Professional Documents
Culture Documents
CCEE 556L-Project Instructions-Spring 2024
CCEE 556L-Project Instructions-Spring 2024
CCEE 556L-Project Instructions-Spring 2024
Project Introduction:
This project consists of implementing a network using CISCO Packet Tracer, involving current
technologies in computer networks and network security. You have to follow the coming
instructions while proceeding with your project.
Project Guidelines:
Follow the below guidelines so you can be ready working smoothly during your project’s
workflow.
1. Understand your assignment very well, so you do not have to repeat your tasks often.
2. Make a preliminary research about the subject’s areas.
3. Read ALL Network Security Modules on Netacad.com, especially Modules 11->12, 18-
>22 as they are the main subjects involved in this project.
4. Follow the network architecture and implementation needs to know exactly what to
implement in your topology.
You are the network designer for the XYZ firm. While implementing the network logical topology,
you must verify that all devices are protected and message exchange is safe. Thus, a paradigm shift
in networking architecture is essential to fight against rapidly changing assaults. In your security
system plan, you must safeguard all network devices and hosts.
Page 1 of 3
CCEE 556L Networking Lab IV Spring 2023-2024
Network Topology
Security Fields
Page 2 of 3
CCEE 556L Networking Lab IV Spring 2023-2024
4. You have to include ACLs that limit traffic to and from the network: inside and outside
directions
5. Intrusion detection and prevention solutions for network devices and hosts.
a. When deploying IDS or IPS, it's necessary to understand the different types of IPS
systems, the role of signature categories, and the actions a Cisco IOS router can do
when an attack is detected.
6. Have you or someone you know ever been hacked on public Wi-Fi? It's shockingly simple
to do.
a. To address this issue, consider using VPNs and IP Security (IPsec). VPNs are
widely used by remote workers around the world. Personal VPNs are also available
for usage on public Wi-Fi networks.
7. How can networks be built to safeguard data resources and guarantee that network services
are supplied when needed, given the numerous risks to network security?
a. a. The configuration of devices to enable end-to-end secure communications is
defined by the network security infrastructure. There are as many different sizes of
networks as there are approaches to creating a safe network architecture.
Nonetheless, the network industry suggests certain standard designs—firewalls—
to achieve available and secure networks.
8. Dedicated firewall services are offered by a single device with the Cisco ASA with
FirePOWER Services family of products. These are next-generation firewall (NGFW)
systems that offer comprehensive protection against all types of attacks.
a. Because the ASA 5506-X is a widely used security appliance, having knowledge
and experience with it is highly valued in the job market. You can configure the
device's various functions, such as ACLs, DHCP, NAT, AAA, and service rules.
9. Lastly, you need to test your network in the event of an attack.
GOOD LUCK
Page 3 of 3