This document presents a defense in depth model for network security, detailing the infrastructure of a corporate site in Chicago with multiple servers and remote access requirements. It discusses various security features across seven network domains and emphasizes the importance of roles, permissions, and redundancy to safeguard data integrity, confidentiality, and availability. Additionally, the design incorporates physical security measures and policies to mitigate threats effectively.