Explain network diagram infrastructure consisting of firewal

Assignment Help Computer Networking
Reference no: EM13882332

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server.

Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server.

Write a four to five (4-5) page paper in which you:

Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each:

Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)

Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)

IP address assigned to all devices

Establish the configuration for each device in which you:

Research each of the devices you chose and provide a basic configuration you would use in your network.

Use IP addresses to describe your configuration.

Explain the impact that each of your configurations has on the security of the entire network.

Highlight at least five (5) security features for each device, including devices in network diagram.

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing

network and ensures the following:

VPN sessions (from laptop) are only allowed to access the desktops in the IT department by IT department employees.

All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.

Users from Engineering and Finance and Accounting CANNOT communicate.

Vulnerability scans occur daily in which all desktops are scanned at least once per day.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must

follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the

Word document before the paper is submitted.

Reference no: EM13882332

Questions Cloud

Write an essay on a current social issue : Write an essay on a current social issue of your choice such as: homelessness, gang violence, the feminism of poverty, the culture of poverty, teen pregnancy, abortion, etc
What is wrong with using conventional estimated se formula : Does autocorrelation have the same effect on the sampling distribution of the percentage of made free throws if µ=0.8? Describe your procedure in answering this question.
Modelling integration of maternal newborn child health : Modelling integration of Maternal Newborn Child Health (MNCH) commodity logistics and supply chain management on outcomes of MNCH services in Nigeria. using either a Simpy or python simulation method
Record the exchange for both robers and phifer : Record the exchange for both Robers and Phifer. The exchange has commercial substance for bothcompanies.
Explain network diagram infrastructure consisting of firewal : Explain network diagram infrastructure consisting of firewalls
Write down the y-bus of the system : Write down the Y-bus of the system and build this power system in PowerWorld Simulator and For the power system, find the VAR rating of a shunt capacitor bank at bus 2 that increases V2 to 0.95 p.u.
Explain how this formula is inducing autocorrelation : What effect does increasing autocorrelation have on the sampling distribution of the percentage of made free throws? Describe your procedure in answering this question.
Solve the decision tree with expected values : You know that consumer confidence will be high with a 90% probability. Solve the decision tree with expected values. What investment opportunity do you choose?
Manufacturing company began construction of a building : The building was completed on September 30, 2014.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain benefits of providing synchronization tool

Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

  Wan acceleration protocol-internet protocol

The maximum size of the Layer 2 frame has become a source of inefficiency in terms of modern wide area network (WAN) speeds, which have increased some 400 times over those prevailing when Transmission Control Protocol/Internet Protocol (TCP/IP) wa..

  Design own message format and provide ids

You have to create your own message format and provide IDs in any way you want. At minimum message should have source address, destination address, TTL and address of sending node etc.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Implement tftp using the user datagram protocol

File system module design: This component is responsible for accessing the le systems of the sender and the receiver. The sender and the receiver have to read and write corresponding les, respectively. These operations are part of the actions in t..

  Wireless and wired connections and a broadband connection

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection.

  Prepare a technical detailed-oriented report for tag that

the wireless technology company wtc a company that assists organizations and businesses with issues involving network

  What is the server ip address

What is the server IP address, what is the application layer protocol involved and what is the client port number for data download - What is its transmission distance from radio to radio?

  What is voip and how is it different from pots

Voice over the Internet Protocol (VoIP). What is VoIP and how is it different from the Plain Old Telephone Service (POTS)? What are some issues an organization (not individuals) should analyze when evaluating the move from a traditional phone sy..

  Shopping cart use similar or different protocols

Go to a prminent online electronic commerce site like Amazon.com. Choose several items for shopping cart. Go to check out.

  Network security policy plan-administrator

As the new network administrator, one of your first responsibilities is to draft a network security policy plan that employees must sign and follow when using the company's network.Research and discuss the items that you would place in such a plan..

  What allows the ip layer to determine where to send a packet

what allows the IP layer to determine where to send a packet next? What settings are used to make that decision?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd