Describe how network segmentation is achieved after meeting

Assignment Help Computer Networking
Reference no: EM133771585

Assignment: Network Segmentation Strategy

Overview

One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security manager.

The project leverages the skills that you have built in Module Four. The project will be submitted in Module Six.

In this assignment, you will demonstrate your mastery of the following course competency:

Describe the fundamental principles and practices of network traffic flow policy and enforcement

Scenario

As a security analyst, you are tasked with creating a network segmentation strategy for your IT security manager. This includes configuration tasks in a network as well as a written rationale of the network segmentation strategy.

Your instructor will post a real-world scenario that includes the minimum specifications on which your work will be based (SCENARIO ATTACHED BELOW). You will also be provided with a Packet Tracer native file (.pkt) that you will import into the Packet Tracer application to use as the base diagram for your network. You will use the scenario and the provided Packet Tracer lab environment to do your work.

Prompt

You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.

Network Segmentation Strategy

Configuration

A. Configure the host-based firewall policy to meet project specifications. Provide a screenshot of the configured policy.

B. Configure the FTP server to meet project specifications for access control. Provide a screenshot of the configured FTP server.

C. Configure the network-based firewall policy to meet project specifications for the extended access control list. Provide a screenshot of the configured policy.

Rationale

A. Describe how network segmentation is achieved after meeting the configuration requirements for the host-based firewall.

B. Describe how the concept of least privilege is achieved in the configuration of the FTP server.

C. Describe an approach of employing a network-based firewall to achieve network isolation to meet project specifications.

Reference no: EM133771585

Questions Cloud

Milestone events in the history of english : Milestone events in the History of English Lexicography and the History of Arabic Lexicography- 3 events from English and 3 events
Describe the levels of scientific rigor exemplified : Describe level of scientific rigor exemplified in a descriptive assessment is. Describe the levels of scientific rigor exemplified in a descriptive assessment.
Examples of functions of each area of service : Descriptions of each area of service or office, including the responsibilities and goals. Examples of functions of each area of service or office
How will you solve the problem of case : If you are consultant and asked to solve the problem, how will you solve the problem of case? What are the steps you will follow to solve?
Describe how network segmentation is achieved after meeting : CYB 220- Describe how network segmentation is achieved after meeting the configuration requirements for the host-based firewall.
Describe how those values have impacted : Identify two values from the assessment that resonated with you. Preferably, one "Common Good" value and one "Self Interest" value, when applicable
Examine the role of the financial system in the economy : FIN402 Financial Institutions and Markets - Examine the role of the financial system in the economy and the rationale for financial intermediation.
Describe the hypothetical situation to your co-facilitator : Describe the hypothetical situation to your co-facilitator. Then, share your plan for intervening, using the behaviors that support mutual learning
Explain relevant examples of previous learning : Critical Thinking and Reflection: Explain relevant examples of previous learning with a logical thought process. Integration and Application

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd