Develop Network design for SolutionTech

Assignment Help Computer Networking
Reference no: EM132464437

ICTNWK509 - Design and implement a security perimeter for ICT networks - Abbey College Australia

Assessment - Performance Assessment (Skills) Requirements

Read the case study carefully then answer the questions following. You may assume any information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.

Case Study: Penetration Testing (attached)

Question 2.1 Identify some threats to SolutionTech perimeter security?

Question 2.2 Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software, A demo design provided here to give you some idea)

Question 2.3 Deploy the network for SolutionTech to meet perimeter security requirements by cisco packet tracer? (Show related device configuration)
• Build Network topology
• Connect all devices using the correct type of cables
• Configure layer 2 switches (Trunk Links, VTP, VLANs, and Sub-interfaces) according to their requirements.
• Show IP address allocation for all departments (Static and DHCP)
• Configure routes (Routing to connect internet and intranet, DHCP pool for departments) and wireless Access point , DNS and Web server
• Annotate the diagram (including IP Addressing)
• Configure username and password and privileges levels in SolutionTech's switches and routers
• Configure password encryption, idle timeout, login blocking and a banner
• Configure telnet remote access
• Configure switchport Port security.

Question 2.4 Configure following additional security feature in SolutionTech's Edge Router
• Configure SSH (Secure Shell) protocol for remote login.
• Configure access control lost to prevent sales Dept. to ping the DNS

Question 2.5 Configure a remote access VPN to access SolutionTech's network from outside world.

Question 2.6 Test and show all your configuration to your Assessor for acceptance (Additionally, attach your test screen shot)

Attachment:- Penetration Testing.rar

Reference no: EM132464437

Questions Cloud

Benefits and drawbacks of next generation firewalls : Develop a class presentation to illustrate ‘The benefits and drawbacks of next generation firewalls - Demonstrate knowledge of subject
Do smartphones will continue to intrude more into private : Do you think smartphones will continue to intrude more into our private and social spaces, or do you think society is beginning to push back?
Create the community roads with permeable concrete : Create the community roads with permeable concrete that will absorb and collect annual rainfall to essentially aide in the communities recycling efforts
Examine the role of professional ethics in conducting audit : Discuss the CPA responsibility in reporting illegal acts as stated in the article below. Would the new rule reduce AICPA ethics violations?
Develop Network design for SolutionTech : Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software
Prepare the accounting standards update about leases : Locate the Accounting Standards Update (ASU) about leases. Share what you initially find most interesting about two ASUs in two separate postings.
Calculate the holding period return on a before-tax basis : Calculate the holding period return on a before-tax basis for each of these four investments.etermine the after-tax HPR for each of their four investments.
British medical journal compared two treatments for kidney : A study published in the British Medical Journal compared two treatments for kidney stones:
Number of vacation days : The number of vacation days taken by the employees of a company is normally distributed with a mean of 14 days and a standard deviation of 3 days.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain software defined networking

Explain Software defined networking. What is open flow? How SDN outgrows open flow initiative. Define the market of major vendors who use it.

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

  Draw the network using visio

CP1402 - design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network, assign IP addresses

  Launched municipal wifi networks

A number of U.S. cities have launched municipal WiFi networks over the past few years. Research three deployments, anywhere in the world, and compare the networks in terms of architecture, applications, cost to the consumer, and success.

  Discuss the performance differences between fhss and dsss

Discuss the performance differences between FHSS and DSSS - What considerations should be used when determining the chipping rate?

  Create a domain local group

Create a domain local group, a global group, and make the global group a member of the domain local group.

  Define analog filter and digital filter

Some traditional designs from analog filters commonly adapted for digital filters include Butterworth, Chebychev, Elliptic, and Bessel.

  What are all the protocol steps that take place

What are all the protocol steps that take place, starting from powering on your PC to getting the web page? Assume there is nothing in our DNS or browser caches when you power on your PC

  What is connection-oriented networking?

Networking modes: What is connection-oriented networking? How many modes can it be operated and what are they?

  Describe the artificial neural networks

Artificial neural networks have been extensively used in pattern recognition tasks, such as character and face recognition. Independently of the potentiality.

  Difference b/w interior routing and exteriorrouting protocol

What are they, how are they both similar and different, why do we need both kinds of routing protocols, how might each be used, and provide the names of one or two routing protocols in each category.

  Discuss common input or output technologies

Discuss common input or output technologies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd