subject

For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business office. Here are the required elements for the network: The office has 20 workers with 17 administrative staff and three managers who need higher-level system access.
The 17 administrative workers all need to be able to connect to printers, and all need to be able to check company email though a dedicated POP3 setup, but they do not need any other external internet access. The three managers need to have some way to access the internet occasionally.
The LAN will be set up through a DSL/cable modem.
Everyone needs to be able to access a database of customer information that has credit card data and order histories, etc.
One manager needs to be able to access the system remotely.
Create a document describing, precisely step-by-step, what actions you would take to set up this secure LAN and VLAN, including discussions of:

How you will configure the firewalls for the software and hardware. Include your “rules”/protocols in this section.
What security settings you would apply to switches.
How you would configure and secure wireless devices.
How you would secure the overall LAN and DSL/cable modem connection.
How you would secure any servers related to this setup.
What tools you would recommend for monitoring ports and network traffic, according to your own research. You must go beyond simply listing tools and defend your choices.
What IDS and IPS you will include, again according to your own research.
What you will include to accommodate the manager who needs remote access.
To receive full credit for this assignment, you must be explicit in your steps. For example, rather than saying “change the router’s password,” give specifics: “create a new password for the router using XYZ criteria so that the password is secure.”

You may conduct any amount of independent research to improve your plan, but all of the basic elements were covered in the unit itself (except for specific port monitoring applications and IDS/IDP).

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 00:10
Read each statement below. if the statement describes a peer-to-peer network, put a p next to it. if the statement describes a server-based network, put an s next to it. p - peer-to-peer s - server-based
Answers: 1
question
Computers and Technology, 24.06.2019 16:50
7.23 main lab 7 - online shopping cart background this main lab extends the earlier prep lab "online shopping cart part 1". (you should save this as a separate project from the earlier prep lab). you will create an on-line shopping cart like you might use for your on-line purchases. the goal is to become comfortable with setting up classes and using objects. requirements this lab can be done individually or as pair programming. expanded itemtopurchase class (15 points) extend the itemtopurchase class as follows. we will not do unit testing in this lab so we will not be giving you the names of the member functions. create good ones on your own. create a parameterized constructor to assign item name, item description, item price, and item quantity (default values of "none" for name and description, and 0 for price and quantity). additional public member functions set an item description get an item description print the cost of an item - outputs the item name followed by the quantity, price, and subtotal (see example) print the description of an item - outputs the item name and description (see example) additional private data members a string for the description of the item. example output of the function which prints the cost of an item: bottled water 10 @ $1.50 = $15.00 example output of the function which prints the item description:
Answers: 1
question
Computers and Technology, 24.06.2019 17:50
Which of the following best describe how the depth-limited search works. a normal depth-first search is performed but the number of ply/depths is limited. a normal breadth-first search is performed but the number of ply/depths is limited. a normal breadth-first search is performed but values above a specific value will be ignored. a normal depth-first search is performed but values above a specific value will be ignored.
Answers: 1
question
Computers and Technology, 24.06.2019 21:30
Suppose a router has built up the routing table shown in the table. subnet number 128.96.39.00 28.96.39.128 128.96.40.00 192.4.153.0 default) subnet mask 255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.192 nexthop interface 0 interface 1 r2 r3 r4. the router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers r2, r3, or r4. describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.39.10 (b) 128.96.40.12 (c) 128.96.40.151 (d) 192.4.153.17 (e) 192.4.153.90
Answers: 3
You know the right answer?
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business offi...
Questions
question
Biology, 03.07.2019 02:00
Questions on the website: 13722361