Design the appropriate security to prevent unwanted traffic

Assignment Help Computer Network Security
Reference no: EM131499168

Assignment: Technical Paper

Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic and to prevent illegal activities from occurring. Your job in this project is to use the diagram below and the criterion set by the company to come up with the proper command structure to create the access control lists. Document the steps you used to create and determine (justify) the usage of your ACL and is part of process of implementation of a new security feature. Remember to include what type of access list you created, where you applied, and why. Below is a diagram of the current network and some specific requests from the company.

Some specific request from the company

1. The company wants to prevent all traffic that is not part of the internal network (172.16.0.0 /16) from traveling out of the Ethernet interfaces.

2. They also want to prevent host 172.16.5.35 from accessing the Internet.

3. Consideration needs to be made to prevent Telnet, ftp, and ability to ping from outside of the network.

4. The 17.16.3.0 segment houses all of the sales information. The company wants to prevent access from other networks to that segment.

Write an eight to ten page paper in which you:

1. Re-create the diagram above and add the needed ACL to the appropriate port by using Visio or similar drawing program.
2. Create Standard Access Lists.
3. Create Extended Access Lists.
4. Apply the access list correctly.
5. Justify the ACL and describe each purpose.

Your assignment must follow these formatting requirements:

1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

2. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

1. Demonstrate the use of operating system commands to monitor, control, and configure Internetworking environments.
2. Describe organizational security considerations in an Internetworking environment.
3. Use technology and information resources to research issues in internetworking.
4. Write clearly and concisely about basic internetworking topics using proper writing mechanics and technical style conventions.

Reference no: EM131499168

Questions Cloud

What is offshoring : You will create an entire Transformational Change Management Plan for a medium-sized public company that has lost business to a competitor that has chosen.
Create a communication strategy : Create a communication strategy that fosters change and innovation in an organization. Explain the context in which it occurs.
Relationship between the tr tc and tvc curve : As the price of wheat changes, what is the relationship between the TR TC AND TVC curve versus nitrogen at the point where farmers stop supplying wheats.
Differences between oceanic ridges and oceanic rises : Can you describe the differences between oceanic ridges and oceanic rises? Include in your answer why these differences exist.Answer in 75 to 100 words
Design the appropriate security to prevent unwanted traffic : Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic.
Aggregated addressing scheme for both ipv4 and ipv6 : Design an aggregated addressing scheme for both IPv4 and IPv6 addresses to allow summarization on each router.
Describe the prospects for establishing a critical society : Describe a story that has recently been sensationalized, and explain a key component of sensationalism that was part of the way the story was presented.
Explain how efficiency and equality trade-off : Explain how efficiency and equality trade-off; what do we mean by economic efficiency; why can't we have efficiency and equity?
Plot the random effects estimates for models : Plot the random effects estimates (forest plot) for models (3c) and (3d) and provide with an appropriate caption

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd