Provide dynamic addresses to hosts on the southampton lan

Assignment Help Computer Network Security
Reference no: EM132807647

Network Security - Case Study

Alpha Finance is a medium sized company that sells a wide range of finance and insurance policies in Southern England. It has a head office in Southampton and another office at Newbury. Network security is important to them. They want to implement a new secure network infrastructure at all offices.

The initial network design consists of a router at Newbury and two switches connected to two subnets for different user groups at the Newbury office. There is a single router at the Southampton office connected to a Cisco ASA appliance. The ASA connects to a switch serving a subnet for users in the Southampton office and another DMZ subnet connected to a web server.

They have the following general requirements:
1) Basic security must be configured on switches, routers and the ASA at both offices.
2) Administrative users must only be able to access the network devices using login names and passwords authorised by a central server.
3) Time on network devices must be synchronised and events logged on a central server.
4) The networks at both sites must be secured by access control lists and firewalls.
5) A secure encrypted link must be configured between the two sites.
6) Remote users must be able to connect to the internal network at Southampton.
Your task is to implement each of these requirements.

Instructions
Your task: please look at the Cisco chapter lab exercises. You will then be able to see how Alpha Finance requirements match up to each chapter. Then work your way through the exercises to implement a solution for the case study.

They have the following general requirements:
Router and Switches:

7) They want to configure a passwords for enable access and a local user for console access. They also want to enable ssh for remote access.
8) The Southampton router will act as an NTP server for the whole network and the network devices will use this to synchronise their clock.
9) They may want to configure a Syslog server on the network so that events from network devices can be logged.
10) IT staff having access to the routers (and switches) must only be allowed access privileges appropriate to their needs.
Study chapter 2 and use the chapter 2 labs for guidance.

11) In order to ensure the security of the administrative (network management) access to all routers, switches and ASAs at Newbury they want to use local AAA authentication on the router.
12) In order to ensure the security of the administrative (network management) access to all routers, switches and ASAs at the head office in Southampton they want to use AAA authentication (and authorization and accounting) using a RADIUS server.
Study chapter 3 and use the chapter 3 labs for guidance.

13) They want to configure a firewall on the Router at Newbury.
Study chapter 4 and use the chapter 4 labs for guidance.

14) They also want to configure an IPS on the Newbury Router.
(Chapter 5)
Study chapter 5 and use the chapter 5 labs for guidance.

15) They want to enable switch security on switches at both offices to mitigate LAN attacks.
(Chapter 6)
Study chapter 6 and use the chapter 6 labs for guidance.

10) They want to configure a VPN to link Southampton to Newbury between the router at Southampton and the Router at Newbury.
They also need to test this.
(Chapter 8)
Study chapter 8 and use the chapter 8 labs for guidance.

ASA:
11) They want to configure IP addresses on the ASA at Southampton.
12) They want three security zones on the ASA: outside, inside and a DMZ with appropriate

13) They want to access the ASA from ASDM - configure https access

14) On the ASA they want to configure Telnet access for computers on the inside network and ssh access for computer on the outside network.
Study chapter 9 and use the chapter 9 labs for guidance.

15) Access Control Lists (ACLs) must be configured on the ASA at Southampton as follows:
i) The DNS server must only be accessible to hosts on the Southampton and Newbury networks and to no other networks.
ii) The web server must only be accessible to any host on the Internet on port 80 (as it is in the DMZ) only hosts and devices on the Alpha network must have access to the DNS server in Southampton.

16) They want the ASA at Southampton to provide dynamic addresses to hosts on the Southampton LAN using DHCP.

17) On the ASA they also want to configure NAT or PAT so that computers on the inside network are hidden from the outside network
Study chapter 9 and 10 and use the chapter 9 and 10 labs for guidance.

IP Addressing Scheme

The ASA appliance and router interfaces must be configured with IP addresses as follows:

Table of IP addresses:

Southampton Router (R1):
S0/0/0 10.1.1.1 /30 clockrate 2000000
G0/0 209.165.200.225 /29
G0/1 194.27.5.1 /24 (to DNS server)

Southampton ASA:
G0/0 209.165.200.116 /29 (outside)
G0/2 192.168.2.1 /24 (dmz)
G0/1 192.168.1.1 /24 (inside) (also to AAA server)

Internet router (R2):
S0/0/0 10.1.1.2 /30
S0/0/1 10.2.2.2 /30 clockrate 2000000

Newbury router (R3):
S0/0/1 10.2.2.1 /30
G0/1 172.16.3.1 /24
G0/0 192.168.3.1 /24

Reference no: EM132807647

Questions Cloud

Why the sec issued an aaer even though did not find : Edison Schools, explain why the SEC issued an AAER even though it did not find that Edison's revenue recognition practices did not contravene GAAP.
Determine the effectiveness and value of initiatives : Within this unit, you have learned the valuable role onboarding plays with new hires. Rarely will a new hire be familiar with the social and work environment
Prepare the journal entries on a january : If Cucina corps year end we're March 31 rather than December 31 prepare the adjusting journal entry would it make for this note on 2018.
How customers perceive the company offering : -Examine the first circle representing the team's consensus of what the most important customers or customer segment's needs/wants are from the product
Provide dynamic addresses to hosts on the southampton lan : Basic security must be configured on switches, routers and the ASA at both offices and Administrative users must only be able to access the network devices
Employing a hearing-impaired staff member : What would be the likely benefits for Martin & Co were they to achieve a better gender balance and how might the gender balance of the workforce
What is the break-even point in composite units : What is the break-even point in composite units? How many units of X and how many units of Y will be sold at the break-even point?
Traditional services marketing paradigm : How do more recent approaches differ from the four dominant service characteristics of the traditional services marketing paradigm?
Record the first interest payment on july for sandhu corp : Sandhu Corporation, Calculate the issue price of the bonds (round to nearest dollar). Record the issue of the bonds on January 1, 2020.

Reviews

len2807647

2/24/2021 9:13:22 PM

2) List the commands that you used to come up with a working solution for the requirements of the task. 3) For each significant line of commands enter a description of what that line is trying to achieve. (for example, if the command line reads: “interface gigabitethernet0/0/0” The corresponding description might read “# go into interface configuration mode selecting the first gigabit ethernet interface in order to configure it” – and so on…..)

len2807647

2/24/2021 9:13:09 PM

For each task you should make a note of the commands used to achieve the outcomes of each lab. For each of weekly task or topic: (there are 9 in total –you must report on at least 8): 1) Write a brief introduction that describes what the task or topic is about and what you are trying to address with it for the Alpha Finance company (Important).

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd