Reference no: EM132639854
BN303 Wireless Networks and Security - Melbourne Institute of Technology
Assessment - Secured design of wireless LAN
Learning Outcome 1: Explain wireless communication protocols;
Learning Outcome 2: Utilise standards-based technologies used in various networks;
Learning Outcome 3: Apply wireless network security techniques in the context of ethical implications;
Learning Outcome 4: Design and implement secure enterprise wireless networks.
Design and implementation of wireless network for an enterprise.
Wireless networks are useful but prone to many security attacks. In order to secure wireless network but to retain its accessibility, mobility and connectivity, the network engineers must take care in designing and implementation of a wireless network.
The intent of network engineer is to extend the internet services from wired network using multiple access points in many carefully selected locations. One of the resolutions for wireless network security is to encrypt data and provide intelligent authentications - that is to segregate between the internal users to the external guest users. You can find a set of tools such as WAP or WAP2 that can help you to protect the wireless in such a way. In particular for authentication, the recommended solution is IEEE802.11x that provide authentication for devices trying to connect through wireless LANs.
The main objective in this assignment is to design and implement IEEE 802.1X standard for security over wireless LAN authentications for a campus with any a large number of students and staff (staff with more services available on authentication and authorizations).
In designing your network, consider the following:
• How can you secure your network from potential attacks? Are WPA or WPA2 sufficient for all future attacks? Consider the network design with devices that support 802.1X
• Design IEEE 802.11x network using Protection-Capable Management Frames.
• You need to deploy a secure 802.1X serve 2,000 students and 200 staff at a campus (consider using DMZ).
• Deploy a solution that supports all business and security requirements (on a simulated environment).
Requirements
Design and implement the network for the above scenario. You need to submit a group report with clear statement of individual group member's contribution on the front page.
In this report, you need to include:
• Design the wireless network of campus according to the given specification (the diagrams can be on Paint or other simple drawing platforms such as draw.io)
• Incorporate the network security using either WAP or WAP2.
• Present the security requirements for wired network and wireless network of campus given there are two groups of users - students (acting as guests) and staff (acting as internal users).
• Implement the designed network on a network simulator satisfying both business and security requirements (students with guest Internet access while staff having access to the Internal Data (consider DMS)) - you may need to clear on authentication and authorizations.
• Test and troubleshoot if any incompliance.
• Report the final working version of your network on a network simulator (e.g. Cisco Packet Tracer or other tools (including GNS3)).
Present the report with steps that explain all the solutions and implement the IEEE802.11x security demonstration using WAP or WAP2 (in the demonstration you need to consider how to user connect to the WLAN through the access point). Provide a plan to extend the network for more users if required.
Write a report that includes the following sections: abstract, introduction that contains brief history, network components etc, proposed solution along with figure, demonstration of your implementation and testing, and your future recommendations.
Attachment:- Wireless Networks and Security.rar