Reference no: EM132344818
Objectives:
• Understanding Security Architecture of Wirless networks .
• Configuring TMG and implement NIS and IDS.
Tasks :
• Task 1: the Student need to submit a work proposal for this assignment.
• Task 2: the Student need to prepare a report based on three published research papers discussing wireless Security Architecture. The report should also base on reflective writing with proper referencing.
• Task 3: Student need to implement some security mechanisms in the TMG for some given requirements.
Task 1:
Submit a work proposal for this assignment which must include:
• Understanding of deliverables - a detail description of deliverables
• General overview of proposed plan - initial understanding of solution to all the tasks
• Timeline for assignment works
• Resources identified
Task 2:
Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by the Internet users at home. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. The wireless network can be found in different types, for example: wireless local area network (WLAN), Wireless Metropolitan Area Networks (WMAN), Wireless Personal Area Network (WPAN), wireless sensors networks (WSN).
Referring to at least three research papers, Student is required to study a wireless network architecture and recommend a security architecture by answering the following tasks:
Task 2.A: summarize and describe any type of wireless network.
(Hint: you should include definition, uses, and structure of your selected wireless network)
Task 2.B: Analyze and describe different security concerns (threats, vulnerabilities, attacks) of your selected wireless network.
(Hint: identify and describe the threats, vulnerabilities and attacks on your selected wireless network, describe the scenario of each attack and its effect on wireless network performance. Also clarify the attacks by diagrams)
Task 2.C: Suggest security services and mechanisms to countermeasure the attacks. Provide a detailed description for each service and mechanism. Then, provide a clear diagram of your security architecture of wireless network.
(Hint: identify the security service that could detect/prevent the attack, then describe mechanisms to implement the identified services.)
Task 3:
You are the network administrator for ABC Company. The company has implemented Microsoft Forefront TMG as the firewall. The company works 5 days a week (Sunday to Thursday) from 7am to 5pm. The company has the following requirements:
1. The Company management wants to implement Network Inspection System (NIS). The goal is to enable NIS to all networks except for servers located in the range 192.168.0.10 to 192.168.0.28.. Those servers are considered administration servers, and do not require NIS traffic evaluation. TMG should check for updates every 15 minutes to obtain new signatures. The company wants to follow the default Microsoft policy when network traffic matches one of the active signatures. In case of anomalies protocols the traffic should be allowed to avoid blocking legitimate traffic.
2. The TMG intrusion detection should be able to detect Ping of death, UDP bomb, IP half scan and port scan attacks. DNS length overflow should be also detected. TMG should deny packets with the Time stamp and Loose Source Route during the IP filtering. The Company management wants to block packets containing IP fragments, but wants to give the default settings for the SIP parameters.
You are required to complete the following configuration
a. Configure network Inspection System (NIS) as following :
• Configure an exception named ‘admin server'' for the NIS
• Configure the excepted IP addresses range to be 192.168.0.10 to 192.168.0.28.
• Configure the signature update to be every 15 minutes, and trigger alert if no update installed every 5 days.
• Make the response to anomalies protocols according to the company requirements.
b. Configure an intrusion detection System (IDS):
• Enable detection for Ping of death, UDP bomb, IP half scan attacks and port scan attacks.
• Enable detection for all types of DNS attack.
• Configure Time stamp and Loose Source Route during the IP options filtering.
• Block packets containing IP fragments.
• Configured SIP parameter according to the company's requirements.
Attachment:- Network Security (COMP 30019).rar