subject

For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business office. Here are the required elements for the network: The office has 20 workers with 17 administrative staff and three managers who need higher-level system access.
The 17 administrative workers all need to be able to connect to printers, and all need to be able to check company email though a dedicated POP3 setup, but they do not need any other external internet access. The three managers need to have some way to access the internet occasionally.
The LAN will be set up through a DSL/cable modem.
Everyone needs to be able to access a database of customer information that has credit card data and order histories, etc.
One manager needs to be able to access the system remotely.
Create a document describing, precisely step-by-step, what actions you would take to set up this secure LAN and VLAN, including discussions of:

How you will configure the firewalls for the software and hardware. Include your “rules”/protocols in this section.
What security settings you would apply to switches.
How you would configure and secure wireless devices.
How you would secure the overall LAN and DSL/cable modem connection.
How you would secure any servers related to this setup.
What tools you would recommend for monitoring ports and network traffic, according to your own research. You must go beyond simply listing tools and defend your choices.
What IDS and IPS you will include, again according to your own research.
What you will include to accommodate the manager who needs remote access.
To receive full credit for this assignment, you must be explicit in your steps. For example, rather than saying “change the router’s password,” give specifics: “create a new password for the router using XYZ criteria so that the password is secure.”

You may conduct any amount of independent research to improve your plan, but all of the basic elements were covered in the unit itself (except for specific port monitoring applications and IDS/IDP).

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 12:20
Usually, when we sniff packets, we are only interested certain types of packets. we can do that by setting filters in sniffing. scapy’s filter use the bpf (berkeley packet filter) syntax; you can find the bpf manual from the internet. set the following filters and demonstrate your sniffer program again (each filter should be set separately): (a) capture only the icmp packet. (b) capture any tcp packet that comes from a particular ip and with a destination port number 23. (c) capture packets comes from or to go to a particular subnet. you can pick any subnet, such as 128.230.0.0/16; you should not pick the subnet that your vm is attached to.
Answers: 3
question
Computers and Technology, 23.06.2019 20:30
If an appliance consumes 500 w of power and is left on for 5 hours, how much energy is used over this time period? a. 2.5 kwh b. 25 kwh c. 250 kwh d. 2500 kwh
Answers: 1
question
Computers and Technology, 24.06.2019 07:00
Guys do you know sh27 cause he hacked me : ( pidgegunderson my old user
Answers: 2
question
Computers and Technology, 24.06.2019 07:00
Why would a business likely use a java applet - to back up their data files for the business - to create a program that a customer can launch in their web browser - to create music on a powerpoint presentation - to organize files on their company directory
Answers: 3
You know the right answer?
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business offi...
Questions
Questions on the website: 13722367