Describe organizational security considerations

Assignment Help Computer Networking
Reference no: EM13897734

Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic and to prevent illegal activities from occurring. Your job in this project is to use the diagram below and the criterion set by the company to come up with the proper command structure to create the access control lists. Document the steps you used to create and determine (justify) the usage of your ACL and is part of process of implementation of a new security feature. Remember to include what type of access list you created, where you applied, and why. Below is a diagram of the current network and some specific requests from the company.

\Some specific request from the company

1714_TECHNICAL PAPER.png

1. The company wants to prevent all traffic that is not part of the internal network (172.16.0.0 /16) from traveling out of the Ethernet interfaces.

2. They also want to prevent host 172.16.5.35 from accessing the Internet.

3. Consideration needs to be made to prevent Telnet, ftp, and ability to ping from outside of the network.

4. The 17.16.3.0 segment houses all of the sales information. The company wants to prevent access from other networks to that segment.

Write an eight to ten (8-10) page paper in which you:

1. Re-create the diagram above and add the needed ACL to the appropriate port by using Visio or similar drawing program.

2. Create Standard Access Lists.

3. Create Extended Access Lists.

4. Apply the access list correctly.

5. Justify the ACL and describe each purpose.

Your assignment must follow these formatting requirements:

1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

2. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

1. Demonstrate the use of operating system commands to monitor, control, and configure Internetworking environments.

2. Describe organizational security considerations in an Internetworking environment.

3. Use technology and information resources to research issues in internetworking.

4. Write clearly and concisely about basic internetworking topics using proper writing mechanics and technical style conventions.

Reference no: EM13897734

Questions Cloud

Kinematic relationships between the crank and the yoke : Create a video of your real scotch yoke moving, and show the computer-generated animation side-by-side or overlayed in the same video.
What tools available central bank for control money supply : What are the tools available to the central bank for controlling the money supply? Discuss how manipulation of each of these tools will change the money supply and how reliable each tool is likely to be.
What are the projected usd gbp rate and usd eur rate : What are the projected USD > GBP rate and USD> EUR rate for which the expected interest costs would be the same for the three loans?
How much time will be needed to gather the data : Suggest a plan to test your hypothesis (initial or revised). What data will you study? How and where will you gather it? What equipment or resources will be needed? How much time will be needed to gather the data
Describe organizational security considerations : Describe organizational security considerations in an Internetworking environment
What is lender-of-last-resort function of the central bank : What is the lender-of-last-resort function of the central bank in modern economies? What is its justi?cation? Should commercial bank borrowing from the central bank be a privilege or a right? Discuss.
Is it obvious which security the treasurer should pick : Is it obvious which security the Treasurer should pick? Suppose the Treasurer believes that the 1-year LIBOR rate 1 year from now will rise to 4.50%.
What role might technology and telecommunications play : Propose one strategy to increase the participation of the nursing profession in research and lifelong learning. What role might technology and telecommunications play in promoting research participation
What goals were mandated for central banks : Are there, in general, any problems with the application of cointegration techniques to money supply functions, or with the interpretation of estimates? Can these estimates be relied upon? Discuss.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd