Provide dynamic addresses to hosts on the southampton lan

Assignment Help Computer Network Security
Reference no: EM132807647

Network Security - Case Study

Alpha Finance is a medium sized company that sells a wide range of finance and insurance policies in Southern England. It has a head office in Southampton and another office at Newbury. Network security is important to them. They want to implement a new secure network infrastructure at all offices.

The initial network design consists of a router at Newbury and two switches connected to two subnets for different user groups at the Newbury office. There is a single router at the Southampton office connected to a Cisco ASA appliance. The ASA connects to a switch serving a subnet for users in the Southampton office and another DMZ subnet connected to a web server.

They have the following general requirements:
1) Basic security must be configured on switches, routers and the ASA at both offices.
2) Administrative users must only be able to access the network devices using login names and passwords authorised by a central server.
3) Time on network devices must be synchronised and events logged on a central server.
4) The networks at both sites must be secured by access control lists and firewalls.
5) A secure encrypted link must be configured between the two sites.
6) Remote users must be able to connect to the internal network at Southampton.
Your task is to implement each of these requirements.

Instructions
Your task: please look at the Cisco chapter lab exercises. You will then be able to see how Alpha Finance requirements match up to each chapter. Then work your way through the exercises to implement a solution for the case study.

They have the following general requirements:
Router and Switches:

7) They want to configure a passwords for enable access and a local user for console access. They also want to enable ssh for remote access.
8) The Southampton router will act as an NTP server for the whole network and the network devices will use this to synchronise their clock.
9) They may want to configure a Syslog server on the network so that events from network devices can be logged.
10) IT staff having access to the routers (and switches) must only be allowed access privileges appropriate to their needs.
Study chapter 2 and use the chapter 2 labs for guidance.

11) In order to ensure the security of the administrative (network management) access to all routers, switches and ASAs at Newbury they want to use local AAA authentication on the router.
12) In order to ensure the security of the administrative (network management) access to all routers, switches and ASAs at the head office in Southampton they want to use AAA authentication (and authorization and accounting) using a RADIUS server.
Study chapter 3 and use the chapter 3 labs for guidance.

13) They want to configure a firewall on the Router at Newbury.
Study chapter 4 and use the chapter 4 labs for guidance.

14) They also want to configure an IPS on the Newbury Router.
(Chapter 5)
Study chapter 5 and use the chapter 5 labs for guidance.

15) They want to enable switch security on switches at both offices to mitigate LAN attacks.
(Chapter 6)
Study chapter 6 and use the chapter 6 labs for guidance.

10) They want to configure a VPN to link Southampton to Newbury between the router at Southampton and the Router at Newbury.
They also need to test this.
(Chapter 8)
Study chapter 8 and use the chapter 8 labs for guidance.

ASA:
11) They want to configure IP addresses on the ASA at Southampton.
12) They want three security zones on the ASA: outside, inside and a DMZ with appropriate

13) They want to access the ASA from ASDM - configure https access

14) On the ASA they want to configure Telnet access for computers on the inside network and ssh access for computer on the outside network.
Study chapter 9 and use the chapter 9 labs for guidance.

15) Access Control Lists (ACLs) must be configured on the ASA at Southampton as follows:
i) The DNS server must only be accessible to hosts on the Southampton and Newbury networks and to no other networks.
ii) The web server must only be accessible to any host on the Internet on port 80 (as it is in the DMZ) only hosts and devices on the Alpha network must have access to the DNS server in Southampton.

16) They want the ASA at Southampton to provide dynamic addresses to hosts on the Southampton LAN using DHCP.

17) On the ASA they also want to configure NAT or PAT so that computers on the inside network are hidden from the outside network
Study chapter 9 and 10 and use the chapter 9 and 10 labs for guidance.

IP Addressing Scheme

The ASA appliance and router interfaces must be configured with IP addresses as follows:

Table of IP addresses:

Southampton Router (R1):
S0/0/0 10.1.1.1 /30 clockrate 2000000
G0/0 209.165.200.225 /29
G0/1 194.27.5.1 /24 (to DNS server)

Southampton ASA:
G0/0 209.165.200.116 /29 (outside)
G0/2 192.168.2.1 /24 (dmz)
G0/1 192.168.1.1 /24 (inside) (also to AAA server)

Internet router (R2):
S0/0/0 10.1.1.2 /30
S0/0/1 10.2.2.2 /30 clockrate 2000000

Newbury router (R3):
S0/0/1 10.2.2.1 /30
G0/1 172.16.3.1 /24
G0/0 192.168.3.1 /24

Reference no: EM132807647

Questions Cloud

Why the sec issued an aaer even though did not find : Edison Schools, explain why the SEC issued an AAER even though it did not find that Edison's revenue recognition practices did not contravene GAAP.
Determine the effectiveness and value of initiatives : Within this unit, you have learned the valuable role onboarding plays with new hires. Rarely will a new hire be familiar with the social and work environment
Prepare the journal entries on a january : If Cucina corps year end we're March 31 rather than December 31 prepare the adjusting journal entry would it make for this note on 2018.
How customers perceive the company offering : -Examine the first circle representing the team's consensus of what the most important customers or customer segment's needs/wants are from the product
Provide dynamic addresses to hosts on the southampton lan : Basic security must be configured on switches, routers and the ASA at both offices and Administrative users must only be able to access the network devices
Employing a hearing-impaired staff member : What would be the likely benefits for Martin & Co were they to achieve a better gender balance and how might the gender balance of the workforce
What is the break-even point in composite units : What is the break-even point in composite units? How many units of X and how many units of Y will be sold at the break-even point?
Traditional services marketing paradigm : How do more recent approaches differ from the four dominant service characteristics of the traditional services marketing paradigm?
Record the first interest payment on july for sandhu corp : Sandhu Corporation, Calculate the issue price of the bonds (round to nearest dollar). Record the issue of the bonds on January 1, 2020.

Reviews

len2807647

2/24/2021 9:13:22 PM

2) List the commands that you used to come up with a working solution for the requirements of the task. 3) For each significant line of commands enter a description of what that line is trying to achieve. (for example, if the command line reads: “interface gigabitethernet0/0/0” The corresponding description might read “# go into interface configuration mode selecting the first gigabit ethernet interface in order to configure it” – and so on…..)

len2807647

2/24/2021 9:13:09 PM

For each task you should make a note of the commands used to achieve the outcomes of each lab. For each of weekly task or topic: (there are 9 in total –you must report on at least 8): 1) Write a brief introduction that describes what the task or topic is about and what you are trying to address with it for the Alpha Finance company (Important).

Write a Review

Computer Network Security Questions & Answers

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Discuss initial steps you would take for the investigation

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Summary of articular - a notorious iranian hacking crew

Need a summary of articular - A Notorious Iranian Hacking Crew Is Targeting Industrial Control Systems by ANDY GREENBERG

  Implement the secure communication tool

ITNE2002 - Network and Information Security - Victorian Institute of Technology (VIC) - Discuss the challenges that would be encountered in key exchange

  What are meaningful punishments for cybercriminals

CSCI 561 Explain why much of the crimeware described in these business models relies on deception or preys upon fairly basic errors made by victims.

  Why not allow zero bytes of padding

Why not allow zero bytes of padding? That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

  What is happening now in terms of privacy on the web

Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements.

  Create a basic firewall using iptables packet filtering

CST8230 - how, specifically, did you enable the IP Forwarding feature so that it persists AND is activated it right away - Correct network setup is required

  Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Review some of the recent vulnerability announcements

Review some of the recent vulnerability announcements from CERT, SANS, or similar organizations. Classify the type of buffer overflow used in each.

  Prepare a report on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2017. Topic: Deep dive into the Edmodo data breach

  Secure the incident scene

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd