SlideShare ist ein Scribd-Unternehmen logo
1 von 3
https://theacademicessays.com/downloads/solution-cis-534-
advanced-networking-design-term-paper-project-designing-secure-
network-complete-solution/
Project: Designing a Secure Network
This term paper involves putting together the various concepts learned throughout this course.
You are tasked with designing the most secure network possible, keeping in mind your goal of
supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to
design a single network capable of supporting there three (3) different services. Once you have
fully designed your network, you will need to provide three (3) workflow diagrams explaining
how your designed network handles the three (3) different transactions. The first is an internal
user sending an email using his / her corporate email address to a user on the Yahoo domain with
an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user
initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com.
The third workflow is an externally located employee initiating a VPN session to corporate in
order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.
Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts.
Note: Please use the following page breakdown to complete your assignment:
Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages
Part 1
 Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed
from the useror endpoint device to the Internet cloud, and everything in between, in which you:
o Follow the access,core, distribution layer model.
o Include at a minimum:
 Authentication server (i.e. Microsoft Active Directory)
 Routers
 Switches (and / or hubs)
 Local users
 Remote users
 Workstations
 Files share (i.e. CIFS)
 Mail server
 Web servers (both internal and external)
 Firewalls
 Internet cloud
 Web proxy
 Email proxy
 FTP server (for internal-to-external transport)
 Explain each network device’s function and your specific configuration of each networking device.
 Design and label the bandwidth availability or capacity for each wired connection.
Part 2
 Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
o Local usersends email to a Yahoo recipient. Local (corporate) userhaving email
address jonny.hill@Corp534.com sends an email to user534@yahoo.com.
 Document and label the diagram showing protocols and path of the data flow as data traverses through your network
from source to destination.
 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for
each flow.
 Show userauthentication when necessary.
 Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
o Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com).
He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running
Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
 Document and label the diagram showing protocols and path of the data flow as data traverses through your network
from source to destination.
 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for
each flow.
 Show userauthentication when necessary.
 Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
o Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop,DT-
Corp534-HellenS. Hellen uses a browser to initiate her VPN connection.By browsing
to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active
Directory credentials before the VPN tunnel is built.
 Document and label the diagram showing protocols and path of the data flow as data traverses through your network
from source to destination.
 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for
each flow.
 Show userauthentication when necessary.
 Explain how your overall design protects the organization from both inside and outside attacks.Give examples.
 Explain how your layered design compensates for possible device failures or breaches in network security.
 Determine whether any possible bottlenecks exist in your design.
 Explain how to make the file transfer process more secure.
Part 3
 Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as
quality resources.
Your assignment must follow these formatting requirements:
 Be typed,double spaced,using Times New Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your professorfor any additional instructions.
 Include a cover page containing the title of the assignment,the student’s name, the professor’s name, the course title,
and the date. The cover page and the reference page are not included in the required assignment page length.
 Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be
imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
 Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used
in IP networking.
 Identify network security tools and discuss techniques fornetwork protection
 Describe the foundational concepts ofVPNs.
 Design a secure network to address a business problem.
 Use technology and information resources to research issues in network security design.
 Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and
technical style conventions.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Wan Ii Final Project
Wan Ii Final ProjectWan Ii Final Project
Wan Ii Final Project
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2Chapter 4 computer network and the internet2
Chapter 4 computer network and the internet2
 
Network administration
Network administrationNetwork administration
Network administration
 
Technical paper
Technical paperTechnical paper
Technical paper
 
ccna practical notes
ccna practical notesccna practical notes
ccna practical notes
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
How Does the Internet Work? : Notes
How Does the Internet Work? : NotesHow Does the Internet Work? : Notes
How Does the Internet Work? : Notes
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
The osi model
The osi modelThe osi model
The osi model
 
Identify and resolve network problems
Identify and resolve network problemsIdentify and resolve network problems
Identify and resolve network problems
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 

Ähnlich wie Designing Secure Network

This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxdivinapavey
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxmanningchassidy
 
Cis 534 Teaching Effectively--tutorialrank.com
Cis 534  Teaching Effectively--tutorialrank.comCis 534  Teaching Effectively--tutorialrank.com
Cis 534 Teaching Effectively--tutorialrank.comSoaps82
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   bellflower9
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxlaurieellan
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxdarwinming1
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lrochellwa9f
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxsheronlewthwaite
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docxjonghollingberry
 
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docxerm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docxmealsdeidre
 
Term paper involves putting together the various concepts learned th.docx
Term paper involves putting together the various concepts learned th.docxTerm paper involves putting together the various concepts learned th.docx
Term paper involves putting together the various concepts learned th.docxSANSKAR20
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxmehek4
 
This term paper involves putting together the various concepts l.docx
This term paper involves putting together the various concepts l.docxThis term paper involves putting together the various concepts l.docx
This term paper involves putting together the various concepts l.docxrowthechang
 
This paper involves putting together the various concepts  learn
This paper involves putting together the various concepts  learnThis paper involves putting together the various concepts  learn
This paper involves putting together the various concepts  learntrappiteboni
 
This paper involves putting together the various concepts learned th
This paper involves putting together the various concepts learned thThis paper involves putting together the various concepts learned th
This paper involves putting together the various concepts learned thtrappiteboni
 
You are tasked with designing the most secure network possible, .docx
You are tasked with designing the most secure network possible, .docxYou are tasked with designing the most secure network possible, .docx
You are tasked with designing the most secure network possible, .docxlaquandabignell
 
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docxTerm Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docxSANSKAR20
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comsholingarjosh62
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxjacmariek5
 

Ähnlich wie Designing Secure Network (20)

This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
 
Cis 534 Teaching Effectively--tutorialrank.com
Cis 534  Teaching Effectively--tutorialrank.comCis 534  Teaching Effectively--tutorialrank.com
Cis 534 Teaching Effectively--tutorialrank.com
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docx
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docx
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts l
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
 
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docxerm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
 
Term paper involves putting together the various concepts learned th.docx
Term paper involves putting together the various concepts learned th.docxTerm paper involves putting together the various concepts learned th.docx
Term paper involves putting together the various concepts learned th.docx
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
 
This term paper involves putting together the various concepts l.docx
This term paper involves putting together the various concepts l.docxThis term paper involves putting together the various concepts l.docx
This term paper involves putting together the various concepts l.docx
 
This paper involves putting together the various concepts  learn
This paper involves putting together the various concepts  learnThis paper involves putting together the various concepts  learn
This paper involves putting together the various concepts  learn
 
This paper involves putting together the various concepts learned th
This paper involves putting together the various concepts learned thThis paper involves putting together the various concepts learned th
This paper involves putting together the various concepts learned th
 
You are tasked with designing the most secure network possible, .docx
You are tasked with designing the most secure network possible, .docxYou are tasked with designing the most secure network possible, .docx
You are tasked with designing the most secure network possible, .docx
 
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docxTerm Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
 

Mehr von victor okoth

Athlete wear co case study (5)
Athlete wear co case study  (5)Athlete wear co case study  (5)
Athlete wear co case study (5)victor okoth
 
Final assignment brief (1) (1)
Final assignment brief (1) (1)Final assignment brief (1) (1)
Final assignment brief (1) (1)victor okoth
 
Final assignment brief (1)
Final assignment brief (1)Final assignment brief (1)
Final assignment brief (1)victor okoth
 
Group assignment on Business Combinations
Group assignment on Business CombinationsGroup assignment on Business Combinations
Group assignment on Business Combinationsvictor okoth
 
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...victor okoth
 
Unit II Essay Identify the major stakeholders in your organization (or one wi...
Unit II Essay Identify the major stakeholders in your organization (or one wi...Unit II Essay Identify the major stakeholders in your organization (or one wi...
Unit II Essay Identify the major stakeholders in your organization (or one wi...victor okoth
 
Spss Homework Psyc 421
Spss Homework Psyc 421Spss Homework Psyc 421
Spss Homework Psyc 421victor okoth
 
research methods and ethical implications of a social psychology study
research methods and ethical implications of a social psychology studyresearch methods and ethical implications of a social psychology study
research methods and ethical implications of a social psychology studyvictor okoth
 
ECO 365 Entire And Complete Course
ECO 365 Entire And Complete CourseECO 365 Entire And Complete Course
ECO 365 Entire And Complete Coursevictor okoth
 
Term Paper: Virtualization
Term Paper: VirtualizationTerm Paper: Virtualization
Term Paper: Virtualizationvictor okoth
 

Mehr von victor okoth (11)

Athlete wear co case study (5)
Athlete wear co case study  (5)Athlete wear co case study  (5)
Athlete wear co case study (5)
 
Final assignment brief (1) (1)
Final assignment brief (1) (1)Final assignment brief (1) (1)
Final assignment brief (1) (1)
 
Final assignment brief (1)
Final assignment brief (1)Final assignment brief (1)
Final assignment brief (1)
 
Group assignment on Business Combinations
Group assignment on Business CombinationsGroup assignment on Business Combinations
Group assignment on Business Combinations
 
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...
MKT 421 COMPLETE COURSES MKT 421 Week 1 Understanding Marketing and Customer ...
 
Unit II Essay Identify the major stakeholders in your organization (or one wi...
Unit II Essay Identify the major stakeholders in your organization (or one wi...Unit II Essay Identify the major stakeholders in your organization (or one wi...
Unit II Essay Identify the major stakeholders in your organization (or one wi...
 
Spss Homework Psyc 421
Spss Homework Psyc 421Spss Homework Psyc 421
Spss Homework Psyc 421
 
research methods and ethical implications of a social psychology study
research methods and ethical implications of a social psychology studyresearch methods and ethical implications of a social psychology study
research methods and ethical implications of a social psychology study
 
ECO 365 Entire And Complete Course
ECO 365 Entire And Complete CourseECO 365 Entire And Complete Course
ECO 365 Entire And Complete Course
 
Term Paper: Virtualization
Term Paper: VirtualizationTerm Paper: Virtualization
Term Paper: Virtualization
 
Economicx
EconomicxEconomicx
Economicx
 

Kürzlich hochgeladen

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Kürzlich hochgeladen (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Designing Secure Network

  • 1. https://theacademicessays.com/downloads/solution-cis-534- advanced-networking-design-term-paper-project-designing-secure- network-complete-solution/ Project: Designing a Secure Network This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work. Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment: Overall network diagram: One (1) page Datapath diagrams: Three (3) pages (one for each diagram) Write-up: six to ten (6-10) pages Part 1  Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the useror endpoint device to the Internet cloud, and everything in between, in which you: o Follow the access,core, distribution layer model. o Include at a minimum:  Authentication server (i.e. Microsoft Active Directory)  Routers  Switches (and / or hubs)  Local users  Remote users  Workstations  Files share (i.e. CIFS)  Mail server  Web servers (both internal and external)  Firewalls  Internet cloud  Web proxy  Email proxy  FTP server (for internal-to-external transport)  Explain each network device’s function and your specific configuration of each networking device.
  • 2.  Design and label the bandwidth availability or capacity for each wired connection. Part 2  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: o Local usersends email to a Yahoo recipient. Local (corporate) userhaving email address jonny.hill@Corp534.com sends an email to user534@yahoo.com.  Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.  Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.  Show userauthentication when necessary.  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: o Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.  Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.  Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.  Show userauthentication when necessary.  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: o Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop,DT- Corp534-HellenS. Hellen uses a browser to initiate her VPN connection.By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.  Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.  Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.  Show userauthentication when necessary.  Explain how your overall design protects the organization from both inside and outside attacks.Give examples.  Explain how your layered design compensates for possible device failures or breaches in network security.  Determine whether any possible bottlenecks exist in your design.  Explain how to make the file transfer process more secure. Part 3  Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:  Be typed,double spaced,using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professorfor any additional instructions.  Include a cover page containing the title of the assignment,the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are:
  • 3.  Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.  Identify network security tools and discuss techniques fornetwork protection  Describe the foundational concepts ofVPNs.  Design a secure network to address a business problem.  Use technology and information resources to research issues in network security design.  Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.