SlideShare a Scribd company logo
Mister Network Engineer
Due Week 8 and worth 70 points
Using the network diagram below, your task is to incorporate
the devices on the lower right into the diagram to create a
secure corporate network. The devices you need to incorporate
into the network diagram include: Web server, ftp server,
vulnerability scanner, anti-virus server (client-based / server-
based), Web proxy, intrusion detection system (IDS), and
authentication server.
Note: All client-based / server-based devices work where a
client is installed on a workstation, which has bidirectional
communication with a corresponding server.
Write a four to five (4-5) page paper in which you:
Determine which devices you will use for both the current
network diagram infrastructure consisting of firewalls, routers,
and workstations as well as the device you need to incorporate.
Include the following for each:
Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper,
Netgear, 3Com, etc.)
Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)
IP address assigned to all devices
Establish the configuration for each device in which you:
Research each of the devices you chose and provide a basic
configuration you would use in your network.
Use IP addresses to describe your configuration.
Explain the impact that each of your configurations has on the
security of the entire network.
Highlight at least five (5) security features for each device,
including devices in network diagram.
Using Microsoft Visio or its open source alternative to create a
final network diagram that incorporates all devices into the
existing network and ensures the following:
VPN sessions (from laptop) are only allowed to access the
desktops in the IT department by IT department employees.
All VPN connections from the Internet cloud into the corporate
network terminate at the VPN server.
Users from Engineering and Finance and Accounting CANNOT
communicate.
Vulnerability scans occur daily in which all desktops are
scanned at least once per day.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia. The completed diagrams / charts must be imported
into the Word document before the paper is submitted.

More Related Content

DOCX
Using the network diagram located in attachment,  incorporate into t
PPT
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
DOCX
Cis 534 Enthusiastic Study / snaptutorial.com
DOCX
Cis 534 Technology levels--snaptutorial.com
DOC
Cis 534 Effective Communication / snaptutorial.com
DOC
CIS 534 Education Specialist / snaptutorial.com
DOCX
Cis 534 Education Organization -- snaptutorial.com
DOCX
This term paper involves putting together the various concepts learn.docx
Using the network diagram located in attachment,  incorporate into t
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
Cis 534 Effective Communication / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.com
Cis 534 Education Organization -- snaptutorial.com
This term paper involves putting together the various concepts learn.docx

Similar to Mister Network Engineer Due Week 8 and worth 70 points Using the.docx (20)

PDF
Cis 534 Teaching Effectively--tutorialrank.com
DOC
CIS 534 Life of the Mind/newtonhelp.com   
DOCX
Need help writing term paper.  Posted previously with different due .docx
DOCX
Term Paper Project Designing a Secure NetworkThis term paper .docx
DOCX
reposting due to tutor not being able to complete.,This term .docx
DOCX
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
DOCX
You are tasked with designing the most secure network possible, .docx
DOCX
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
DOCX
This term paper involves putting together the various concepts l.docx
DOCX
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
DOCX
Oftentimes, the process of implementing security opens one’s eyes to.docx
DOC
Cmit 265 Effective Communication / snaptutorial.com
DOCX
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
DOCX
This term paper involves putting together the various concepts l
DOCX
Project: Designing a Secure Network
PDF
CMIT 265 NETWORK DESIGN PAPER
DOCX
Term paper involves putting together the various concepts learned th.docx
DOCX
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
DOC
Cmit 265 Enthusiastic Study / snaptutorial.com
DOCX
CMIT 265 Education Redefined / snaptutorial.com
Cis 534 Teaching Effectively--tutorialrank.com
CIS 534 Life of the Mind/newtonhelp.com   
Need help writing term paper.  Posted previously with different due .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
reposting due to tutor not being able to complete.,This term .docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
You are tasked with designing the most secure network possible, .docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
This term paper involves putting together the various concepts l.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Oftentimes, the process of implementing security opens one’s eyes to.docx
Cmit 265 Effective Communication / snaptutorial.com
erm Paper Project Designing a Secure NetworkDue Week 10 and worth.docx
This term paper involves putting together the various concepts l
Project: Designing a Secure Network
CMIT 265 NETWORK DESIGN PAPER
Term paper involves putting together the various concepts learned th.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Cmit 265 Enthusiastic Study / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.com
Ad

