Practical network security setup

Assignment Help Computer Network Security
Reference no: EM132850614

COMP2003 Securing Networks - Southern Cross University

Assignment - Practical network security setup

Task Description

In this assignment, you will perform necessary setup to install, configure and troubleshoot an SME network.

You must successfully implement the network on Packet Tracer (or similar) network simulation software and perform important steps to manage the network security configuration.

In particular, you will complete the following tasks:
• Task 1: Install and connect the devices into a network as shown in the diagram.
• Task 2: Set up and test the security
• Task 3: Network testing and troubleshooting
• Task 4: Network documentation

Scenario

You are a junior network administrator and because of your ongoing experience your manager has assigned you a new client to assist them setup their new network.
The design and requirements have been provided to you in a simple diagram and instruction set.
You have been advised of the following criteria:
1. Routers and default gateways are always set to the last IP address in the range.
2. Switches will always get the second last IP address in the range.
3. End devices (servers and workstations etc.) will get an IP address starting at the 50th usable host address.
4. Servers will have their MAC address stored on the switch. The following networks will be set up:
• DMZ - Used for placing internet facing devices to be able to be reached from the internet as well as the internal corporate network.
• Data Network (DataNet) - used for storing the internal company data that only the internal corporate users are able to access.
• Sydney Network (SydNet) - used by the normal users of the company in the head office that are able to access the internet, the internal servers network and the DMZ. There are multiple departments in the head office, and each should not be able to communicate with computers in other departments.
• Melbourne Network (MelbNet) - is for a remote office that are able to access the DMZ, the DataNet and the internet.

Your task is to configure the network in simulation software so that it can be tested before it is implemented.
You must devise any security options you deem appropriate to meet the requirements and configure and document them so they can be used when the network is implemented.

2428_Securing Network.png

The following are the major assessment criteria of this assignment.

Task 1: Network environment setup
• Set up the routers, switches and PC's with the appropriate connections
• Perform basic configuration of the devices
• Test connectivity
• Save the configurations to the devices

Task 2: Security setup and performance

• Add the required security including any of the following:
o Switch port security
o VLAN's
o ACL's (most likely basic ACL's)
o static or dynamic routing
o Save the configurations to the devices

Task 3: Network testing and troubleshooting

• Correctly propose the hypothesis to be tested at each step e.g. connectivity between devices, security is working to stop X from occurring.
• Correctly identify the type of information that should be collected at each step
• Test the configuration using correct methodology
You must document what tests you will carry out, what the test is for and the result.
Consider using a table.

Task 4: Network Documentation

You must document your configurations for the devices you set up.
• Document the devices including:
o Host Devices (PC's and servers)
» Name/ID
» Link technology e.g. Ethernet
» Port Address e.g. Eth0

» Physical address e.g. MAC address
» IP Address
» Subnet Mask
» Default Gateway
» DNS
o Network Devices
» Interface configuration
• Name/ID
• Link technology e.g. Ethernet
• Port address e.g. G0/0/1
• Physical address e.g. MAC address
• Logical address e.g. IP Address / subnet mask
• Security applied
» Security Configuration
• Switch port security
• VLANs
• ACLs
• Routes
o Save the configurations to the devices
o Export the configurations (or copy/paste to a text file).

Attachment:- Practical network security setup.rar

Reference no: EM132850614

Questions Cloud

Determine the amount of cash receipts per book in April : Outstanding checks on April 30 totaled P750,000 and deposits in transit amounted to P1,500,000. Determine the amount of cash receipts per book in April 30
What is the probability that two randomly selected returns : What is the probability that two randomly selected returns with income of $1 00.000 or more will be audited? The probability is D. (Round to six decimal places
What is the adjusted balance of branch current account : Home office acquires branch furniture for P41,000 cash. The said fixed asset is carried on Branch Books. What is the adjusted balance of Branch Current account
Compare female and male inmates by criminal histories : Compare female and male inmates by their criminal histories, their family characteristics, and the offenses for which they are incarcerated.
Practical network security setup : Practical network security setup - Install and connect the devices into a network as shown in the diagram and Routers and default gateways
Confidence interval for the population mean concentration : Find a 95% confidence interval for the population mean concentration of uric acid in this patient's blood. What is the margin of error?
Cyberbullying case : Consider the cyberbullying case that resulted in the death of 13 year old Megan Meier.
What is the total credit Sales of Moksha International : Moksha International has a total sale of Rs.100 lacs, of which 75% is on credit. What is the total credit Sales of Moksha International
Test the claim that the population proportion : Test the claim that the population proportion of successes does not equal 0.50. Use a level of significance of 0.05.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd