Posts Tagged ‘ Network Security Reports ’

Network Security Design for Backup Server

Project Scope

The project report aims to implement network security design for Backup Server for an organization.The organization has a backup server, which is currently on its network. Apart from basic protection like antivirus on the server, there are no other security implementations from a network perspective. The backup server and the users are all on the same subnet. The project understands the security issues in the design and suggests improvement plan by modifying the network infrastructure and implementing appropriate security configurations in the design.

Report format – PDF

No of Pages -7

Price – $22

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment

Network Requirements

1.Identify the security issues in the existing design
2.Modify the network design for securing backup server
3.Harden the security of the server at O/S level
4.Implement appropriate application layer access protection to the server
5.Implement appropriate network layer access protection access to the server
6.Users from external network like the internet should be unable to access the server and vice versa
7.Backup Server should be accessible to users on the LAN only via FTP protocol and restrict access to all other traffic.
8.Only the administrator of the network should have complete access to the Server.

Buy the report for the solution

Report Contents

1. Project Scope
2. Network Requirements
3. Existing Infrastructure Topology diagram
4. Security issues in Existing Infrastructure
5. Security issues mitigation plan
6. Network Infrastructure upgrade
7. Network Design
8. Upgraded Topology Diagram.
9. Network Configuration (Router Interface, ACL Configuration, ACL to block external access (Internet) to Server,
ACL to restrict LAN access to Server)
10. Verification and Testing Plan (Commands to verify configuration, Functionality Testing Plan)

Report format – PDF

No of Pages -7

Price – $22

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment

—————————————————————————————————————–

Best Sellers and Latest Reports – Click here

—————————————————————————————————————–

Custom Report – Click here


Datacenter security design proposal

Project Scope

The project report aims to design and implement security on a data center. The datacenter has 3 servers, each of which host different services. The services on each of the servers are DNS, FTP and HTTPS. Each of the servers have unique public IP addresses. There are also 2 network administrators on the network who manages and troubleshoot any issues on the server

Report format – PDF

No of pages – 9

Price – $25

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment

Requirements

1.The datacenter servers and admins should be on different network.
2.The servers should be accessible from the internet using public IP address.
3.The servers should also have private IP address using which the admins access
4.Only the required services should be available on the servers for external access. All other services should be blocked.
5.The private IP address of the servers should not be accessible from the outside network
6.All communication to the outside network from the server network should be through the respective public IP address.
7.External users should be unable to access the LAN network.
8.The implementation should be performed using Cisco IOS firewall router and switches.

Buy the report for the solution

Report Contents

1. Project Scope
2. Requirements
3. Network Design strategy
4. TCP/IP Design
5. TCP/IP Table
6. Hardware analysis and table
7. Topology Diagram
8. Topology diagram explanation
9. Router configuration (Interface , NAT, ACL-ACL rule to allow only respective services, ACL rule to deny access to private IP address of servers and LAN network.)
10. Commands for verification
11. Requirements and Solutions explanation

Report format – PDF

No of pages – 9

Price – $25

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment

—————————————————————————————————————–

Best Sellers and Latest Reports – Click here

—————————————————————————————————————–

Custom Report – Click here

Rogue AP detection using scanning techniques

Project Scope

The project understands the concept of rogue access points and how the presence of the same on a network can be detected using scanning techniques. Wireless network scanning commands on Windows 7 operating system is leveraged and the SSID and authorized list of mac-address of access points are compared. A lab is setup to demonstrate the practical analysis of the identified technique. Appropriate mechanism by which rogue access points can be mitigated is also understood.

Hardware Requirement

1.Switch ( 1nos)
2.Access points ( 2nos)
3.Windows 7 Laptop with wireless card (1 nos)

Buy the report for the solution

Report Contents

1. Project Scope
2. Hardware Requirement
3. Understanding Rogue AP
4. Wireless network scanning with Windows 7
5. Lab topology diagram
6. Rogue AP detection using SSID name
7. Rogue AP detection using mac-address
8. Rogue AP mitigation (WIPS, Port-Security)

Pages -6

Report format – PDF

Price – $20

Buy and Download with PayPal or credit card on PayPal website using the Add to Cart button

Add to Cart

The report would be downloaded automatically and you would also receive the download link in the email used for payment.

—————————————————————————————————————–

Best Sellers and Latest Reports – Click here

—————————————————————————————————————–

Custom Report – Click here