Create a final network diagram

Assignment Help Computer Networking
Reference no: EM13754968

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Write a four to five (4-5) page paper in which you:

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)
Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)
IP address assigned to all devices

Establish the configuration for each device in which you:

Research each of the devices you chose and provide a basic configuration you would use in your network.
Use IP addresses to describe your configuration.
Explain the impact that each of your configurations has on the security of the entire network.
Highlight at least five (5) security features for each device, including devices in network diagram.

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following:

VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.
All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
Users from Engineering and Finance and Accounting CANNOT communicate.
Vulnerability scans occur daily in which all desktops are scanned at least once per day.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

1170_network diagram.png

Reference no: EM13754968

Questions Cloud

How an organization can determine the effectiveness : Discuss the job functions that are needed to support the intended information system used by the organization. Include a description about how an organization can determine the effectiveness of an information system
Management accounting and control system : Behavioral considerations of a well-designed management accounting and control system include all of the following except:
Create a table that shows how the access quality and cost : Create a table that shows how the access, quality, and cost of health care are influenced by the low-income, middle-income, and high-income status of an economy
What unique borders did the united states gain : What unique borders did the united states gain when it acquired this territory back in 1776?
Create a final network diagram : Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following: VPN sessions (from laptop) are only allowed to access the desktops in the IT d..
Confidence interval for a population proportion : When a confidence interval for a population proportion is constructed for a sample size n = 100 and the value of, p =.p = .4 the interval is based on the
What were muhammads revelations : What were Muhammad's revelations?
What was the strategy of the aclu : What was the strategy of the ACLU even though the had a hunch that Scopes would probably lose the trial?
Explain characteristics of ideal ruler in ancient south asia : Citing specific evidence from the Ramayana (not from the textbook), explain some of the characteristics of the ideal ruler in ancient South Asian society.

Reviews

Write a Review

Computer Networking Questions & Answers

  Social effect of online social networks

What is the social effect of online social networks? 200 words Describe an experience in facebook. at least 100 words.

  Design switched network to compliment routed network

Design a switched network to compliment your routed network. Each department will require five switches that will plug into the router cards.

  Determine distinct canonical names required-ip multicasting

Let N users participating in the audio/video conference by using IP multicasting. Each user is equipped with the microphone, camera, and speakers. How many distinct canonical names are required?

  Osi model

In the meantime, CEO of the first company transmits e-mail to CEO of second company in order to provide a couple suggestions related to the joint venture. Explain whether this scenario follow OSI model? Describe it in detail.

  Which physical topology type connects all end nodes to a

a avoids the potential inefficiencies of csmacd because no transmission capacity if wasted on collisions and

  What is the difference between capturing traffic for

answer the following questions in a two to three page word document using good apa formatting.1 four capabilities are

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Tcpipproblem 1bullexplain what is the biggest problem in

tcpipproblem 1.bullexplain what is the biggest problem in routing security and you may not all agree on which problem

  Determine five companies that provide p2p file-sharing

Find five companies that provide P2P file-sharing services. For each company, what kind of files (that is, content) do they handle

  Explain effect of tcp flow control

Host A can send application data into link at 100Mbps but Host B can read out of its TCP receive buffer at maximum rate of 50Mbps. Explain the effect of TCP flow control.

  A security policy is a statement that partitions the states

a security policy is a statement that partitions the states of the system into a set of authorized or secure states and

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to comapny users.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd