Home > other >  Questions about the company to form a network, really
Questions about the company to form a network, really

Time:11-16

About 40 people, two adjacent office, two 50 m broadband, 1 300 m optical fiber, connect different computers, each computer connected to a broadband/fiber, now want to do the following things:

1. The formation of a corporate network, only the company's computer can connect to the network

2. Ensure that the computers of the company may be outside the normal connection network

3. The company to build a knowledge base, the knowledge base in the corporate network, only the fixed computer can edit the two companies, computer can look at the other company, are not allowed to copy

4. The company has six printer, including two pin type, three small all-in-one machine, a bigger than small all-in-one machine, the six special printer assigned to different departments, how to set up a

5. More than 95% for computers is very dilettante employees, also don't know what to do, cause computer use for a card, how can you avoid this

6. If possible, to build knowledge base into a small white can use computer, a lot of content, employees need to quick search and find a want to find the answers,
how to do?


Above problem is a little bit more, train of thought is not very clear, I look for a person who have the ability to teach (although it is difficult to), there will be a ChongXie!

CodePudding user response:

This problem can find integrator and project if not yourself

CodePudding user response:

You can only give you a general idea reference
1. The formation of a corporate network, only the company's computer can connect to the network (this is a local area network (LAN) on a network segment is then don't let him do NAT R can access the network don't have this segment line, should be done with the knowledge base, right)

2. Ensure that the computers of the company may be outside the normal connection network (network knowledge base and your company is not in a network segment, then two routing network segment, and then R on acl refuse repository segment ipoutbound)

3. The company to build a knowledge base, the knowledge base on the company Intranet, computer can edit only fixed two company, other companies can look at the computer, not allowed to copy (completion of the company's internal LAN can share the knowledge base on the computer or server in a folder, and then specify the sharing permissions and users, online tutorials)

4. The company has six printer, including two pin type, three small all-in-one machine, a bigger than small all-in-one machine, the six special printer assigned to different departments, how to set up (different departments set up the computer connected to the printer and the printer on the host computer printer sharing boot, how to share the printer online tutorials are relatively simple, oneself when different computer connect printer can control)

5. More than 95% for computers is very dilettante employees, also don't know what to do, cause computer use for a card, how can you avoid this situation (not very good method, can make the soft reduction but cannot save the file on the desktop will be lost after boot)

6. If possible, to build knowledge base into a small white can use computer, a lot of content, the company staff's time of need can quickly search for and find answers to want to find, how to do? (the normal search search is the inside of the computer just to establish different folder directory, this you can also choose to use a OA office software knowledge base, generally has the function of document announcement for examination and approval of the process class's will have some demand according to oneself choose a nail has, for example)

CodePudding user response:

Our company take the function of the domain you have 40 people office seemed to complicate the

CodePudding user response:

You require is a little high, 40 people a small company, do you have in this room to do a lot of things, almost to mainstream a full range of hardware, no more than a dozen W come down, otherwise the network not stable, network control your AC, a lot of advice to choose the big brand, brand, if to be economical, advice on a firewall + layer 3 switches, firewall is used for the entire network limit outside network attack and defense, three layer is used to manage a network, such cost will be much more economical than a full set of,

CodePudding user response:

1 switch do you need, you first need to huawei's 5720 s core switches is enough, one routing can be satisfied,

1. If you can't mean the network network, routing can be isolated,
If is to want to do a network segment, the segment is prohibited on the Internet, can be in the core switches to set up a vlan, set a vlan interface make section of the gateway, also best in switches set acl banned this IP, access to all the network or access strategy is set in routing,

2. In the core design departments of vlan network segment, do source NAT access in routing,

3. The average unit using oa to implement this function, if not, you can use the FTP way, find a computer to do the FTP server, with account limits how to read and write permissions,

4. Printer independent setting a vlan, use acl corresponding access to the department,

Problems and 5. 3, if you want to realize the function, suggest question 3 use SMB protocol (Windows file sharing), each user to add the mapping set, immediately search (FTP does not support this search)

CodePudding user response:

1.95% employees bad habit with a computer, you can use the behavior management software, deep, green this, or enterprise edition in 360 and tinder, limit the software download open, page limits, such as U disk access permissions control
2. Network knowledge sharing it with serv - U do server, client flashfxp, cuteftp, can leafftp, user rights configuration very convenient also

CodePudding user response:

The construction of the local area network (LAN), this is relatively simple, need not in the description
Foundation for the company's information construction, first set up the company AD environment, including the DHCP service; FS service

1. Create different security group for rights management, set up local printing service on the FS, according to the requirement to authorized
2. DHCP service for authorization workstation (MAC address) to specify the IP, unauthorized equipment cannot be used;
3. The same is true with the knowledge base, the most simple is the FS, authorization, according to the role that such and such user groups have edit permissions, so-and-so user groups have to check the permissions; If it is to be assigned to the computer (edit/view) to realize rights management, the bound using the group policy to the user to specify the computer login is complex (slightly)
4. Use for a long time the computer will card problem, first of all, based on the AD account to use, general users only access (that is, to install/uninstall the software on the computer), avoid any setup program; Secondly to install antivirus software, avoid the risk of virus;