Describe organizational security considerations

Assignment Help Computer Networking
Reference no: EM13897734

Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic and to prevent illegal activities from occurring. Your job in this project is to use the diagram below and the criterion set by the company to come up with the proper command structure to create the access control lists. Document the steps you used to create and determine (justify) the usage of your ACL and is part of process of implementation of a new security feature. Remember to include what type of access list you created, where you applied, and why. Below is a diagram of the current network and some specific requests from the company.

\Some specific request from the company

1714_TECHNICAL PAPER.png

1. The company wants to prevent all traffic that is not part of the internal network (172.16.0.0 /16) from traveling out of the Ethernet interfaces.

2. They also want to prevent host 172.16.5.35 from accessing the Internet.

3. Consideration needs to be made to prevent Telnet, ftp, and ability to ping from outside of the network.

4. The 17.16.3.0 segment houses all of the sales information. The company wants to prevent access from other networks to that segment.

Write an eight to ten (8-10) page paper in which you:

1. Re-create the diagram above and add the needed ACL to the appropriate port by using Visio or similar drawing program.

2. Create Standard Access Lists.

3. Create Extended Access Lists.

4. Apply the access list correctly.

5. Justify the ACL and describe each purpose.

Your assignment must follow these formatting requirements:

1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

2. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

1. Demonstrate the use of operating system commands to monitor, control, and configure Internetworking environments.

2. Describe organizational security considerations in an Internetworking environment.

3. Use technology and information resources to research issues in internetworking.

4. Write clearly and concisely about basic internetworking topics using proper writing mechanics and technical style conventions.

Reference no: EM13897734

Questions Cloud

Kinematic relationships between the crank and the yoke : Create a video of your real scotch yoke moving, and show the computer-generated animation side-by-side or overlayed in the same video.
What tools available central bank for control money supply : What are the tools available to the central bank for controlling the money supply? Discuss how manipulation of each of these tools will change the money supply and how reliable each tool is likely to be.
What are the projected usd gbp rate and usd eur rate : What are the projected USD > GBP rate and USD> EUR rate for which the expected interest costs would be the same for the three loans?
How much time will be needed to gather the data : Suggest a plan to test your hypothesis (initial or revised). What data will you study? How and where will you gather it? What equipment or resources will be needed? How much time will be needed to gather the data
Describe organizational security considerations : Describe organizational security considerations in an Internetworking environment
What is lender-of-last-resort function of the central bank : What is the lender-of-last-resort function of the central bank in modern economies? What is its justi?cation? Should commercial bank borrowing from the central bank be a privilege or a right? Discuss.
Is it obvious which security the treasurer should pick : Is it obvious which security the Treasurer should pick? Suppose the Treasurer believes that the 1-year LIBOR rate 1 year from now will rise to 4.50%.
What role might technology and telecommunications play : Propose one strategy to increase the participation of the nursing profession in research and lifelong learning. What role might technology and telecommunications play in promoting research participation
What goals were mandated for central banks : Are there, in general, any problems with the application of cointegration techniques to money supply functions, or with the interpretation of estimates? Can these estimates be relied upon? Discuss.

Reviews

Write a Review

Computer Networking Questions & Answers

  Network topology & communication

You have been asked by Redline Motors & Equipment, a local motor and performance parts company, to install a network in its new office. The corporate office use to be located within the warehouse, and a small office was leased in a remote location..

  Find length of longest consecutive sequence of os in input

Input stream to 4B/5B block encoder is 0100 0000 0000 0000 0000 OOOI. Answer the following questions: Determine length of longest consecutive sequence of Os in input?

  Expiration and garbage collection timersare

Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

  Pros and cons of ga based algorithm

Pros and Cons of this algorithm - example and then show each step of the GA based algorithm numerically.

  Compute the result of an add immediate 150 instruction

Compute the result of an ADD IMMEDIATE 150 instruction and Compute the result of an ADD DIRECT 150 instruction

  What are the inter-dependencies of workstation hardwares

what are the inter-dependencies of workstation hardwares with network components.

  Discuss how we use the control panel to configure specific

some commentators have suggested that companies today have not adequately configured computers and network resources

  Use the internet and other sources to research

Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques? Based on your research, would you recommend this technique? Why or why not?

  Find the required bit rate if sampling rate is given

Find out the required bit rate. Suppose that the sampling rate is 8000 samples per second and that one framing bit is added to each frame.

  Youre logged on locally to a users computer and your

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Famous financial corporationas head of the information

famous financial corporationas head of the information protection department of famous corporation you have just

  Explain client-server architecture

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd