ICTNWK509 - Design and Implementation of SolutionTech Network Security

Verified

Added on  2022/08/17

|12
|877
|15
Practical Assignment
AI Summary
This assignment addresses the design and implementation of a secure network perimeter for SolutionTech, focusing on the ICTNWK509 module. The student identifies potential threats to SolutionTech's network security, such as hacking, malware, and misconfigurations. A network design is developed, considering future scalability and incorporating security measures like firewalls, access control, and authentication. The network is then deployed using Cisco Packet Tracer, including cabling, switch configurations (VLANs, VTP, trunk links), IP address allocation (static and DHCP), routing, and wireless access point setup. The configuration of username/password, encryption, remote access via Telnet, and port security are also covered. Furthermore, the solution includes configuring SSH for secure remote login and access control lists to restrict network access. Finally, a remote access VPN is configured to enable secure access to the SolutionTech network from external locations, with testing and screenshots provided for validation. The assignment is supported by a bibliography of relevant research papers.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ASSESSMENT TASKS 2
ICTNWK509 Design and implement a security perimeter for ICT networks
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
ASSESSMENT TASKS 2
2.1. Identify some threats to SolutionTech perimeter security?
The following are the threats identified for the perimeter security of the SolutionTech network:
Stopping the attack barrage – There are multiple threats such as hacking, cracking and
other attacks due to malware, virus, worms and persistent threats. The default configuration of
the targeted system is attacked or improper configuration for misusing the technological
resources. The attacks are made for capturing valuable contents such as personnel data and
financial assets.
Effectively management of perimeter security system – There are different disparate
solution that can be used for ineffectively communicating with each other. Independent
management is needed for enabling the security measures such as web filtering or firewall
configuration and it have limitation in logging which can create issue for the organization for
attempting to react or detect the attack (Puthal et al. 2016). The management of security program
Document Page
2
ASSESSMENT TASKS 2
can create limitation in time and money and cause barrier for the IT department for mastering
configurations.
Lowering cost of ownership – The management of geographically diverse offices, data
centers can incur extra cost since each of the location is needed to be assigned with an IT staff. It
can also hike the renewal cost for the multitude perimeter security and thus shorten the IT
budgets.
2.2. Develop Network design for SolutionTech considering a secure perimeter and explain your
design considerations? (You may use any network design software, A demo design provided
here to give you some idea)
For the development of the secure network design the information system that can create
risk for the organization is needed to be evaluated such that the level of risk and is acceptance is
Document Page
3
ASSESSMENT TASKS 2
measured. Different control measures such as implementation of firewalls, isolation of resources,
hardening the configuration of network devices, access control and authentication system is
implemented for the development of the network design for SolutionTech. For designing the
network it is needed to be considered such that it can provide ability to support the growth and
expansion of the network in future.
2.3. Deploy the network for SolutionTech to meet perimeter security requirements by cisco
packet tracer?
Build Network topology
Connect all devices using the correct type of cables
For interconnecting the network devices the following cabling plan is needed to be
followed:
Device Cable type
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
ASSESSMENT TASKS 2
Switch to PC Cat 5e copper straight through cable
Router to Switch Cat 6 copper straight through cable
Router to Router Serial connection
Router to Firewall
Router to cloud
Cloud to DSL Modem
DSL Modem to PC
Configure layer 2 switches (Trunk Links, VTP, VLANs, and Sub-interfaces) according to
their requirements.
Document Page
5
ASSESSMENT TASKS 2
Show IP address allocation for all departments (Static and DHCP)
Document Page
6
ASSESSMENT TASKS 2
Configure routes (Routing to connect internet and intranet, DHCP pool for departments)
and wireless Access point , DNS and Web server
Annotate the diagram (including IP Addressing)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
ASSESSMENT TASKS 2
Configure username and password and privileges levels in SolutionTech’s switches and
routers
Configure password encryption, idle timeout, login blocking and a banner
Configure telnet remote access
Document Page
8
ASSESSMENT TASKS 2
Configure switchport Port security
2.4 Configure following additional security feature in SolutionTech’s Edge Router
Configure SSH (Secure Shell) protocol for remote login.
Document Page
9
ASSESSMENT TASKS 2
Configure access control list to prevent sales Dept. to ping the DN
2.5 Configure a remote access VPN to access SolutionTech's network from outside world.
2.6 Test and show all your configuration to your Assessor for acceptance (Additionally, attach
your test screen shot)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
ASSESSMENT TASKS 2
Document Page
11
ASSESSMENT TASKS 2
Bibliography
Deshmukh, D. and Iyer, B., 2017, May. Design of IPSec virtual private network for remote
access. In 2017 International Conference on Computing, Communication and Automation
(ICCCA) (pp. 716-719). IEEE.
Kurniawan, D.E., Arif, H., Nelmiawati, N., Tohari, A.H. and Fani, M., 2019, March.
Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator.
In Journal of Physics: Conference Series (Vol. 1175, No. 1, p. 012031). IOP Publishing.
Prasad, N.H., Reddy, B.K., Amarnath, B. and Puthanial, M., 2016. Intervlan Routing and
Various Configurations on Vlan in a Network using Cisco Packet Tracer. International Journal
for Innovative Research in Science and Technology, 2(11), pp.749-758.
Puthal, D., Nepal, S., Ranjan, R. and Chen, J., 2016. Threats to networking cloud and edge
datacenters in the Internet of Things. IEEE Cloud Computing, 3(3), pp.64-71.
Sami, M.A., 2017. DATA COMMUNICATION SECURITY AND VPN INSTALLATION:
BANGLADESH PERSPECTIVES(Doctoral dissertation, Jahangirnagar University Dhaka,
Bangladesh 28).
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]