Skip to main content

IT services: email, file transfer (centralized), and VPN.

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.
Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:
  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages
Part 1
  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)
  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.
Part 2
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address .hill@Corp534.com”>jonny.hill@Corp534.comsends an email to user534@yahoo.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (.netneering.com/”>ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to .netneering.com/”>ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to .corp534.com/”>https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more secure.
Part 3
  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom