Write a report and include your practical lab activity

Assignment Help Computer Networking
Reference no: EM132354187

PRACTICAL ACTIVITY

These instructions must be followed when assessing the student in this unit. The checklist on the following page is to be completed for each student. Please refer to separate mapping document for specific details relating to the alignment of this task to the unit requirements.
This competency is to be assessed using standard and authorized work practices, safety requirements and environmental constraints. Assessment of essential underpinning knowledge will usually be conducted in an off-site context. Assessment is to comply with relevant regulatory or Australian standards' requirements.

Resource implications for assessment include:
• an induction procedure and requirement
• realistic tasks or simulated tasks covering the mandatory task requirements
• relevant specifications and work instructions
• tools and equipment appropriate for applying safe work practices
• support materials appropriate to the activity
• workplace instructions relating to safe work practices and addressing hazards and emergencies
• material safety data sheets
• research resources, including industry-related systems information.

Reasonable adjustments for people with disabilities must be made to assessment processes where required. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.
This assessment task requires the student to:
• Configure security in the routers
• Implement authentication, authorisation and accounting
• Configure IP ACL to mitigate threats and to Ip address spoofing
• Secure management of router by implementing SSH
• Configuring routers to send log messages to a log server
• Configuring the switch to mitigate layer 2 attacks.
• Implementation of zone-based firewall
• Configuration of IDPS
• Configuration of IPSec site to site VPN with PSK authentication

This project should be completed with reference to a simulated ICT/Business environment. For the practice environment, noise levels, production flow, interruptions and time variances must be typical of those experienced in the ICT project management field of work and include access to:
• relevant computer software packages
• suitable hardware
• codes, standards and legislation relevant to the jurisdiction and the project
• project documentation
• research resources, including product information and data, theoretical texts and other information.

Please refer to the assessment document for the specifications. Note that this is an individual task.
Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society Code of Ethics.

Develop Specifications and Terms of Reference for the project that includes:
Within your practice environment, complete each of the following parts (Note: Parts of this assessment task, such as project execution, will be simulated in your practice environment):

Practical Activity
Australian Institute of Business and Technology College provides opportunity to students to acquire a technical education and offers variety of courses. The AIBT network is used by all the staff and students. Recently there has been a breach of data and has raised serious issues. AIBT now has got very serious and want to implement the extensive security system. AIBT has two sites currently in Sydney one in Ultimo and one in Blacktown. You have been asked to secure all the network devices.

Objectives:
You are to write a report and include your practical lab activity outcomes in your report as evidence of achievement of objectives.

Your trainer will provide you the configuration related information and network diagrams.
1. Evaluate network security system threats and requirements
2. Propose a methodical concept of defending the network architecture
3. Get client sign off
4. Implement the system
a. Secure the routers
b. Implement AAA
c. Implement ACL (Access Control List) mitigate threats
d. Configure SSH
e. Send log messages to the log server; configure syslog.
f. Mitigate common layer 2 attacks
g. Implement Zone based firewall
h. Implement Intrusion detection and Prevention in the routers
i. Implement site to site VPN between two sites

Throughout the assessment task, ensure that you refer to and apply the Australian Computer Society Code of Ethics.

Note to the Trainer: Please use the sample solution to provide configuration information and network diagrams to the students during lab activities.

Reference no: EM132354187

Questions Cloud

Is free cash flow a significant problem for many firms : Your firm is considering the purchase of a smaller firm because it believes that it can manage the assets of that firm more efficiently. The smaller firm has.
Metrics incorporated in the strategic management initiative : Would you consider using this strategic management technique? Why or why not? How were metrics incorporated in the strategic management initiative?
Evaluate trends or recent approaches in compensation : Evaluate at least three trends or recent approaches in compensation that SEIIC should consider in its redesign effort, including the pros and cons of each.
What are two key roles of laws in our society : What are two key roles of laws in our society? Explain four primary legal sources of laws-constitutions, statutes, administrative regulations, and common laws.
Write a report and include your practical lab activity : Write a report and include your practical lab activity outcomes in your report as evidence of achievement of objectives
Discuss fraud and abuse in medicare billing : Discuss Fraud and Abuse in Medicare billing. What policies and procedures to you think should be implemented to make sure healthcare providers remain.
What is the advantage of adding a preferred vendor : When entering a purchase order from this vendor, all inventory items using this vendor as the Preferred Vendor are available to populate the purchase order.
Describe how technological changes have affected : Select one mode of transportation and describe how technological changes have affected that mode throughout its history.
How the problem with rising cost can be controlled : Research Medicare and discuss factors which are attributing to rising cost. Provide solutions to how the problem with rising cost can be controlled?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd