Network Security Projects

DMZ Network Design with Cisco Routers

Project Scope

This project understands how Cisco routers can be used for setting up a DMZ network. The fundamentals of DMZ networking and its need in an enterprise are understood. The mechanism by which Access control lists available on Cisco routers, can be used to setup DMZ for common public servers like Web, FTP, DNS and SSL servers along with appropriate configuration is analyzed.

Report Contents

1. Understanding DMZ
2. Need for DMZ
3. Port numbers in DMZ design
4. IP Network design for DMZ
5. DMZ Networking components
6. Access control lists in DMZ Design
7. DMZ Design strategy
8. DMZ Server IP design
9. DMZ Design Analysis with Cisco routers for the below servers
DMZ Design for Web Server.
DMZ Design for FTP Server.
DMZ Design for DNS Server
DMZ Design for SSL VPN Server

Report Format – PDF

Pages – 11

Price – $25

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click Here

—————————————————————————————————————–


Active and Passive FTP Design and Security analysis

Abstract

The project does a detailed analysis of the two different types of the FTP protocol, Active and Passive. The design of the protocols, which include the TCP connection establishment on the respective ports,

Read more »

Access control lists in a VLAN environment.

Abstract

The project understands the different types of access control list and the different types on a Cisco IOS firewall like inbound, outbound, standard and extended and how it can be efficiently use to provide access restriction between different systems and services belonging

Read more »

ICMP address mask request attack demonstration

Abstract:

The project performs analysis of ICMP address mask request attack and how to craft the attack. Open source tools like Scapy and Python is used to demonstrate an ICMP address mask request attack on the LAN by modifying appropriate fields in the

Read more »