IT3662 SAFENET Network Security and Integration Assignment: Case Study on HQ and Branch Office Setup, Singapore

University Nanyang Polytechnic (NYP)
Subject IT3662 Systems & Network Security

Project Instructions

  1. Form a group with 3 students.
  2. Software needed for this assignment: MS word, MS Visio, Packet Tracer 8.2 or better.
  3. The following files must be zipped together for submission to Politemall (name your zip file using member’s admin number):
    1. Report (MS word file or PDF)
    2. Packet Tracer File
    3. PowerPoint File that is used in your presentation
  4. Presentation is 20 Minutes for each group. Every student must present.

IT3662 Company Network Diagram

Figure 1: Company Network Diagram

Case Study

You are a network and security expert hired by SAFENET.com. The management assigned you with the tasks of integrating the headquarters and branch office networks as well as securing the existing network infrastructure. Above is a BASE template which you SHOULD modify or change in accordance to your needs.

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Native Singapore Writers Team

  • 100% Plagiarism-Free Essay
  • Highest Satisfaction Rate
  • Free Revision
  • On-Time Delivery

The company’s network setup is as follows:

Zone Network IP Setting
HQ Office Server Network 10.10.0.0/16
HQ Office User Network 10.11.0.0/16
Branch Office Server Network 10.12.0.0/16
Branch Office User Network 10.13.0.0/16
Internet Internet User Network 200.100.1.0/24
ISP – HQ Network between ISP and HQ 200.100.0.0/28
ISP – Branch Network between ISP and Branch 200.100.0.16/28

Table1: Company Network Specification

SAFENET.com requirements as follows:

  1. The company HQ & Branch networks are connected to the Internet via the ISP for both HQ and Branch Office. For this project, we are using the ISP router to simulate the Internet. Connect both HQ and Branch routers using cross cables to the ISP routers.
  2. Your company has acquired the public IP address range of 200.100.0.0/27 which is shared by HQ and Branch Offices (See Table 1 above). Assign the first usable address to the ISP router’s Ethernet interface and last usable address to each HQ and Branch router’s Ethernet interface. The company uses the private address range of 10.10.0.0/14 for assigning address within the four networks.
  3. Configure appropriate VLANs and use VTP version 2 to securely propagate VLAN information throughout the HQ network. Ensure inter-VLAN routing communication is setup.
  4. Within the HQ/Branch, configure appropriate static routing. Company routers should not exchange routes with ISP router as they are connected via Site to Site IPSec tunnel.
  5. On HQ and Branch routers, implement PAT for internal users to access Internet. Ensure only appropriate IP addresses can access the internet. You may use the router interface for IP address translation. Create a PC and web server on the ISP to simulate internet.
  6. On HQ and Branch routers, implement DHCP service to automatically assign IP address to all the PC in user networks.
  7. On HQ server network, install a web server for company website. The web site, http://www.SAFENET.com is accessible from internet. Appropriate DNAT should be configured by using the next available public IP address range. Implement DNS service if necessary.

Assignment PROPOSAL – MILESTONE 1 – Secure Network Topology Design (To be completed by Week 6)

  • Network Design with 10.10.0.0/14 is completed
  • Subnetting is completed
  • You should have completed the implementation of requirements 1 to 7.
  • Full connectivity should be achieved
  • VLANs, Trunking, Inter-VLAN Routing, Dynamic Routing Protocols, DHCP, PAT and web services should be done.
  • Ensure that your presentation demonstrates the working state of the network with clear explanations of each element
Excellent (9-10 Marks) Very Good (7-8 Marks) Good (5-6 Marks) Unsatisfactory (0-4 Marks)
Complete Working setup with no errors and clearly demonstrate the feature Complete setup with little errors in configuration and able to show the feature Partially complete setup with some errors in configuration but able to demonstrate most of the feature Incomplete setup not showing feature selected and most configurations are not working
    Buy Custom Answer of This Assessment & Raise Your Grades
  1. Network Time Protocol (NTP) allows routers on the network to synchronize their time settings with an NTP server. A group of NTP clients that obtain time and date information from a single source have more consistent time settings and Syslog messages generated can be analysed more easily. This can help when troubleshooting issues with network problems and attacks. Implement NTP and Syslog on company networks.
  2. The company wants to allow central account management for network devices access. Suggest and implement a server-based authentication method for the company.
  3. SSH is a network protocol that establishes a secure terminal emulation connection to a router or other networking device. SSH encrypts all information that passes over the network link and provides authentication of the remote computer. As all the company’s network engineer uses CLI to configure the router, you need to implement SSH on all the company network devices.
  4. The company is very concern about the security level of the company network, you are to apply appropriate firewall technology on the company’s routers.
  5. Due to the increases of cyber intrusion activity in the internet, the company also wants you to implement Intrusion Prevention System (IPS) on company routers.
  6. On HQ networks, implement Layer 2 security to prevent various attacks such as STP manipulation attack, Broadcast storms, MAC address table overflow attack and VLAN attack. (Exclude Storm Control configuration)
  7. On HQ and Branch routers, configure site-to-site IPsec VPN when traffic flows from their respective LANs. The IPsec VPN tunnel is between HQ router and Branch router via ISP router. ISP acts as a pass-through and has no knowledge of the VPN. You may suggest and implement appropriate ISAKMP and IPSec security parameters. Document down the parameters in the report.
  8. You may suggest and implement additional security measures and features to protect the company network, 5% will be awarded based on the difficulty level of the feature implemented.

Assignment – FINAL Project Presentation (To be completed by Week 14) – 30%

  • Each team member is to complete any THREE (3) network security features from items 8 to 15.
  • You are to demonstrate a working copy of Packet Tracer File.
  • Each team member is to showcase THREE (3) features

Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers

Assignment Requirements:

You are required to produce a Network Security project proposal (report) which covers the following areas:

  1. Physical network diagram (In Packet Tracer format)
  2. Detail documentation on the implementation of the above requirements:
    1. Reason of suggested implementation (if any)
    2. Steps YOU took to configure and implement the solution
    3. Configuration parameters in table form (if any)
    4. Additional implemented features (if any)
    5. Technology Theories are NOT required in the presentation

Further to the report, a working packet tracer file and power point slides for your presentation should be submitted.

Excellent Very Good Good Unsatisfactory
Individual 3 mandatory requirements Max 7 Marks for each requirement (7 Marks) Complete Working setup with no errors and clearly demonstrate the feature (5-6 Marks) Complete setup with little errors in configuration and able to show the feature (4 Marks) Partially complete setup with some errors in configuration but able to demonstrate most of the feature (0-3 Marks) Incomplete setup not showing feature selected and most configurations are not working
Additional feature Max 5 Marks (5 Marks) Complex additional feature configured with no errors (3-4 Marks) Moderate difficulty additional feature configured with little errors (1-2 Marks) Simple additional feature configured with little errors (0 Mark) No additional feature configured
Team Report (4 Marks) (4 Marks) Content well organized and according to formats given. Strong evidence of research, analysis for the feature selected. (3 Marks) Content is organized and mostly according to formats given. Clear evidence of research of the feature but lacked indepth analysis (2 Marks) Content is somewhat organized. Some evidence of research and evaluation, but with irrelevant information. (0-1 Mark) Content is unclear confusing and badly organized. Little or no attempt at research, exploration, and evaluation of the feature.

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Native Singapore Writers Team

  • 100% Plagiarism-Free Essay
  • Highest Satisfaction Rate
  • Free Revision
  • On-Time Delivery

Get Help By Expert

Prepare your Systems & Network Security Report with the help of AI-free assignment help SG. There are specialized professionals for all categories of assignments who offer you plagiarism-free and superior content. You are assured that our report-writing service will make you productive and help you achieve high grades in your academic year. A free list of assignment samples written by PhD experts is also provided here that can help you boost your study power and check the quality of the report. So contact us today and get your top-notch report!

Answer

Looking for Plagiarism free Answers for your college/ university Assignments.

Ask Your Homework Today!

We have over 1000 academic writers ready and waiting to help you achieve academic success