question archive You will use the Sandbox lab to complete this project
Subject:Computer SciencePrice: Bought3
You will use the Sandbox lab to complete this project. Note: You must complete this project in one sitting, as the lab environment is non-persistent. Be aware of your time as you complete the lab. You can extend your lab when the time warning appears.
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.
I. Network Reconfiguration: Update the network using the Network Layout Table in the Project Three Network Reconfiguration Specifications spreadsheet. Include screenshots of the following:
A. Network diagram
B. Port assignment and VLAN assignment for each switch.
Traffic Flow Configuration: Shape the traffic flow using the Firewall Traffic Shaping Goals in the Project
Three Network Reconfiguration Specifications spreadsheet. Include screenshot(s) of the following:
A. Configure a firewall rule to allow port 80 HTTP from the WAN to the web server.
B. Configure a firewall rule to allow port 443 HTTPS from the WAN to the web server.
C. Configure a firewall rule to block port 80 HTTP from the WAN to any other system.
D. Configure a firewall rule to block port 443 HTTPS from the WAN to any other system.
III. Organizational Security Strategy
A. Explain how the security posture of the organization has been improved by the restructuring.
B. Describe how the tenets of the CIA triad (confidentiality, integrity, and availability) are affected by the restructuring.