Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371

CRICOS Provider Code: 02870D


North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

Internal gateway configuration preparation

1. Details related to the work brief

// the student must describe the objective, scope of the assessment and brief description of the
scenarios.

Objective: The internal gateway configuration assessment's goal is to review and improve how
internal gateways are set up within a company's network architecture. The evaluation seeks to
confirm that internal gateways are correctly configured and operating effectively to support
secure and dependable communication between various network segments or subnets.

Scope: The evaluation concentrates on internal gateways, which are in charge of directing
network traffic inside a company's private network. It covers a thorough analysis of the internal
gateway infrastructure's configuration options, protocols, security features, and overall design.
Hardware and software elements including routers, switches, firewalls, and other associated
network equipment may be covered by the assessment.

Brief Description of Scenarios: The evaluation looks at the configuration of an internal gateway,
including routing protocols, security precautions, NAT, VLANs, redundancy, and performance
management. In order to ensure safe communication and smooth data flow within the private
network, businesses can discover vulnerabilities, gaps, and optimize network efficiency by looking
at these scenarios.

2. Hardware, software and tools selected and sourced.

// As per requirements, the student must mention the hardware, software and tools list in this
section. The student must mention the specifications of the tools also.
For instance,

Hardware:


 Routers: High-performance routers capable of handling the network traffic and routing
protocols, such as Cisco ISR (Integrated Services Router) series or Juniper MX series.
 Switches: Layer 2 and Layer 3 switches for network connectivity and VLAN management,
such as Cisco Catalyst switches or Arista Networks switches.
 Firewalls: Next-generation firewalls to enforce security policies and protect against
unauthorized access, such as Palo Alto Networks or Fortinet firewalls.

Software:

1
‘Template 4’ pertaining to Activity 2 in Part B of task 2.
Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371 CRICOS Provider Code: 02870D
North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

 Operating Systems: Depending on the hardware selected, the appropriate operating


system is chosen, such as Cisco IOS, Juniper Junos, or Palo Alto PAN-OS.
 Routing Protocols: Software implementations of routing protocols like OSPF or EIGRP are
configured on the internal gateways to enable efficient network routing.
 Security Software: Software modules or applications for implementing access control lists
(ACLs), VPNs, and firewall rules to enhance network security.

Tools:

 Network Management Systems: Tools like Cisco Prime Infrastructure, SolarWinds


Network Performance Monitor, or Juniper Junos Space are used for centralized
management, monitoring, and configuration of the internal gateways.
 Packet Analyzers: Tools like Wireshark or tcpdump are utilized for capturing and
analyzing network traffic, assisting in troubleshooting and optimizing network
performance.
 Configuration Management Tools: Tools like Ansible, Puppet, or Chef help automate
configuration tasks, ensuring consistency and efficiency in managing the internal gateway
configurations.

Procurement and Sourcing:


 Organizations typically engage with vendors or resellers to procure the required
hardware components, ensuring compatibility and support.
 Software licenses for operating systems, routing protocols, and security features are
acquired from the respective vendors.
 Tools can be sourced from software vendors, open-source communities, or obtained
through licensing agreements.

2
‘Template 4’ pertaining to Activity 2 in Part B of task 2.
Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371 CRICOS Provider Code: 02870D
North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

3. Existing ISP features.

// the student must mention the features of the ISP providing to the organisation. It may include:

High-speed access: To enable quick and effective data transfer for the organization's operations, the ISP
should offer dependable, high-speed internet connectivity.

Self-service mobile apps: The ISP may provide mobile applications that let a company manage
and keep track of its internet services, with functions like account management, bill payment, and
troubleshooting support.

Domain name registration: The ISP may offer domain name registration services, enabling the
organization to acquire and maintain a distinctive domain name for its website or email addresses.

Web hosting: The ISP might provide this service, giving the company server space so they can host their
website and make it available to everyone online.

Assessing service levels: It describe the guaranteed level of service and include uptime guarantees,
response times for support inquiries, and maintenance windows, should be visible and unambiguous from
the ISP. This makes it easier for the business to evaluate the ISP's performance and hold them responsible
for providing dependable and consistent service.

3
‘Template 4’ pertaining to Activity 2 in Part B of task 2.
Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371 CRICOS Provider Code: 02870D
North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

4
‘Template 4’ pertaining to Activity 2 in Part B of task 2.
Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371 CRICOS Provider Code: 02870D
North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

5
‘Template 4’ pertaining to Activity 2 in Part B of task 2.
Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371 CRICOS Provider Code: 02870D
North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Sydney CBD Campus: Level 11, 307 Pitt St Sydney NSW 2000 P 02 8034 6431
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

6
‘Template 4’ pertaining to Activity 2 in Part B of task 2.

You might also like