question archive You will use the  Sandbox lab to complete this project

You will use the  Sandbox lab to complete this project

Subject:Computer SciencePrice: Bought3

You will use the  Sandbox lab to complete this project. Note: You must complete this project in one sitting, as the lab environment is non-persistent. Be aware of your time as you complete the lab. You can extend your lab when the time warning appears. 

 You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned. 

 I. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet. Include screenshots of the following: 

A. Network diagram 

B. Port assignment and VLAN assignment for each switch.

 Traffic Flow Configuration: Shape the traffic flow using the Firewall Traffic Shaping Goals in the Project 

Three Network Reconfiguration Specifications spreadsheet. Include screenshot(s) of the following:

 A. Configure a firewall rule to allow port 80 HTTP from the WAN to the web server. 

B. Configure a firewall rule to allow port 443 HTTPS from the WAN to the web server.

C. Configure a firewall rule to block port 80 HTTP from the WAN to any other system.  

 D. Configure a firewall rule to block port 443 HTTPS from the WAN to any other system. 

 III. Organizational Security Strategy 

A. Explain how the security posture of the organization has been improved by the restructuring. 

B. Describe how the tenets of the CIA triad (confidentiality, integrity, and availability) are affected by the restructuring. 

  •  

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE