The writer is very fast, professional and responded to the review request fast also. Thank you.
Due Week 10 and worth 300 points
Your company just recently installed new routers onto the network and has asked you to design the appropriate security to prevent unwanted traffic and to prevent illegal activities from occurring. Your job in this project is to use the diagram below and the criterion set by the company to come up with the proper command structure to create the access control lists. Document the steps you used to create and determine (justify) the usage of your ACL and is part of process of implementation of a new security feature. Remember to include what type of access list you created, where you applied, and why. Below is a diagram of the current network and some specific requests from the company.
Some specific request from the company
1. The company wants to prevent all traffic that is not part of the internal network (172.16.0.0 /16) from traveling out of the Ethernet interfaces.
2. They also want to prevent host 172.16.5.35 from accessing the Internet.
3. Consideration needs to be made to prevent Telnet, ftp, and ability to ping from outside of the network.
4. The 17.16.3.0 segment houses all of the sales information. The company wants to prevent access from other networks to that segment.
Write an eight to ten (8-10) page paper in which you:
1. Re-create the diagram above and add the needed ACL to the appropriate port by using Visio or similar drawing program.
2. Create Standard Access Lists.
3. Create Extended Access Lists.
4. Apply the access list correctly.
5. Justify the ACL and describe each purpose.
Your assignment must follow these formatting requirements:
The specific course learning outcomes associated with this assignment are:
Click here to view the grading rubric.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more