Implementation and the configuration of the vpn solution

Assignment Help Computer Network Security
Reference no: EM133727147

Design and Implement a security perimeter for ICT Networks

Activity

Task 1: Deployment of the Perimeter security

This activity is a continuation from the previous assessment task.
After the detailed elaboration of the requirements for the network security perimeter and completion of the planning phase by completing the Report, you need to deploy the perimeter security. For this it has been decided by the IT department that they will implement the Firewall for the better security of the organization's network infrastructure. The Report in the previous task defines its importance. The Assessor/trainer will act as the Information Systems Manager and will supervise the deployment of the perimeter security. While you need to implement the firewall as per the requirements of the organization.
Implement the Perimeter security solution as per the given points:
• Implement the Firewall as the perimeter device and make all the configurations as per the requirements of the design
• Configure the DMZ interface
• Configure a general firewall for LAN traffic
• Configure a general firewall for DMZ traffic
• Allow selected traffic to the DMZ
• For the setup of the organization and as per the scenario it is recommended to implement 3-legged Firewall
• Configure both the basic and advanced functionality of the firewall to the network to allow access including the following standard services considerations in prospect:
• HTTP (Web surfing)
• HTTPS (secure HTTP)
• FTP (file transfers)
• SMTP (e-mail)
• ICMP (reporting services; ping)
• Telnet (bi-directional communication sessions)
• Configure the backup of the firewall so that it can be restored in case of disaster.
• The firewall needs to be designed and configured that it ensures the continuity of services in both the following events:
• Update of Device
• Device Failure

Task 2: Configuration of VPN Solution

TASK 1: Continuation to the previous tasks, you need to implement and configure a VPN solution for the organization's network infrastructure. The VPN solution will help to secure the connectivity of the HBL Bank's head office to the regional offices. The assessor/trainer will supervise the implementation and the configuration of the VPN solution. You will act as the Network administrator and will implement the VPN solution:
Implement the Virtual Private Network solution as per the given points:
• Configure a site-to-site Virtual Private Network for the network infrastructure.
• Configure the perimeter as a remote access VPN server according to the scenario and the network diagram of the bank.
• Also, configure the VPN tunnel forwarding.
• Check the configured VPN for connectivity issues, diagnose the issues and resolve these connectivity issues.

Reference no: EM133727147

Questions Cloud

What is the patient experiencing and what can be done : A patient was diagnosed with Parkinson's disease 7 years ago and has been taking Sinemet ever since. What is the patient experiencing, and what can be done?
How might you tactfully but persuasively educate operator : Foodborne illness is all too common is today's society. How might you tactfully but persuasively educate the operator?
Describe the clinics practices and policies that govern : Describe the clinic's practices and policies that govern their use of screening. Include any available information on screening sensitivity and specificity.
How increase in creativity and productivity could encourage : In this Discussion, you imagine how an increase in creativity and productivity could encourage problem solving.
Implementation and the configuration of the vpn solution : ICTNWK544 Design and Implement a security perimeter for ICT Networks - Implementation and the configuration of the VPN solution. You will act as the Network
Explain importance of understanding your ethical perspective : Explain the importance of understanding your personal ethical perspective. Analyze the relationship between personal and professional ethics in psychology.
Safety cannot rely on piecemeal set of activities : Safety cannot rely on a piecemeal set of activities. Improving safety requires a system culture and mindset
Daily practice and challenged the overall safety for workers : AI rewrite COVID-19 highlighted the critical inclusion of the QSEN competencies in daily practice and challenged the overall safety for workers and patients.
Discuss concepts and theories from economics literature : What are some advantages and disadvantages of multinational enterprises? Discuss the concepts, principles, and theories from economics literature.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What major economic considerations in information security

What are the major economic considerations in information security and management and Are these economic considerations serving their purposes?

  Implementation of various systems moving forward

Explain how the impact of HIPPA and HITECH regulations will impact the implementation of various systems moving forward. Consider impacts to and from federal, local, software vendors/users, hardware vendors/users, infrastructure, and organizationa..

  Describe vulnerability management

Describe vulnerability management and the importance of quality control, patch management, and change control. How should vulnerabilities, using preventative

  Why is an e-mail and internet use policy needed

Why is an e-mail and Internet use policy needed? What are the benefits of developing an incident response capability?

  Banks adopt military-style tactics to fight cybercrime

Read Banks Adopt Military-Style Tactics to Fight Cybercrime from the NY Times.

  Building a security assurance program

Discuss the journey where the case studies (using roadmap templates as a guide) told the story of how an organization might adapt best practices

  About inf 620

How well did the systems approach work for the initial stages of the Primis system?What could the team have done differently in the preliminary stages? How might this have affected the endresult?

  Risks and issues associated with backing up data to cloud

Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud

  What are the characteristics of people in india

What are the characteristics of people in India who commit white collar crime (e.g: age, occupation or profession, lifestyle). Find a case of white collar crime that occurred in India and discuss the circumstances of the case: Who committed it?

  Discuss two types of threats against network routers

SBM4304 IS Security and Risk Management Assignment - Applied Project, Asia Pacific International College, Sydney, Australia

  Describing a potential computer security problem

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides).

  Types of information security governance documents

Define the three types of information security governance documents, then pick two security policies and explain what should be contained in such policies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd