Create a final network diagram

Assignment Help Computer Networking
Reference no: EM13754968

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Write a four to five (4-5) page paper in which you:

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)
Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)
IP address assigned to all devices

Establish the configuration for each device in which you:

Research each of the devices you chose and provide a basic configuration you would use in your network.
Use IP addresses to describe your configuration.
Explain the impact that each of your configurations has on the security of the entire network.
Highlight at least five (5) security features for each device, including devices in network diagram.

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following:

VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.
All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
Users from Engineering and Finance and Accounting CANNOT communicate.
Vulnerability scans occur daily in which all desktops are scanned at least once per day.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

1170_network diagram.png

Reference no: EM13754968

Questions Cloud

How an organization can determine the effectiveness : Discuss the job functions that are needed to support the intended information system used by the organization. Include a description about how an organization can determine the effectiveness of an information system
Management accounting and control system : Behavioral considerations of a well-designed management accounting and control system include all of the following except:
Create a table that shows how the access quality and cost : Create a table that shows how the access, quality, and cost of health care are influenced by the low-income, middle-income, and high-income status of an economy
What unique borders did the united states gain : What unique borders did the united states gain when it acquired this territory back in 1776?
Create a final network diagram : Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following: VPN sessions (from laptop) are only allowed to access the desktops in the IT d..
Confidence interval for a population proportion : When a confidence interval for a population proportion is constructed for a sample size n = 100 and the value of, p =.p = .4 the interval is based on the
What were muhammads revelations : What were Muhammad's revelations?
What was the strategy of the aclu : What was the strategy of the ACLU even though the had a hunch that Scopes would probably lose the trial?
Explain characteristics of ideal ruler in ancient south asia : Citing specific evidence from the Ramayana (not from the textbook), explain some of the characteristics of the ideal ruler in ancient South Asian society.

Reviews

Write a Review

Computer Networking Questions & Answers

  How to access remoteapp applications from partner server

In the TS RemoteApp Manager console, there are currently two warning indicators showing in the Overview area. Will any of these warnings make it impossible to access your RemoteApp applications from your partner server?

  Implement a pvlan solution hosting dns www and smtp servers

Implement a switch to switch connectivity using Trunking and aggregating links and implement a PVLAN solution hosting DNS WWW and SMTP servers

  Write and briefly describe five-component model of

list and briefly explain the five-component model of an information system. how can you use them? why is mis one of the

  Technology to internetwork the two buildings

Suppose you are working for a small business that has outgrown its existing building. What technology will you recommend to internetwork the two buildings?

  Data communications and net-centric computing homeworklan

data communications and net-centric computing homeworklan sectionq1. list a below contains the layers of the internet

  Determine possible routing paths in bgp routing table

In the topology, network S is multi-homed to four providers, i.e., P1, P2, P3 and P4, where P1, P2 and P3 are customers of common provider P while P4 is customer. Now assume D is destination of interest. Determine the possible routing paths to D th..

  Exercise 1 read the following papers and provide a 2 to 3

exercise 1 read the following papers and provide a 2 to 3 paragraph summary of main pointsa read and summarize big

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  Describe original classful address scheme

In original classful address scheme, was it possible to find out the class of the address from address itself? Describe.

  Why you think dynamically assigning ip addresses are useful

Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain..

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  What type of information would a network administrator look

the headquarters of abc threads which is a large textile company located in dallas texas has its network administrator

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd