Design and implement security solutions using networking

Assignment Help Computer Networking
Reference no: EM133505589

Network Security

Coursework - Network Security Implementation using ACL, IPS and VPN

Learning Outcome 1: Develop an in-depth understanding of fundamental concepts and challenges in data and network security
Learning Outcome 2: Demonstrate concepts related to basic cryptography
Learning Outcome 3: Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Introduction
This is an individual assignment. This task weights 70% of the overall grade.
For this coursework, you are required to implement network security.You must reflect/validate the network security services and produce an associated 3000 words report. You need to complete this assignment as an individual. Please provide a detailed walk-through snippet of secure network and services. The quality of walk-through snippet will influence the weighting of assignment marks.
Assume that you are working as a Network Security Engineer atEquinox IT Solution, Ltd in London. The Equinox IT solution, Ltd was subject to security breaches in the past, which caused financial lose and effected the organization reputation as well. This time the organization is focusing on robust Network Security implementation to protect confidential data in transit. It will also be helpful for security auditing. You have been asked to implement and test network security ofEquinox IT Solutions Company. The network topology ofEIS is given below:

Equinox IT Solution Network Topology

Your main task is to design and implement network security with direct link to Internet/Wide Area Network (WAN)in a series of Block Tasks. You should be able to design and implement Site-to-Site VPN Tunnel, ACL andIOS based Intrusion Prevention System (IPS) along with basic device hardenings to secure organisation Local Area Network (LAN) using appropriate network simulation environment. The organisational network enable integration with IPsec VPN that allow strong encryption to ensure confidentiality and integrity.The network and security services can be designed using well known network simulators.

Assignment Tasks:
Your work must be presented in the form of a Project Report and be no longer than 3000words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Task(s):

Block A: Network Architecture and Communication
1. Implement basic device hardening with the following services fully running and functional, DNS Server, Web Server andSyslog Server.
2. Allocate and distribute the IP addresses to network and end devices according to given design both static configuration and dynamic configuration via DHCP server.
3. Implement and configure Dynamic Routing using RIPV2/OSPF protocol to demonstrate effective routing on WAN network between internal and external site. It is preferred to use OSPF.
4. Configuring appropriate VLAN trunking for multiple VLAN'S to segment the traffic in separate broadcast domain for security reasons.
5. Design and implement fully functional Inter-Vlanrouting using IEEE 802.1Q encapsulation standard to demonstrate connectivity between business sites.

Block B: Secure Operations and Service Delivery
1. Configure Access Control List (ACL)on routing device to implement the Security Policy to restrict the network access according to the organisation policy. (Reasonable assumptions can be made).

2. Implement andconfigure a Site-to-Site IPsec VPN to comprehensively encrypt the traffic travelingover WANnetwork between internal and external site network. Evidence must be provided on how the VPN Tunnel provide the integrity and confidentiality for the IP packets traversing in and out of network.

3. Implement IOSbased Network Intrusion Prevention System (IPS) and test its efficiency in your deployment to secure internal network.

4. Implement a firewall and configure relevant rules in the context of the given scenario. Evidence the functionality and provide a narrative elaborating on the rationale behind the location on the network.

Block C: Research & Development
1. Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data. At the same time, it protects those applications and users from advanced threats on the Internet. Considering the context of case study and practical implementation of block A and B, please discuss and critically analyse the Zero Trust Network Security Model. You should refer to your security implementation in given network for the sake of discussion and back up your findings with credible references to demonstrate critical research on the topic.

2. With reference to the case study, critically discuss how IPsec VPN can be used to achieve security. Identify the levelof reliability and critically discuss the cryptographic mechanism of IPsec.

Report Structure:

1. Executive Summary
2. Block A: Architecture and Communication
2.1 Configure IP connectivity and device hardening
2.2 Configure servers DNS, WEB, SYS-Log.
2.3 Configure Dynamic Routing (RIPV2) and Inter-Vlan Routing/Trunking
3. Block B: Secure Operations and Service Delivery
3.1 Implement ACL onRouting device
3.2 Implement Site-To-Site IPSec VPN
3.3 NIPS implementation and testing
3.4 Firewall configurations
4. Research & Development
4.1 Zero Trust Network Security Framework
4.2 Overview of VPN reliability
4.3 Cryptographic mechanism of IPSec
5. Conclusion and Future Work

Attachment:- Network Security Implementation.rar

Reference no: EM133505589

Questions Cloud

What you have learned about these orders list two principle : List these five orders. Using what you have learned about these orders list two principle identifying characteristics for each order, and name two commonly
Most positive influence in your life : Discuss the organizational leader who has had the most positive influence in your life and explain why.
How cane toads might have directly or indirectly affected : Explain why you did or did not observe a change in the death rate of a crimson finches in their nests after the arrival of cane toads. Be sure to reference
Describe the assay design, endpoint read : describe the assay design, endpoint read, types of controls you will need to include and the expected outcome/results of your assay to determine
Design and implement security solutions using networking : LD7007 Network Security, Northumbria University - Critically evaluate threats to data and network security; design and implement security solutions
Discuss the pooled relative risk estimate was found : estimated that about one-third of prostate cancer cases can be present in men in their fourth or fifth decade of life without any clinical symptoms or signs.
Describe the tools and resource for teaching elementary math : Describe the following tools and resources for teaching elementary mathematics, including examples of use during instruction.
How it has shaped human evolution : Explain biocultural evolution and how it has shaped human evolution. Make sure to justify your answer with evidence.
Address your feelings on decision : A special board of education meeting has been called to discuss this decision. You have decided to speak at this meeting to address your feelings on decision.

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine the essential items that you will need to consider

Determine the essential items that you will need to consider prior to the network deployment, and explain the importance of each item in the deployment process.

  What is cyber warfare

What is Cyber Warfare?Definition for Cyber Warfare.Tactical and Operational Reasons for Cyber War.

  Find at least one sample security audit plan

Using the resources given or other resources, find at least one sample security audit plan. Analyze that document.

  Identify an itam solution

As you have been looking into how to deploy an ITAM solution and classify the company's IT assets, you keep seeing the phrase "data classification pop up.

  Maintain and troubleshoot in network world

Troubleshooting. Given what we have studied to date, and your own experiences out there in "Network World," what is it that makes modern computer networks so easy -- or so difficult -- to maintain and troubleshoot

  1 we are building a network using radios that operate at

1. we are building a network using radios that operate at 1ghz in an urban area.nbsp once end of the link will have the

  Write a paper listing the network protocols

Write a 1- to 2-page paper listing the network protocols covered in the readings and discussing one protocol with which you have worked and are familiar.

  What happens if three processors try to access global memory

Consider a multiprocessor using a shared bus. What happens if three processors try to access the global memory at exactly the same instant?

  Provide a comprehensive description of entities in system

Provide a comprehensive description of entities in the System. You are expected to use your own experience with information systems

  Prepare a detailed system documentation report

Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template. You have the freedom

  Explain the benefits of network topologies

Explain the benefits of network topologies in relation to network efficiency adding how routing protocols assist in the efficient delivery of network traffic.

  System Integration and Architecture Prelim Project

Concept in Action - The average cost of the product or any license fees per seat - present the preceding information in a written report to top management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd