Practical network security setup

Assignment Help Computer Network Security
Reference no: EM132850614

COMP2003 Securing Networks - Southern Cross University

Assignment - Practical network security setup

Task Description

In this assignment, you will perform necessary setup to install, configure and troubleshoot an SME network.

You must successfully implement the network on Packet Tracer (or similar) network simulation software and perform important steps to manage the network security configuration.

In particular, you will complete the following tasks:
• Task 1: Install and connect the devices into a network as shown in the diagram.
• Task 2: Set up and test the security
• Task 3: Network testing and troubleshooting
• Task 4: Network documentation

Scenario

You are a junior network administrator and because of your ongoing experience your manager has assigned you a new client to assist them setup their new network.
The design and requirements have been provided to you in a simple diagram and instruction set.
You have been advised of the following criteria:
1. Routers and default gateways are always set to the last IP address in the range.
2. Switches will always get the second last IP address in the range.
3. End devices (servers and workstations etc.) will get an IP address starting at the 50th usable host address.
4. Servers will have their MAC address stored on the switch. The following networks will be set up:
• DMZ - Used for placing internet facing devices to be able to be reached from the internet as well as the internal corporate network.
• Data Network (DataNet) - used for storing the internal company data that only the internal corporate users are able to access.
• Sydney Network (SydNet) - used by the normal users of the company in the head office that are able to access the internet, the internal servers network and the DMZ. There are multiple departments in the head office, and each should not be able to communicate with computers in other departments.
• Melbourne Network (MelbNet) - is for a remote office that are able to access the DMZ, the DataNet and the internet.

Your task is to configure the network in simulation software so that it can be tested before it is implemented.
You must devise any security options you deem appropriate to meet the requirements and configure and document them so they can be used when the network is implemented.

2428_Securing Network.png

The following are the major assessment criteria of this assignment.

Task 1: Network environment setup
• Set up the routers, switches and PC's with the appropriate connections
• Perform basic configuration of the devices
• Test connectivity
• Save the configurations to the devices

Task 2: Security setup and performance

• Add the required security including any of the following:
o Switch port security
o VLAN's
o ACL's (most likely basic ACL's)
o static or dynamic routing
o Save the configurations to the devices

Task 3: Network testing and troubleshooting

• Correctly propose the hypothesis to be tested at each step e.g. connectivity between devices, security is working to stop X from occurring.
• Correctly identify the type of information that should be collected at each step
• Test the configuration using correct methodology
You must document what tests you will carry out, what the test is for and the result.
Consider using a table.

Task 4: Network Documentation

You must document your configurations for the devices you set up.
• Document the devices including:
o Host Devices (PC's and servers)
» Name/ID
» Link technology e.g. Ethernet
» Port Address e.g. Eth0

» Physical address e.g. MAC address
» IP Address
» Subnet Mask
» Default Gateway
» DNS
o Network Devices
» Interface configuration
• Name/ID
• Link technology e.g. Ethernet
• Port address e.g. G0/0/1
• Physical address e.g. MAC address
• Logical address e.g. IP Address / subnet mask
• Security applied
» Security Configuration
• Switch port security
• VLANs
• ACLs
• Routes
o Save the configurations to the devices
o Export the configurations (or copy/paste to a text file).

Attachment:- Practical network security setup.rar

Reference no: EM132850614

Questions Cloud

Determine the amount of cash receipts per book in April : Outstanding checks on April 30 totaled P750,000 and deposits in transit amounted to P1,500,000. Determine the amount of cash receipts per book in April 30
What is the probability that two randomly selected returns : What is the probability that two randomly selected returns with income of $1 00.000 or more will be audited? The probability is D. (Round to six decimal places
What is the adjusted balance of branch current account : Home office acquires branch furniture for P41,000 cash. The said fixed asset is carried on Branch Books. What is the adjusted balance of Branch Current account
Compare female and male inmates by criminal histories : Compare female and male inmates by their criminal histories, their family characteristics, and the offenses for which they are incarcerated.
Practical network security setup : Practical network security setup - Install and connect the devices into a network as shown in the diagram and Routers and default gateways
Confidence interval for the population mean concentration : Find a 95% confidence interval for the population mean concentration of uric acid in this patient's blood. What is the margin of error?
Cyberbullying case : Consider the cyberbullying case that resulted in the death of 13 year old Megan Meier.
What is the total credit Sales of Moksha International : Moksha International has a total sale of Rs.100 lacs, of which 75% is on credit. What is the total credit Sales of Moksha International
Test the claim that the population proportion : Test the claim that the population proportion of successes does not equal 0.50. Use a level of significance of 0.05.

Reviews

Write a Review

Computer Network Security Questions & Answers

  New product development and product enhancement teams

As the new technical communications manager for International Gadgets (IG), you have developed a good idea of the various internal and external audiences for communications across the enterprise.

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Discuss the network id and the host id of that address

You need to find the class of the IP address, the subnet mask, the network ID and the host ID of that address.

  Describe the security methods and controls that need

Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

  Speculate on the implications of improperly documenting

Speculate on the implications of improperly / incompletely documenting the solutions to the network issue provided in Part 1 of the discussion.

  Explain how you would integrate security requirements

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system

  Develop practices that will used to ensure business enforces

Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards.

  Prepare a technical paper about network security

Prepare a Technical Paper about Network Security for a Small Accounting Firm. The firm realizes that it needs help to secure its network and customers' data. With your background and skills, the firm is looking to you to provide guidance.

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result.

  Identify best practices to secure your network

Accurately describe the uses of ACLs, NAT, and PAT. Identify best practices to secure your network. Provide at least three best practices.

  Develop an architectural internetworking design

MN503 - Overview of Internetworking - Explain human factors in achieving business and technical goals through planning and design

  Information security

A computer forensics investigator needs to develop an understanding about security standards and formal procedures within an organisation. This module will provide knowledge in addressing issues around security in the organisational environment. T..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd