Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 2: In this part you need to analyze the specification from the organization below for completion of this project within a given timeframe: Headquarter

Part 2: In this part you need to analyze the specification from the organization below for completion of this project within a given timeframe: Headquarter Office: People: 1 higher manager, 3 administrative staff, 2 system admins, 1 network security admin. Resources: Full loaded Date Center, 7 staff computers Building: all staff and machines are located on the same floor. Branches Offices: People: 1 manager, 2 administrative staff. Resources: 3 staff computers and small data center loaded with needed devices. Building: all staff and machines are located on the same floor. The VLANs should be numbered as follows: # VLAN Name VLAN Subnet IP 10 Amman 1 192.168.10.0/27 20 Amman 2 192.168.20.0/27 30 Servers 192.168.30.0/27 40 Irbid 1 192.168.40.0/27 50 Irbid 2 192.168.50.0/27 60 Karak1 192.168.60.0/27 70 Karak 2 192.168.70.0/27 80 Aqaba 1 192.168.80.0/27 90 Aqaba 2 192.168.90.0/27 100 Native 192.168.100.0/27 The servers should be assigned the following static IP addresses. Server IP Address FTP 192.168.30.1 Mail 192.168.30.2 DNS 192.168.30.3 HTTPs 192.168.30.4 The servers in VLAN 30 are accessible by other VLANs according to the following rules: HTTPs server is accessible by all VLANs. Mail server is accessible by the 10 and 50 VLANs. FTP server is accessible by the 90 and 70 VLANs. DNS server is accessible by all VLANs. Mail server isn't accessible by the 60 and 80 VLANs. Irbid branch can be accessed using SSH protocol. Page 5 of 6 Furthermore, the network must support the access of employees in the Irbid office from their houses to the main office through a VPN connection. 2.1 Design and configure a secure network for the headquarter and the branches: 1. Investigate the purpose and requirements of the secure network according to the given scenario. 2. Determine which network hardware and software to use in the network. Justify your choices. 3. Design and implement a secure network prototype according to the given scenario using Packet Tracer simulator. 4. Configure Network Security measures for your network. Those measures include Firewalls, Intrusion Detection & Prevention Systems, Routers, Switches, Gateways, passwords, SSH, SSL/TLS, IPSec, VPN, HTTPs, DNS...etc. 5. Justify the choices you made in the implemented network security configuration 6. Provide Network Security configuration scripts/files/screenshots with comments. 2.2 Undertake the testing of a network security using a Test Plan 1. Create a test plan for your network. Your test plan should consider different testing methods in terms of checks on network security, testing for network vulnerabilities etc. 2. Comprehensively test your network using the devised test plan. Tests should be carried out on all devices (Firewall, Servers, Routers, Switches, gateways, passwords). Record the test results and analyze these against expected results. You need to provide scripts/files/screenshots of the testing of your network. 3. Critically evaluate the design, planning, configuration and testing of your secure network. Make some improvement recommendations

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions