Network security design and implementation


Lab. Network security design and implementation Objectives. Step. Basic Router and Host Configurations. Step. Protect the Corporate Network. Step. Protect the DMZ Network. Step. Verify connectivity. Step. Defer spoofing. Step. Document the ACL. Show access list. Show ip interface.


Before implementation proposed solution should be verified in prototype network using Packet

Your task: Prepare prototype network lab as shown in scheme, configure Corporate router

applying proper ACL and verify configuration. Router configuration should be done on these steps.

b) Configure an extended access list to protect the corporate network. Protecting a corporate

a). Verify network reachability by pinging all systems and routers from each system.

b). Verify that the hosts have Web access to the Web Server.

  • Information technology Laboratory works
  • Microsoft Word 250 KB
  • 2021 m.
  • English
  • 3 pages (821 words)
  • College
  • Antanas
  • Network security design and implementation
    10 - 3 votes
Network security design and implementation. (March 1, 2021). https://documents.exchange/network-security-design-and-implementation/ Reviewed on 09:36, December 5 2021
×