Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Was trying to do it on packet tracer to make a working topology but do not reall

ID: 3691394 • Letter: W

Question

Was trying to do it on packet tracer to make a working topology but do not really know all the commands or the easiest/ best method. Please HELP THANKS

Hans Gruber, famous for intricate watch making skills has made an attempt at modernizing his small factory in accordance with accepted methods of internet marketing, data storage and retrieval, and email. He initially hired a former client, age 78, who claimed to have the skills to design build and maintain the network Hans was hoping for. Unfortunately, the man had stopped updating his knowledge of what is considered to be current networking trends. Hans was immediately attacked from inside and out with viruses, theft of company secrets, and misuse of internet connectivity by employees. As a result, Hans thinking shifted to the other extreme. He fired the old timer and hired and 18 year old who was more concerned with heavy metal, piercings, and how long he could grow his finger nails. He lasted 3 days. When he was fired, he wiped the entire IP scheme across the network. This appears to be the only work of any kind this guy did. Hans finally called me, his nephew twice removed on his mother’s sister’s cousin’s side, to find someone to fix this disaster.

            Your team has been hired to submit a proposal to make this functional and safe. “Uncle” Hans is willing to hear any and all ideas. Because other groups will be submitting proposals, ultimately, we are looking for the simplest, least expensive, most secure and efficient network design.

The proposal should include the following along with any additional ideas.

1) An updated view of the present topology. Feel free to update equipment, add equipment, and make changes in connectivity.

2) There should be a layered approach demonstrating how you will secure the network both internally and externally through hardware and software.

3) All management computers should be able to reach the internet and be able to communicate with employees in sales and the cogs factory.

4)All computers in the cogs factory should be able to communicate with sales and management but should not have internet connectivity.

5) All computers in sales should be able to communicate with management and cogs along with internet connectivity.

6) All computers on the wireless research network should not be able to be connected to any other department but they should have internet access.

7) All public server should be accessible to anyone on the internet that has an account to access them.

8) No one coming from the internet should have access to internal servers except Hans from his home computer.

9) Each computer should be hardened with virus, spam, and data mining protection.

10) Networking monitoring tools should be built in to observe possible intrusions.

11) Explain how unused ports, interfaces, and remote access will be controlled.

12) Uncle Hans needs secure connectivity to the internal network from his house. Explain how this can be done.

13) An IP scheme needs to be implemented. The public address that has been assigned by the ISP is 200.10.10.0.

14) The IP scheme of the internal network needs to be invisible to the outside world.

15) Every device on the network needs to be tamper proof.

16) All equipment should not be physically accessible to anyone but network staff.

17) All internal network email should be scanned for junk and viruses.

18) An acceptable use policy should be written for employees.

19) All wireless communication shall be safe from interception.

20) All passwords, IP schemes, acceptable use policies, filters, closed ports and interfaces, etc., shall be documented.

Explanation / Answer

The following guidelines make the simplest, least expensive, most secure and efficient network design.

Present Topology

            Here we suggest star or tree network topology, because the nodes are controlled by common central server.

            Star topology has central top level node as server and other host are connected around the central server. Tree topology also like star topology, the distribution functionality done by central common node, this is view at top level host.

Internal

External:

The employees of centre want to access the server, get the access permission, who may be server admistrator. Then administrator keep monitor the access limitations of the staff and what work they doing in server.

The internal server is has important information of company, backup of previous data’s of staff, company documents which may be company secrets, purchasing order as well as profit information etc.

Here Mr.Hans only has the access authority to access the internal server. Keep the Internal server as very productive manner by using secret user id, password.

To protect against email-borne viruses, spam and spyware, use firewall software as well additional anti –spam futures at your gateway that are connected to a network.   Then regularly take backup of important information, these sensitive backup information should be encrypted and physically secured.

            If network affect by any fault, we have to troubleshooting based on the nature of problem, so here use network monitoring tools

Ping: to checkout whether the device is reachable or not.

Traceroute: it is indicate the problem in the network path.

Syslog Viewer: find out the send packets from the device

Require a network interface onto the internet to close down any unused port and remote access.

By using password, can protect the network communication otherwise a VPN is commonly used to provide secure connectivity to a site. Secure connection would be made from an individual computer to a VPN gateway