University | Nanyang Polytechnic (NYP) |
Subject | IT3662 Systems & Network Security |
Project Instructions
- Form a group with 3 students.
- Software needed for this assignment: MS word, MS Visio, Packet Tracer 8.2 or better.
- The following files must be zipped together for submission to Politemall (name your zip file using member’s admin number):
- Report (MS word file or PDF)
- Packet Tracer File
- PowerPoint File that is used in your presentation
- Presentation is 20 Minutes for each group. Every student must present.
Figure 1: Company Network Diagram
Case Study
You are a network and security expert hired by SAFENET.com. The management assigned you with the tasks of integrating the headquarters and branch office networks as well as securing the existing network infrastructure. Above is a BASE template which you SHOULD modify or change in accordance to your needs.
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
The company’s network setup is as follows:
Zone | Network | IP Setting |
---|---|---|
HQ Office Server Network | 10.10.0.0/16 | |
HQ Office User Network | 10.11.0.0/16 | |
Branch Office Server Network | 10.12.0.0/16 | |
Branch Office User Network | 10.13.0.0/16 | |
Internet | Internet User Network | 200.100.1.0/24 |
ISP – HQ | Network between ISP and HQ | 200.100.0.0/28 |
ISP – Branch | Network between ISP and Branch | 200.100.0.16/28 |
Table1: Company Network Specification
SAFENET.com requirements as follows:
- The company HQ & Branch networks are connected to the Internet via the ISP for both HQ and Branch Office. For this project, we are using the ISP router to simulate the Internet. Connect both HQ and Branch routers using cross cables to the ISP routers.
- Your company has acquired the public IP address range of 200.100.0.0/27 which is shared by HQ and Branch Offices (See Table 1 above). Assign the first usable address to the ISP router’s Ethernet interface and last usable address to each HQ and Branch router’s Ethernet interface. The company uses the private address range of 10.10.0.0/14 for assigning address within the four networks.
- Configure appropriate VLANs and use VTP version 2 to securely propagate VLAN information throughout the HQ network. Ensure inter-VLAN routing communication is setup.
- Within the HQ/Branch, configure appropriate static routing. Company routers should not exchange routes with ISP router as they are connected via Site to Site IPSec tunnel.
- On HQ and Branch routers, implement PAT for internal users to access Internet. Ensure only appropriate IP addresses can access the internet. You may use the router interface for IP address translation. Create a PC and web server on the ISP to simulate internet.
- On HQ and Branch routers, implement DHCP service to automatically assign IP address to all the PC in user networks.
- On HQ server network, install a web server for company website. The web site, http://www.SAFENET.com is accessible from internet. Appropriate DNAT should be configured by using the next available public IP address range. Implement DNS service if necessary.
Assignment PROPOSAL – MILESTONE 1 – Secure Network Topology Design (To be completed by Week 6)
- Network Design with 10.10.0.0/14 is completed
- Subnetting is completed
- You should have completed the implementation of requirements 1 to 7.
- Full connectivity should be achieved
- VLANs, Trunking, Inter-VLAN Routing, Dynamic Routing Protocols, DHCP, PAT and web services should be done.
- Ensure that your presentation demonstrates the working state of the network with clear explanations of each element
Excellent (9-10 Marks) | Very Good (7-8 Marks) | Good (5-6 Marks) | Unsatisfactory (0-4 Marks) |
---|---|---|---|
Complete Working setup with no errors and clearly demonstrate the feature | Complete setup with little errors in configuration and able to show the feature | Partially complete setup with some errors in configuration but able to demonstrate most of the feature | Incomplete setup not showing feature selected and most configurations are not working |
Buy Custom Answer of This Assessment & Raise Your Grades
- Network Time Protocol (NTP) allows routers on the network to synchronize their time settings with an NTP server. A group of NTP clients that obtain time and date information from a single source have more consistent time settings and Syslog messages generated can be analysed more easily. This can help when troubleshooting issues with network problems and attacks. Implement NTP and Syslog on company networks.
- The company wants to allow central account management for network devices access. Suggest and implement a server-based authentication method for the company.
- SSH is a network protocol that establishes a secure terminal emulation connection to a router or other networking device. SSH encrypts all information that passes over the network link and provides authentication of the remote computer. As all the company’s network engineer uses CLI to configure the router, you need to implement SSH on all the company network devices.
- The company is very concern about the security level of the company network, you are to apply appropriate firewall technology on the company’s routers.
- Due to the increases of cyber intrusion activity in the internet, the company also wants you to implement Intrusion Prevention System (IPS) on company routers.
- On HQ networks, implement Layer 2 security to prevent various attacks such as STP manipulation attack, Broadcast storms, MAC address table overflow attack and VLAN attack. (Exclude Storm Control configuration)
- On HQ and Branch routers, configure site-to-site IPsec VPN when traffic flows from their respective LANs. The IPsec VPN tunnel is between HQ router and Branch router via ISP router. ISP acts as a pass-through and has no knowledge of the VPN. You may suggest and implement appropriate ISAKMP and IPSec security parameters. Document down the parameters in the report.
- You may suggest and implement additional security measures and features to protect the company network, 5% will be awarded based on the difficulty level of the feature implemented.
Assignment – FINAL Project Presentation (To be completed by Week 14) – 30%
- Each team member is to complete any THREE (3) network security features from items 8 to 15.
- You are to demonstrate a working copy of Packet Tracer File.
- Each team member is to showcase THREE (3) features
Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers
Assignment Requirements:
You are required to produce a Network Security project proposal (report) which covers the following areas:
- Physical network diagram (In Packet Tracer format)
- Detail documentation on the implementation of the above requirements:
- Reason of suggested implementation (if any)
- Steps YOU took to configure and implement the solution
- Configuration parameters in table form (if any)
- Additional implemented features (if any)
- Technology Theories are NOT required in the presentation
Further to the report, a working packet tracer file and power point slides for your presentation should be submitted.
Excellent | Very Good | Good | Unsatisfactory | |
---|---|---|---|---|
Individual 3 mandatory requirements Max 7 Marks for each requirement | (7 Marks) Complete Working setup with no errors and clearly demonstrate the feature | (5-6 Marks) Complete setup with little errors in configuration and able to show the feature | (4 Marks) Partially complete setup with some errors in configuration but able to demonstrate most of the feature | (0-3 Marks) Incomplete setup not showing feature selected and most configurations are not working |
Additional feature Max 5 Marks | (5 Marks) Complex additional feature configured with no errors | (3-4 Marks) Moderate difficulty additional feature configured with little errors | (1-2 Marks) Simple additional feature configured with little errors | (0 Mark) No additional feature configured |
Team Report (4 Marks) | (4 Marks) Content well organized and according to formats given. Strong evidence of research, analysis for the feature selected. | (3 Marks) Content is organized and mostly according to formats given. Clear evidence of research of the feature but lacked indepth analysis | (2 Marks) Content is somewhat organized. Some evidence of research and evaluation, but with irrelevant information. | (0-1 Mark) Content is unclear confusing and badly organized. Little or no attempt at research, exploration, and evaluation of the feature. |
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
Looking for Plagiarism free Answers for your college/ university Assignments.
- GCE A-Level 8882 Project Work: How to Write a Winning Project Summary
- Vodafone Group Plc Annual Report Assignment: Financial Performance and Shareholder Insights (2024)
- Financial Literacy Lifespan Assignment: A Case Study on Gen Z & Millennials’ Financial Stability and Lifelong Learning
- PSB7008CL Organisational Behaviour Assignment: Case Study on Leadership, Diversity, and Change Initiatives
- A2429C Case Study Assignment: Glucose Homeostasis, Muscle Function, and Cardiovascular-Lymphatic Disorders
- Finance/ Wealth Management Assignment: Broker Report on Equity and Bond Valuation for Global Listed Companies
- PSB503IT Team Project Reflective Report Assignment: Enhancing Collaboration and Professional Development
- Microbiology Assignment: The Role of Medical Microbiologists in Disease Control and Their Contribution to Public Health
- A2389C Pharmaceutical Supply Chain Case Study Assignment: Emergency Preparedness Plan for Tariff Impact in Singapore
- Mobile Learning App Evaluation Report Assignment: Usability, Design, and Learning Outcome Analysis