Reference no: EM132488976
ICTNWK509 Design and implement a security perimeter for ICT networks - Abbey College Australia
Assessment - Performance Assessment
Read the case study carefully then answer the questions following. You may assume any
information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.
Case Study: Penetration Testing
SolutionTech Consulting Services is a company that provides IT services to local businesses. It employs 250 people. They want to deploy the latest technological advancements to their office.
At its main site (HQ) it has a small server room (in-house datacentre) provision of 10 servers to provide authentication and directory services, resource sharing, printing and hosts two large database systems.
They have 3 department sales capacity needs of 200 hosts including wifi users, Research with 50 hosts and management with 25 hosts. Additionally, they need an in-house datacentre of 10 servers.
SolutionTech will procure their new router and switches to manage their network.
Their current internet connection is provided by an ISP (Internet service provider) with public IP (88.40.12.0/30) and a private DNS (10.10.10.1/24). They are planning to keep the service with same provider service for their new network.
Currently they don't have any security perimeter implemented at their network and they are planning to use 172.16.10.0/23 IP address block for their new network.
Identify some threats to SolutionTech perimeter security?
Develop Network design for SolutionTech considering a secure perimeter and explain your design considerations? (You may use any network design software, A demo design provided here to give you some idea)
Deploy the network for SolutionTech to meet perimeter security requirements by cisco packet tracer? (Show related device configuration)
• Build Network topology
• Connect all devices using the correct type of cables
• Configure layer 2 switches (Trunk Links, VTP, VLANs, and Sub-interfaces) according to their requirements.
• Show IP address allocation for all departments (Static and DHCP)
• Configure routes (Routing to connect internet and intranet, DHCP pool for departments) and wireless Access point , DNS and Web server
• Annotate the diagram (including IP Addressing)
• Configure username and password and privileges levels in SolutionTech's switches and routers
• Configure password encryption, idle timeout, login blocking and a banner
• Configure telnet remote access
• Configure switchport Port security.
Configure following additional security feature in SolutionTech's Edge Router
• Configure SSH (Secure Shell) protocol for remote login.
• Configure access control lost to prevent sales Dept. to ping the DNS
Configure a remote access VPN to access SolutionTech's network from outside world.
Test and show all your configuration to your Assessor for acceptance (Additionally, attach your test screen shot)
Attachment:- Design and implement a security perimeter for ICT networks.rar