Computers and Technology

For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business office. Here are the required elements for the network: The office has 20 workers with 17 administrative staff and three managers who need higher-level system access.
The 17 administrative workers all need to be able to connect to printers, and all need to be able to check company email though a dedicated POP3 setup, but they do not need any other external internet access. The three managers need to have some way to access the internet occasionally.
The LAN will be set up through a DSL/cable modem.
Everyone needs to be able to access a database of customer information that has credit card data and order histories, etc.
One manager needs to be able to access the system remotely.
Create a document describing, precisely step-by-step, what actions you would take to set up this secure LAN and VLAN, including discussions of:

How you will configure the firewalls for the software and hardware. Include your “rules”/protocols in this section.
What security settings you would apply to switches.
How you would configure and secure wireless devices.
How you would secure the overall LAN and DSL/cable modem connection.
How you would secure any servers related to this setup.
What tools you would recommend for monitoring ports and network traffic, according to your own research. You must go beyond simply listing tools and defend your choices.
What IDS and IPS you will include, again according to your own research.
What you will include to accommodate the manager who needs remote access.
To receive full credit for this assignment, you must be explicit in your steps. For example, rather than saying “change the router’s password,” give specifics: “create a new password for the router using XYZ criteria so that the password is secure.”

You may conduct any amount of independent research to improve your plan, but all of the basic elements were covered in the unit itself (except for specific port monitoring applications and IDS/IDP).

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 15:00, miracle9704
Atool that matches persoal skills qualities interests and talets to a career is called a
Answers: 1
image
Computers and Technology, 23.06.2019 00:30, lilobekker5219
Knowing that the central portion of link bd has a uniform cross sectional area of 800 mm2 , determine the magnitude of the load p for which the normal stress in link bd is 50 mpa. (hint: link bd is a two-force member.) ans: p = 62.7 kn
Answers: 2
image
Computers and Technology, 24.06.2019 16:00, ramirez5571
"gps interaction and cognitive process" respond to the following: imagine that you have been asked to design a gps product that will have voice recognition and bluetooth capability. discuss and conceptualize a user interaction model. predict two (2) problems that may arise in gps products with voice recognition and bluetooth capability. recommend solutions for each of these issues. attention is one of the six cognition processes. when attention is applied to a design, the goal is to make it easier for the end user to quickly locate where he / she should type information on the computer or mobile device screen. compare and contrast how the google search engine and the microsoft bing search engine employ the attention cognition process. provide your opinion as to which search engine better employs the attention cognition process and explain why.
Answers: 3
image
Computers and Technology, 24.06.2019 18:20, mshepherdmiller
Acommon algorithm for converting a decimal number to binary is to repeatedly divide the decimal number by 2 and save the remainder. this division is continued until the result is zero. then, each of the remainders that have been saved are used to construct the binary number. write a recursive java method that implements this algorithm. it will accept a value of int and return a string with the appropriate binary character representation of the decimal number. my code: public class lab16{public string converttobinary(int input){int a; if(input > 0){a = input % 2; return (converttobinary(input / 2) + "" +a); } return ""; } }
Answers: 1
Do you know the correct answer?
For this activity, imagine you have been tasked with setting up the LAN and VLAN for a business offi...

Questions in other subjects: