Answershould be original, and similarity (plagiarism)not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and shouldbe clear understanding...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understanding (2000 words).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:


Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)


Author: Anderson, R.


ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526


Publisher: John Wiley & Sons



Book available from below link:



http://www.cl.cam.ac.uk/~rja14/book.html




Assignment is:


Design the layout of users, domains, trusted domains, anonymous users, etc for a start-up open source software company ABC. They should have an internal CVS server (only internal developers can access it), an anonymous CVS server for outsiders to download source code, a WWW server (one for internal and one for external) and an internal mail server. It is crucial that outsiders should not be able to access either internal CVS or internal WWW servers.


The design should be provide below requirements:


1. The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.
2. The assumptions that you make for your design and the security policy to achieve this assumption.


3. Trust assumptions about users (e.g., who could be root, what a root could do). You do not need to create specific users, but you need to give a classification about users according to their

Answered Same DayDec 29, 2021

Answer To: Answershould be original, and similarity (plagiarism)not more than 10% this is very important...

Robert answered on Dec 29 2021
125 Votes
The report is based upon the design requirements including layout of users, domains,
trusted domains, anonymous users, etc. for ABC Software Company.
The ABC Company is a new open source startup software company. The company
has various public and internal servers, which needs to be implemented in the
network. Different security policies should
also be implemented on the edge firewall
in order to make the network more secure. The access to the users is managed with
the help of domain controller and active directory server.
The main focus of this report would be on providing a topology diagram for the
current scenario and applying various security policies on the incoming and outgoing
traffic. Different user groups will be created which will help in providing access to
users depending upon their positions and requirements.
Various access lists will also be configured to manage access of different users
depending on their role and authority.
Topology Diagram
The suggested topology diagram for the given requirements is as following
The connection from the Internet (ISP) terminates on the outside interface of the
firewall. The firewall is configured with three zones namely: Outside, Inside and
DMZ zone.
 Outside Zone: the outside zone is considered to be the least secured and is
kept at the security level of 0. The firewall does not trust any traffic coming
ingress to the firewall from this zone. Ex Internet.
 Inside Zone: This zone is at a security level of 100 and is the most trusted
zone of the firewall, any traffic going out from this zone is allowed by default
and also the return traffic is allowed by the firewall as it maintains the state of
the outgoing traffic. The LAN devices and internal servers are configured in
this zone.
 DMZ: It is a De-Militarized Zone having a security level generally of 50 lying
between inside and outside zone. It is considered more secured than outside
zone but less secured than inside zone. Public servers are placed in this zone.
Firewall allows traffic from higher security level from low security level by default,
where as any traffic from low security level to high security level is denied by default.
The firewall is placed at the edge of the network so that any incoming traffic is
monitored before entering the LAN.
The two public servers i.e. WWW and CVS are placed in the DMZ zone. A switch is
connected to the DMZ interface of the firewall to which the public servers are
connected, the outside users have access to these public servers but not the internal
network. Access Control Lists (ACL) is defined on the firewall to allow access from
outside users to the public servers.
The internal servers and the LAN networks are in the inside zone. A switch connected
to the inside zone distribute the connection to the local host and the internal servers.
The link between the two switches in the Inside zone is configured as a trunk link
which is capable of carrying multiple VLAN information. The internal servers can
only be accessed by the inside users as per the security policies of the firewall.
Internal servers are configured in a separate subnet segregated by a VLAN, use of
VLAN’s for segregation of data traffic helps in easier management of the internal
network and also reduces the broadcast traffic by defining a separate broadcast
domain for the particular VLAN. The LAN devices are configured in a separate
VLAN. The firewall being an advanced firewall (CISCO ASA)...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here