logo

IT Network Security

68 Pages3007 Words50 Views
   

Added on  2023-01-11

About This Document

This document provides information on IT network security, including ACS policies and guidelines, virtualization software, organizational requirements, hardware, commercial and business requirements. It also includes firewall configuration and testing, setup of virtual machines, benefits of virtualization, virtual machines and virtualization, backup and restore of VM, and answers to related questions.

IT Network Security

   Added on 2023-01-11

ShareRelated Documents
IT Network Security
Name of the Student:
Name of the University:
IT Network Security_1
Table of Contents
Assessment 1..................................................................................................1
ACS Policies and Guidelines...........................................................................1
Polices........................................................................................................1
Guidelines...................................................................................................1
Virtualization software..................................................................................1
Organizational Requirements.........................................................................1
Hardware...................................................................................................1
Commercial and Business Requirements...........................................................2
Commercial Requirements.............................................................................2
Business requirements...................................................................................2
Assessment 2..................................................................................................3
Firewall Configuration And Testing................................................................3
Setup of the virtual machines........................................................................37
Install VMWARE server.............................................................................37
Start the second guest.................................................................................56
Assessment 3................................................................................................61
1. Benefits of virtualisation desktop and Server Environments............................61
2. Virtual Machines and Virtualisation...........................................................62
3. Backup of VM and Restore of VM..............................................................62
4. Answers.................................................................................................62
References.................................................................................................65
IT Network Security_2
Assessment 1
ACS Policies and Guidelines
Polices
The specific IP address, address range, content type and protocols are handled by the
firewall policy, based on the organization’s information security policies. To develop a list of
firewall policy a specific type must be secured. The IP address based on the IP protocols such
as TCP, UDP and ICMP must transfer the data from one process to another process securely.
Guidelines
To allow the IT staff to access the specialized core service.
To allow only limited ports for all the devices.
To maintain the files both online and offline.
Virtualization software
In our project, the server based on operating system level virtualization is used.
Organizational Requirements
A virtual firewall is one of the application that is also called as network firewall
service which provides packet filtering for virtual environment. It is similar to the physical
firewall that combines with the switches and servers. The virtual firewall manages all the
incoming and outgoing traffic on the virtual environment. The organization employees
prevent the data from unauthorized user and the organization’s employee only access and
transmit the data.
Hardware
The hardware requirement includes personal computer, server and workstation. The
firewall is installed on VMWare server with web interface, web proxy and DNS server. The
hardware is used to prevent the computer from malwares and malicious attack. It is mainly
using to protect the data from one computer to another computer that contains routes to build
a firewall.
Commercial and Business Requirements
Commercial Requirements
The commercial firewall software is used to access the client and server network
workstation and servers. The commercial and business requirements provides protection for
1
IT Network Security_3
the client and server system. The commercial software is powerful and efficient, but not
intuitive.
Business requirements
The cloud system hardware requirements are VMsever, hard disk, CPU and memory.
If you are deploying remote data collector for cloud server you can reduce the memory size.
The software requirements are VMWare workstation and web browser requirements.
2
IT Network Security_4
Assessment 2
Firewall Configuration and Testing
Open the virtual machine to install the smooth firewall.
Create a new virtual machine for installation and click on the next button.
3
IT Network Security_5
Set the hardware compatibility for installation and click on the next button.
Download the smooth firewall IOS image file and import the file on the virtual machine.
4
IT Network Security_6
Select the guest operating system and version. Then, click on the next button.
Give the virtual machine name and set the location for installation, then click on the next
button.
5
IT Network Security_7
Select the number of processors and core per processors for configuration. Then, click on the
next button.
Select the memory allocation for the virtual machine and click on the next button.
6
IT Network Security_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Install ESXi on a VM - Desklib
|120
|3629
|301

Virtual Machine - Overview, Use, and Installation
|18
|2500
|174

Computer Security System Investigation
|18
|2613
|81

Computer Security-System Investigation
|20
|3814
|21

Virtualization Proposal for Soft Arc Engineering
|8
|2165
|40

Computer Security Project
|16
|3465
|79