More from jacmariek5 (20)

DOCX
Munich Personal RePEc ArchiveShould a Government Fiscally .docx
DOCX
Music conset report. OperaMusical Theater Workshop Performance.docx
DOCX
Multiple Choice (7 points each)1.DeVries uses an allowance m.docx
DOCX
Multiple Choice (0.5 point each) 1.  Sam orally agreed to sell .docx
DOCX
Muslim Structures and Pilgrimage Please respond to the following.docx
DOCX
MS SQL ---InModule Four,submit asystemsanaly.docx
DOCX
Much has been written on the self-perceived ability of individuals t.docx
DOCX
Multiple Choice Questions 1. When managers establish a structure o.docx
DOCX
MUST be able to meet one day delivery dateMUST have low silima.docx
DOCX
Mr. P is a 76-year-old male with cardiomyopathy and congestive heart.docx
DOCX
Must be 200 words must cite work. For Health Information Systems cla.docx
DOCX
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
DOCX
Multicultural Education Research Paper Rubric Criteria P.docx
DOCX
Music in Film Paper Prompt Choose a scene from a movie. Watch .docx
DOCX
music reportI need help to write two concert report. due on this t.docx
DOCX
Must be able to use MS projectConveyor Belt Project- Part 1.docx
DOCX
Moving Beyond the Status Quo and Reactions to Change Please discus.docx
DOCX
Motivation is a complex subject, but its understanding and applicati.docx
DOCX
MoviesSix analytical perspectives for analyzing media by author an.docx
DOCX
Motivation of BehaviorView RubricDue Date Jul 15, 2015 235.docx
Munich Personal RePEc ArchiveShould a Government Fiscally .docx
Music conset report. OperaMusical Theater Workshop Performance.docx
Multiple Choice (7 points each)1.DeVries uses an allowance m.docx
Multiple Choice (0.5 point each) 1.  Sam orally agreed to sell .docx
Muslim Structures and Pilgrimage Please respond to the following.docx
MS SQL ---InModule Four,submit asystemsanaly.docx
Much has been written on the self-perceived ability of individuals t.docx
Multiple Choice Questions 1. When managers establish a structure o.docx
MUST be able to meet one day delivery dateMUST have low silima.docx
Mr. P is a 76-year-old male with cardiomyopathy and congestive heart.docx
Must be 200 words must cite work. For Health Information Systems cla.docx
MUST - FOLLOW OUTLINE - USE THE REFERENCES PROVIDED- CITE RE.docx
Multicultural Education Research Paper Rubric Criteria P.docx
Music in Film Paper Prompt Choose a scene from a movie. Watch .docx
music reportI need help to write two concert report. due on this t.docx
Must be able to use MS projectConveyor Belt Project- Part 1.docx
Moving Beyond the Status Quo and Reactions to Change Please discus.docx
Motivation is a complex subject, but its understanding and applicati.docx
MoviesSix analytical perspectives for analyzing media by author an.docx
Motivation of BehaviorView RubricDue Date Jul 15, 2015 235.docx
Ad

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Structure & Organelles in detailed.
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx
Anesthesia in Laparoscopic Surgery in India
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharma ospi slides which help in ospi learning
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
GDM (1) (1).pptx small presentation for students
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Structure & Organelles in detailed.

Mister Network Engineer Due Week 8 and worth 70 points Using the.docx

  • 1. Mister Network Engineer Due Week 8 and worth 70 points Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server- based), Web proxy, intrusion detection system (IDS), and authentication server. Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server. Write a four to five (4-5) page paper in which you: Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each: Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.) Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.) IP address assigned to all devices Establish the configuration for each device in which you: Research each of the devices you chose and provide a basic configuration you would use in your network. Use IP addresses to describe your configuration. Explain the impact that each of your configurations has on the security of the entire network. Highlight at least five (5) security features for each device, including devices in network diagram. Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following: VPN sessions (from laptop) are only allowed to access the
  • 2. desktops in the IT department by IT department employees. All VPN connections from the Internet cloud into the corporate network terminate at the VPN server. Users from Engineering and Finance and Accounting CANNOT communicate. Vulnerability scans occur daily in which all desktops are scanned at least once per day. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.