Describe the network design in terms of topology

Assignment Help Computer Networking
Reference no: EM131142238

You have been hired by a new medical clinic to configure and maintain a secure network. The clinic will be in a single building with 30 rooms and will host its own web server, email server, and DNS server. The clinic will have 120 computers running Windows 7, 8, and 10 client OS's and 2 Active Directory Domain controllers running Windows Server 2012 OS's in a Windows Active Directory security network that will have wired and wireless access. The clinic will have Internet access by a local cable ISP. All network equipment will be Cisco ( routers, switches, wireless access points and firewalls). You will do all security analysis and proposals without regard to costs. Your recommendations are always to achieve the highest security possible and protect the company's data. The clinic desires remote access to network data for administrators and secure web access for customers to the web site. The clinic wishes to control the employee's access and use of the Internet.

Write detailed responses to the following:

Describe in detail the following you will recommend:

  1. The network design in terms of topology and network devices to be used and location.
  2. The security configuration of all network devices (including ACL's and services running on devices)
  3. The IP addressing recommendations and explain the security reasons why recommended
  4. The cryptographic protocols and types
  5. DNS configurations
  6. Describe the type of attacks that may occur and how to prevent/minimize each
  7. Describe the different risk types and analysis expected
  8. Security policy to be developed and maintained

Reference no: EM131142238

Questions Cloud

What are the five characteristics of a good tax system : What are the five characteristics of a good tax system?
Which is a lamassu not have and which not a mesopotamian god : Which of the following does a Lamassu not have? Which of the following is not a Mesopotamian god? The beards of the Tell Asmar statues are best described as.
What are the five characteristics of a good tax system : How well does the U.S. tax system fare in terms of these criteria? What is the difference between horizontal equity and vertical equity? What is the difference between a progressive and a regressive tax?
Would you expect such information to increase productivity : Telephone operators are sometimes monitored according to how many calls they take, and how long they spend on an average call. Would you expect such information to increase productivity? Why or why not?
Describe the network design in terms of topology : Describe the network design in terms of topology and network devices to be used and location - The security configuration of all network devices
Why might a profit-maximizing firm offer such a large raise : Why does this seem puzzling, from the perspective of the theory of competitive markets? Why might a profit-maximizing firm offer such a large raise?
Which was not a famous woman in ancient greece : Which of the following was not a famous woman in ancient Greece? Which of the following is not a Greek god or goddess? What subject was portrayed on the frieze around the Parthenon?
How does continued fdis benefit nigeria : What are the benefits of establishing MNE operations in the country? Reflecting on Nigeria's political and economic reforms, Why are these reforms important their future economic success?
What is the estimated effective green time : The lost time is known to be 4 seconds for each phase. If the cycle length is 60 seconds, what is the estimated effective green time of the fourth phase?

Reviews

Write a Review

Computer Networking Questions & Answers

  Wlan performance

WLAN Performance

  Write steps for computer in company browse site using url

Personel.mycompany.com in URL address box to browse this Web site. Write down steps do you take so that each computer in company can browse the site using URL?

  Finding the appropriate multicast for protocols

Finding the appropriate Multicast for these protocols (TCP, UDP, SCTP), Multicasts Comparing and Analysis for these protocols (TCP, UDP, SCTP)

  Discuss each of the components of a lan

Discuss each of the components of a LAN as described in the textbook and in your research. What are the current standards for each of these components?

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Design the network for the public network

Your task is to design the network for the public network and select how to connect the two networks together.

  Current network diagram infrastructure

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

  Makes built-in kitchen ovens

The whirlpool factory in Oxford, Mississippi, makes built-in kitchen ovens.3 In the 1990s, this plant re-engineered its processes to become JIT/lean. One of the parts of a particular oven, Part A, is processed by two 600 ton presses (in series), and ..

  How to submit the assignment lsjdkljflkjs ksdkfksdfksdkjfkj

lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk kdjfk jsdkfj kdjfkjsdkfjksdjkfjkdsjf k sd lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk

  Innovation governance related to corporate governance

How is Innovation Governance related to Corporate Governance?

  Define a peer-to-peer system

Is it a reasonable countermeasure to put a volume limit on amount of data exported under a peer-to-peer system. Why do you feel this way

  Examine the risks and vulnerabilities

Examine the risks and vulnerabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd