is present in the facility where network infrastructure assets are located,
evaluate the situation and determine the severity, categorize the fire as a major or minor
incident and take the appropriate action as defined in this section. Call 911 or contact
your local first responders as soon as possible if the situation warrants it.
Personnel are to attempt to extinguish minor fires (e.g., single hardware component
or paper fires) using hand-held fire extinguishers located throughout the facility. Any
1
other fire or smoke situation will be handled by qualified building personnel until the
local fire department arrives.
In the event of a major fire, call 911 and immediately evacuate the area.
1
In the event of any emergency situation, such as system and network security, site
security and personal safety are the major concerns. If possible, the lead network
administrator and/or designee should remain present at the facility until the fire
department has arrived.
In the event of a major catastrophe affecting the facility, immediately notify senior
management.
Plan Review and Maintenance
This network disaster recovery plan must be reviewed semi-annually and exercised
on at least an annual basis. The test may be in the form of a walk-through, mock
disaster, or component testing. Additionally, considering the dynamic environment
within offices, it is important to review the listing of personnel and phone numbers
contained within the network DR plan regularly. The hard-copy version of the
network DR plan will be stored in a common location where it can be viewed by site
personnel and the EMT and DRT. Electronic versions will be available via the
doctors network resources as provided by IT Technical Support. Each recovery
team will have its own directory with change management limited to the recovery
plan coordinator.
1
Network diagrams
1
IP Addressing Scheme
Location IP Address Subnet Gateway Gateway IP SubnetCWS01 192.168.3.1 255.255.255.224 Central Office Rt 192.168.8.0 255.255.255.252CWS02 192.168.3.2 255.255.255.224CWS03 192.168.3.3 255.255.255.224CWS04 192.168.3.4 255.255.255.224CWS05 192.168.3.5 255.255.255.224CWS06 192.168.3.6 255.255.255.224CWS07 192.168.3.7 255.255.255.224CWS08 192.168.3.8 255.255.255.224CWS09 192.168.3.9 255.255.255.224CWS10 192.168.3.10 255.255.255.224CWS11 192.168.3.11 255.255.255.224CWS12 192.168.3.12 255.255.255.224CWS13 192.168.3.13 255.255.255.224CWS14 192.168.3.14 255.255.255.224CWS15 192.168.3.15 255.255.255.224NWS01 192.168.4.1 255.255.255.240 North Office Rt 192.168.9.0 255.255.255.252NWS02 192.168.4.2 255.255.255.240NWS03 192.168.4.3 255.255.255.240NWS04 192.168.4.4 255.255.255.240NWS05 192.168.4.5 255.255.255.240NWS06 192.168.4.6 255.255.255.240NWS07 192.168.4.7 255.255.255.240NWS08 192.168.4.8 255.255.255.240NWS09 192.168.4.9 255.255.255.240NWS10 192.168.4.10 255.255.255.240NWS11 192.168.4.11 255.255.255.240NWS12 192.168.4.12 255.255.255.240NWS13 192.168.4.13 255.255.255.240NWS14 192.168.4.14 255.255.255.240NWS15 192.168.4.15 255.255.255.240EWS01 192.168.5.1 255.255.255.240 East Office Rt 192.168.10.0 255.255.255.252EWS02 192.168.5.2 255.255.255.240EWS03 192.168.5.3 255.255.255.240EWS04 192.168.5.4 255.255.255.240EWS05 192.168.5.5 255.255.255.240EWS06 192.168.5.6 255.255.255.240EWS07 192.168.5.7 255.255.255.240EWS08 192.168.5.8 255.255.255.240EWS09 192.168.5.9 255.255.255.240EWS10 192.168.5.10 255.255.255.240EWS11 192.168.5.11 255.255.255.240EWS12 192.168.5.12 255.255.255.240EWS13 192.168.5.13 255.255.255.240EWS14 192.168.5.14 255.255.255.240EWS15 192.168.5.15 255.255.255.240
1
SWS01 192.168.6.1 255.255.255.240 South Office Rt 192.168.11.0 255.255.255.252SWS02 192.168.6.2 255.255.255.240SWS03 192.168.6.3 255.255.255.240SWS04 192.168.6.4 255.255.255.240SWS05 192.168.6.5 255.255.255.240SWS06 192.168.6.6 255.255.255.240SWS07 192.168.6.7 255.255.255.240SWS08 192.168.6.8 255.255.255.240SWS09 192.168.6.9 255.255.255.240SWS10 192.168.6.10 255.255.255.240SWS11 192.168.6.11 255.255.255.240SWS12 192.168.6.12 255.255.255.240SWS13 192.168.6.13 255.255.255.240SWS14 192.168.6.14 255.255.255.240SWS15 192.168.6.15 255.255.255.240WWS01 192.168.7.1 255.255.255.240 West Office Rt 192.168.12.0 255.255.255.252WWS02 192.168.7.2 255.255.255.240WWS03 192.168.7.3 255.255.255.240WWS04 192.168.7.4 255.255.255.240WWS05 192.168.7.5 255.255.255.240WWS06 192.168.7.6 255.255.255.240WWS07 192.168.7.7 255.255.255.240WWS08 192.168.7.8 255.255.255.240WWS09 192.168.7.9 255.255.255.240WWS10 192.168.7.10 255.255.255.240WWS11 192.168.7.11 255.255.255.240WWS12 192.168.7.12 255.255.255.240WWS13 192.168.7.13 255.255.255.240WWS14 192.168.7.14 255.255.255.240WWS15 192.168.7.15 255.255.255.240