CCEE 556L-Project Instructions-Spring 2024

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CCEE 556L Networking Lab IV Spring 2023-2024

Rafik Hariri University


College of Engineering
Electrical and Computer Engineering
Communication and Computer Engineering
CCEE 556L - Project

Project Introduction:

This project consists of implementing a network using CISCO Packet Tracer, involving current
technologies in computer networks and network security. You have to follow the coming
instructions while proceeding with your project.

1. You should be working in a group of THREE students at most.


2. You have to submit the final packet tracer file on Moodle and present it during the last
week of classes: between Monday, April 15, 2024 and Wednesday April 17, 2024.

Project Guidelines:

Follow the below guidelines so you can be ready working smoothly during your project’s
workflow.

1. Understand your assignment very well, so you do not have to repeat your tasks often.
2. Make a preliminary research about the subject’s areas.
3. Read ALL Network Security Modules on Netacad.com, especially Modules 11->12, 18-
>22 as they are the main subjects involved in this project.
4. Follow the network architecture and implementation needs to know exactly what to
implement in your topology.

Network Architecture and Implementation:

You are the network designer for the XYZ firm. While implementing the network logical topology,
you must verify that all devices are protected and message exchange is safe. Thus, a paradigm shift
in networking architecture is essential to fight against rapidly changing assaults. In your security
system plan, you must safeguard all network devices and hosts.

Page 1 of 3
CCEE 556L Networking Lab IV Spring 2023-2024

Network Topology

Security Fields

1. SSH security to the network devices, mainly routers.


2. Layer 2 is a crucial component of the network infrastructure and offers network users
access. By providing numerous high-speed channels to connect significant network
segments, Layer 2 devices enable redundancy. Threat actors that might try to take down
the network infrastructure can gain access by giving all internal network users access.
a. As a result, it is imperative that you take great care to mitigate risks to your Layer
2 infrastructure in your role as a network security administrator.
b. Do not forget to shut down all unused ports on layer 2 devices.
3. Peer network router disruptions and information spoofing or fabrication are two ways that
routing systems might be compromised. Generally speaking, spoofing routing information
can be used to trick or deceive other systems, launch a denial-of-service attack, or direct
traffic in a direction it wouldn't ordinarily go.
a. OSPF authentication between routers.

Page 2 of 3
CCEE 556L Networking Lab IV Spring 2023-2024

4. You have to include ACLs that limit traffic to and from the network: inside and outside
directions
5. Intrusion detection and prevention solutions for network devices and hosts.
a. When deploying IDS or IPS, it's necessary to understand the different types of IPS
systems, the role of signature categories, and the actions a Cisco IOS router can do
when an attack is detected.
6. Have you or someone you know ever been hacked on public Wi-Fi? It's shockingly simple
to do.
a. To address this issue, consider using VPNs and IP Security (IPsec). VPNs are
widely used by remote workers around the world. Personal VPNs are also available
for usage on public Wi-Fi networks.
7. How can networks be built to safeguard data resources and guarantee that network services
are supplied when needed, given the numerous risks to network security?
a. a. The configuration of devices to enable end-to-end secure communications is
defined by the network security infrastructure. There are as many different sizes of
networks as there are approaches to creating a safe network architecture.
Nonetheless, the network industry suggests certain standard designs—firewalls—
to achieve available and secure networks.
8. Dedicated firewall services are offered by a single device with the Cisco ASA with
FirePOWER Services family of products. These are next-generation firewall (NGFW)
systems that offer comprehensive protection against all types of attacks.
a. Because the ASA 5506-X is a widely used security appliance, having knowledge
and experience with it is highly valued in the job market. You can configure the
device's various functions, such as ACLs, DHCP, NAT, AAA, and service rules.
9. Lastly, you need to test your network in the event of an attack.

GOOD LUCK 

Page 3 of 3

You might also like