Reference no: EM133771585
Assignment: Network Segmentation Strategy
Overview
One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security manager.
The project leverages the skills that you have built in Module Four. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe the fundamental principles and practices of network traffic flow policy and enforcement
Scenario
As a security analyst, you are tasked with creating a network segmentation strategy for your IT security manager. This includes configuration tasks in a network as well as a written rationale of the network segmentation strategy.
Your instructor will post a real-world scenario that includes the minimum specifications on which your work will be based (SCENARIO ATTACHED BELOW). You will also be provided with a Packet Tracer native file (.pkt) that you will import into the Packet Tracer application to use as the base diagram for your network. You will use the scenario and the provided Packet Tracer lab environment to do your work.
Prompt
You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Network Segmentation Strategy
Configuration
A. Configure the host-based firewall policy to meet project specifications. Provide a screenshot of the configured policy.
B. Configure the FTP server to meet project specifications for access control. Provide a screenshot of the configured FTP server.
C. Configure the network-based firewall policy to meet project specifications for the extended access control list. Provide a screenshot of the configured policy.
Rationale
A. Describe how network segmentation is achieved after meeting the configuration requirements for the host-based firewall.
B. Describe how the concept of least privilege is achieved in the configuration of the FTP server.
C. Describe an approach of employing a network-based firewall to achieve network isolation to meet project specifications.