ICTNWK509 Design and implement a security perimeter

Assignment Help Other Subject
Reference no: EM132488976

ICTNWK509 Design and implement a security perimeter for ICT networks - Abbey College Australia

Assessment - Performance Assessment

Read the case study carefully then answer the questions following. You may assume any
information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.

Case Study: Penetration Testing

SolutionTech Consulting Services is a company that provides IT services to local businesses. It employs 250 people. They want to deploy the latest technological advancements to their office.

At its main site (HQ) it has a small server room (in-house datacentre) provision of 10 servers to provide authentication and directory services, resource sharing, printing and hosts two large database systems.

They have 3 department sales capacity needs of 200 hosts including wifi users, Research with 50 hosts and management with 25 hosts. Additionally, they need an in-house datacentre of 10 servers.

SolutionTech will procure their new router and switches to manage their network.

Their current internet connection is provided by an ISP (Internet service provider) with public IP (88.40.12.0/30) and a private DNS (10.10.10.1/24). They are planning to keep the service with same provider service for their new network.

Currently they don't have any security perimeter implemented at their network and they are planning to use 172.16.10.0/23 IP address block for their new network.

Identify some threats to SolutionTech perimeter security?

Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software, A demo design provided here to give you some idea)

Deploy the network for SolutionTech to meet perimeter security requirements by cisco packet tracer? (Show related device configuration)
• Build Network topology
• Connect all devices using the correct type of cables
• Configure layer 2 switches (Trunk Links, VTP, VLANs, and Sub-interfaces) according to their requirements.
• Show IP address allocation for all departments (Static and DHCP)
• Configure routes (Routing to connect internet and intranet, DHCP pool for departments) and wireless Access point , DNS and Web server
• Annotate the diagram (including IP Addressing)
• Configure username and password and privileges levels in SolutionTech's switches and routers
• Configure password encryption, idle timeout, login blocking and a banner
• Configure telnet remote access
• Configure switchport Port security.

Configure following additional security feature in SolutionTech's Edge Router
• Configure SSH (Secure Shell) protocol for remote login.
• Configure access control lost to prevent sales Dept. to ping the DNS

Configure a remote access VPN to access SolutionTech's network from outside world.

Test and show all your configuration to your Assessor for acceptance (Additionally, attach your test screen shot)

Attachment:- Design and implement a security perimeter for ICT networks.rar

Reference no: EM132488976

Questions Cloud

Discuss 2 reasons why an employee might request fmla : Discuss 2 reasons why an employee might request FMLA (Family and Medical Leave Act) for a disability.
Compare explicit and implicit code instruction : Compare and contrast explicit and implicit code instruction. Describe what type of learner might profit from each. Describe how you would adapt the directed.
What is the donees basis for purposes of determining loss : Donor made a gift of property to donee. If the donee sells the property for $75,000, What is the donee's basis for purposes of determining loss is equal to
Was vaaf contractually obligated to pay chad : 1. Was VAAF contractually obligated to pay Chad for refraining from smoking? 2. Was there consideration to support its promise to pay $500?
ICTNWK509 Design and implement a security perimeter : ICTNWK509 Design and implement a security perimeter for ICT networks Assignment help and solution, Abbey College Australia - assessment writing service
How to differentiate and accommodate students needs : As a teacher, it is crucial to know the milestones for language and literacy based on the age and developmental level of students in order to know how.
Determine the temporary book-tax difference : Determine the temporary book-tax difference for the depreciable asset and the balance to be reported in the deferred tax liability account
Relevant sections of the corporations act : With reference to the relevant sections of the Corporations Act (2001) (Cth) and case law, answer the following four questions:
What can cause instability and dissonance in human behavior : What can cause instability and dissonance in human behavior? How do disturbances in equilibrium generate opportunities for learning?

Reviews

Write a Review

Other Subject Questions & Answers

  Complete all the relevant tax forms and schedules

FINA - 1025 Individual Taxation - Fanshawe College - Calculator to calculate taxes owing - Complete all the relevant tax forms and schedules

  Describe the biopsychosocial theories of motivation

Using a minimum of 300 words, briefly describe the biological, psychosocial, and biopsychosocial theories of motivation. Provide an example of a behavior.

  Explain one anticipated outcome of each

Describe two theory-based interventions you would use and justify your selection. Explain one anticipated outcome of each.

  Can the equal itself-beautiful itself-each thing in it

What does it mean when he says "Let us return to those same things with which we were dealing earlier, to that reality of whose existence we are giving an account in our questions and answers;

  What are inputs and outputs for master production scheduling

What is disaggregation? What are the inputs and outputs for master production scheduling? Prepare a master schedule based on the following information.

  What problem area would the internet intervention address

What problem area would the internet intervention address?Provide a general description of the proposed internet intervention.

  Identify the education required to the career

Identify the education required, potential outlook of the career, theoretical salary, and other information connected to the career.

  How each topic is portrayed in the film

Appropriate examples are given for how each topic is portrayed in the film. Author explains whether the movie/tv show demonstrated the topic correctly.

  How does your organization handle legal issues

How does your organization handle legal issues? Does it have in-house counsel, attorney on retainers, or seek advice when an issue arises?

  Estimating the time for the activity

Performing program logic design is activity 12. This can be started only after the system design checkpoint review is completed.

  How do you get the clients from treatment

How do you get the clients from treatment to ongoing stabilization of care? For example, do they all need to follow all of the steps from inpatient.

  Consider some of most basic behaviors

Consider some of your most basic behaviors: dressing, talking, walking etc. To what extent do you think these are a result of gender role socialization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd