subject

For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business office. Here are the required elements for the network: The office has 20 workers with 17 administrative staff and three managers who need higher-level system access.
The 17 administrative workers all need to be able to connect to printers, and all need to be able to check company email though a dedicated POP3 setup, but they do not need any other external internet access. The three managers need to have some way to access the internet occasionally.
The LAN will be set up through a DSL/cable modem.
Everyone needs to be able to access a database of customer information that has credit card data and order histories, etc.
One manager needs to be able to access the system remotely.
Create a document describing, precisely step-by-step, what actions you would take to set up this secure LAN and VLAN, including discussions of:

How you will configure the firewalls for the software and hardware. Include your “rules”/protocols in this section.
What security settings you would apply to switches.
How you would configure and secure wireless devices.
How you would secure the overall LAN and DSL/cable modem connection.
How you would secure any servers related to this setup.
What tools you would recommend for monitoring ports and network traffic, according to your own research. You must go beyond simply listing tools and defend your choices.
What IDS and IPS you will include, again according to your own research.
What you will include to accommodate the manager who needs remote access.
To receive full credit for this assignment, you must be explicit in your steps. For example, rather than saying “change the router’s password,” give specifics: “create a new password for the router using XYZ criteria so that the password is secure.”

You may conduct any amount of independent research to improve your plan, but all of the basic elements were covered in the unit itself (except for specific port monitoring applications and IDS/IDP).

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:20
The kurt vonnegut commencement speech, the neiman-marcus chocolate chip cookie recipe, and the get-well emails to the dying boy are examples of select one: a. social engineering b. hoax emails c. email viruses d. worms
Answers: 1
question
Computers and Technology, 23.06.2019 10:00
What is estimated time of arrival (eta)? a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds a gps technology adventure game that posts the longitude and latitude location for an item on the internet for users to find a north/south measurement of position the time of day of an expected arrival at a certain destination and is typically used for navigation applications
Answers: 3
question
Computers and Technology, 24.06.2019 18:30
Is a type of bullying that takes place when a person intentionally posts negative information about another that is not true
Answers: 1
question
Computers and Technology, 24.06.2019 20:00
Which element will you include to present numerical on a slide? a: graph b: text c: flowchart d: shapes
Answers: 1
You know the right answer?
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business offi...
Questions
question
Mathematics, 11.10.2019 01:30
question
History, 11.10.2019 01:30
Questions on the website: 13722360