Implement a secure network infrastructure for a tafe nsw

Assignment Help Computer Networking
Reference no: EM132377578

Assignment

This project provides an opportunity for students to apply their understanding of practical security concepts, network design and security implementation skills gained from lectures, studying the online curriculum, discussion as well as self-study and online research.

You are required to design, setup and implement a secure network infrastructure for a TAFE NSW. You need to do your research in order to provide a through and workable design. You should also show your research results in your written report.

To complete this Project properly with all required documentations is not a trivial task. It is important that you read and understand each requirement and complete all tasks as study progress.

You need to submit a written report (Microsoft word .docx format) and a working Packet Tracer file (.pkt format).

General Requirements and suggestions

1. This Report is to be completed as group work. Form a group of 2-3 members.

2. You should plan and complete the Report on a weekly basis so that all tasks can be completed properly. Leaving the Report to the very last day(s) will result in an unprofessional research report.

3. The configuration must be working and is based on your Topology design.

4. Use Packet Tracer version 7.1 for your configuration.

5. Some part of your design may not work in Packet Tracer. You can include a Limitation section in your report to show that you plan to and can do the parts that are not supported in Packet Tracer.

6. All information sources must be appropriately acknowledged and a full bibliography is required. Failure to do so could result in severe penalties.

7. Research using internet would be helpful. Make sure you state the source of the materials. Refer to the referencing format in Moodle.

8. Plagiarism: It is expected that this will be completely your own work. Therefore using the "cut and paste" approach will not be accepted.

Scenario

Green Powered Electricity Supplier (GPES) is a relatively small but fast growing electricity retail supplier in NSW. GPES is keen on reducing cost; improve efficiency, increase market share and profitability. They have hired John Winterbottom as new CEO who is a tech savvy and very enthusiastic about technologies such as 5G and penetration of IoT in every walks of our lives.

In order to achieve the goals set forward by the company as far growth and profitability is concerned; he comes with a new business initiative where GPES is to opt for automatic electricity utility bill generation system. The system is to be highly available and secure and work with internet connected electricity meters powered by latest IoT using 5G technology installed on customer's premises. This, he argues will reduce the cost, increase efficiency and ultimately improves the bottom line when comes to profitability.

Starting in first quarter of 2020, the company is planning to install the new meters to all their customer premises, business as well as their domestic customers. In the first phase, meters will be installed to the premises of the business customers only, which numbers around 150 customers site. Electricity usage data from the meters are to be automatically uploaded on weekly basis. GPES also requires that electricity usage data be read remotely from the company if required.

Depending on what customers choose, the system should generate electricity utility bill every month or quarterly. Bills will be automatically emailed to the customers and or a printed version is generated and posted to the customers if required. The system should also be able to generate automatic reminder notification for the bills not paid on time. Notifications should be in the form of email or hard copy send to the customer.

GPES has opened two regional branches in Melbourne and in Brisbane to cover Victoria and Queensland market place as part of GPES drive toward nationwide service coverage. GPES also supports staff to work at home. GPES business structure includes the following departments:

1- Management

2- Engineering

3- Sales

4- Marketing

5- IT support

6- HR

7- Accounts

8- Customer Support

Requirements

Your task is 2-folds:

Task 1: Written Report

• Need analysis and implementation plan for GPES HQ:

GPES HQ is to be designed based on the latest integrated LAN enterprise architecture with security, high availability, redundancy and load balancing at its core. Your analysis should include but not limited to:

- Authentication,

- Authorization,

- Accounting/logging.

• Security of IoT enabled meters:

Your written report must thoroughly discuss, but not limited to:

- legislative compliance issue relating to IoT enabled meters

- suitability of protocols and technologies to read meters remotely

- protecting GPES enterprise networks from IoT enabled meters exploits.

Task 2: Network design and configuration

• As proof of concept, you are to prototype the proposed design of your GPES enterprise network using Cisco Packet Tracer version 7.1 for the configuration. Your small-scale network should include a site for the HQ LAN network and one of the branch offices of your choice.

• Industrial best practice and recommendations should be adopted. For GPES HQ LAN, you may consider a three-zone security model: internal, external and DMZ.

• For the HQ network, you should also consider, but not limited to:

- VLANs (choose no less than 3 vlans)

- DHCP service,

- Server-based AAA service, with TACACS+ and/or RADIUS servers,

- NTP, Web Server, FTP Server, TFTP server, etc.

- LAN security,

- Syslog Server,

- ASA firewalls,

- Authenticate devices connected to the network through switch ports.

Communication between the HQ and the branch office should be secure.

- Site-to-site VPN should be use

- HQ uses a Cisco ASA firewall.

- For the firewall in the branch office, you may use Cisco ASA firewall or Cisco router with IOS zone based firewall support. Whichever security appliance you choose, you are required to have a brief discussion about each in your report with reasoning and justification for your choice.

• You should also include some home office users' connections.

Your report should include, but not limited to, the following sections:

- An abstract summarizing your report

- A table of contents

- The objectives of the report

- Network Topology

- Research and discussion about your choice of design

- Conclusions and/or Recommendations

- Reference/bibliography

- appendices

Your Packet Tracer file should have:

- the test network topology you designed

- fully working configurations which match the contents of your report.

* You must use Packet Tracer v7.1

If you use a different way to configure your design other than Packet Tracer, you have to convert your final configurations into Packet Tracer:

- commands that do not supported by Packet Tracer should be included in the written report.

Assessment

Your report will be assessed based on:

- Neatness and professional presentation

- Show your understanding of IT security requirement, in the context of modern corporate environment

- Scope and areas covered.

- Rationales for your design, suggestions and recommendations

- How practical are your recommendations

- A general, basic or even shallow discussion will ended up with bad result

- Extensive and in-depth discussion will get you good mark.

Report submission

You need to submit your work using the link in Moodle. If you are not familiar with Turnitin, refer to the Turnitin Guide for Students in Useful Resources in Moodle. Make sure only ONEmember of your group submits the report and the working Packet Tracer file. Name you report and Packet Tracer file as follow:

{NameofStudentSubmit}_Project_Report.docx
{NameofStudentSubmit}_Packet_Tracer.pkt
Incorrect filename and format will not be marked.

Reference no: EM132377578

Questions Cloud

How does an agency achieve its mission : How does an agency achieve its mission while at the same time ensuring equitable scheduling and benefits to its employees?
What is corporate governance : What is corporate governance? How is corporate governance related to establishing an effective business strategy?
Describe a specific example of an action : Describe a specific example of an action that a lower-level employee at your workplace could perform to help the organization determine
Task of developing a business plan : Does that mean that the task of developing a business plan was a waste of time for the eventually successful companies? Explain your answer.
Implement a secure network infrastructure for a tafe nsw : GPES HQ is to be designed based on the latest integrated LAN enterprise architecture with security, high availability, redundancy and load balancing.
Analyzing a firm liquidity and profitability : Describe how the ratios are used in analyzing a firm's liquidity, solvency, and profitability. Your answer should illustrate understanding of financial.
Potential of crisis planning in situations like these : Discuss the potential of crisis planning in situations like these, even if the situations are difficult to plan for.
Differences between the direct and indirect methods : In your initial post, discuss the similarities and differences between the direct and indirect methods, and the advantages of using each method.
Evaluate the range of restructuring options for an existing : Evaluate the range of restructuring options for an existing 'bricks-and-mortar' organization move to 'bricks-and-clicks' or 'clicks-only' contributing a higher

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd