Explain network diagram infrastructure consisting of firewal

Assignment Help Computer Networking
Reference no: EM13882332

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server.

Write a four to five (4-5) page paper in which you:

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)

Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)

IP address assigned to all devices

Establish the configuration for each device in which you:

Research each of the devices you chose and provide a basic configuration you would use in your network.

Use IP addresses to describe your configuration.

Explain the impact that each of your configurations has on the security of the entire network.

Highlight at least five (5) security features for each device, including devices in network diagram.

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing

network and ensures the following:

VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.

All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.

Users from Engineering and Finance and Accounting CANNOT communicate.

Vulnerability scans occur daily in which all desktops are scanned at least once per day.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must

follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the

Word document before the paper is submitted.

Reference no: EM13882332

Questions Cloud

Write an essay on a current social issue : Write an essay on a current social issue of your choice such as: homelessness, gang violence, the feminism of poverty, the culture of poverty, teen pregnancy, abortion, etc
What is wrong with using conventional estimated se formula : Does autocorrelation have the same effect on the sampling distribution of the percentage of made free throws if µ=0.8? Describe your procedure in answering this question.
Modelling integration of maternal newborn child health : Modelling integration of Maternal Newborn Child Health (MNCH) commodity logistics and supply chain management on outcomes of MNCH services in Nigeria. using either a Simpy or python simulation method
Record the exchange for both robers and phifer : Record the exchange for both Robers and Phifer. The exchange has commercial substance for bothcompanies.
Explain network diagram infrastructure consisting of firewal : Explain network diagram infrastructure consisting of firewalls
Write down the y-bus of the system : Write down the Y-bus of the system and build this power system in PowerWorld Simulator and For the power system, find the VAR rating of a shunt capacitor bank at bus 2 that increases V2 to 0.95 p.u.
Explain how this formula is inducing autocorrelation : What effect does increasing autocorrelation have on the sampling distribution of the percentage of made free throws? Describe your procedure in answering this question.
Solve the decision tree with expected values : You know that consumer confidence will be high with a 90% probability. Solve the decision tree with expected values. What investment opportunity do you choose?
Manufacturing company began construction of a building : The building was completed on September 30, 2014.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  If the same number six of springs are used but uniform

a shaft rotating at 1440 rpm drives a coaxial shaft through a twin-plate disc clutch - i.e. there are 4 frictional

  Describe the operation of transport layer security

Presentation of the Report Power Point Voice Over - describe the operation of Transport Layer Security (TLS), VPNs and IPSec. With the possible options describe the benefits and limitations of the solutions and provide a recommendation for which se..

  Assignment on social media and networking presentation

Social Media and Networking Presentation, Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to encourage the collaboration of students, and improve their overall sense ..

  Discuss the role of these functional areas in a snmp

Fundamental to network management is the ability to gather information about the status and behavior of the networked configuration, which is the function of network monitoring. Discuss the role of these functional areas in a SNMP

  Ip subnet design project-technical design of network service

technical design of network services - You are a consultant being brought in by XUMUC to assist with its merger with another company

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  Formulate the ip to maximize profits

A set up cost of $10 is incurred, and if any of product 2 is produced, a setup cost of $20 is incurred. Formulate an IP to maximize profits.

  Question 1terrorism is the use of aggression fear and

question 1terrorism is the use of aggression fear and threats for political ideological or social purposes. cyber

  Choose an appropriate ephemeral port number

Show the entries for the header of a UDP user datagram that carries a message from a TFTP client to a TFTP server. Fill the check sum with 0s.

  Analyze and identify the fundamentals of pki

Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length

  What information in packet does switch use to find link

When one of these packets arrives to packet switch, what information in packet does switch use to determine link onto which packet is forwarded?

  Computer memory hacking and hacking of ram

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd