Advance Network Security 2024
Advance Network Security 2024
SEC3014
SEC3014 Advance Network Security Assignment
Assignment
Instructions:
This group assignment carries 100% of your total module assessment marks, with 60% of the total contributed
by an individual component. A group consist of maximum 5 students. (Minimum 4 students). The total word
count of the report should not exceed 5000 words. No marks will be awarded for the entire assignment if any
part of it is found to be copied directly from printed materials or from another group. All submissions should
be made on or before the due date. Any late submissions after the deadline will not be entertained. Zero (0)
mark will be awarded for late submission, unless extenuating circumstances are upheld.
Scenario:
Company A is food manufacturer based in Kuala Lumpur. Its office consists of 3 departments: Sales,
Engineering and Finance. It has a Sales office in Singapore located 350km away from Kuala Lumpur and hosts
50 employees. The following topology illustrates the network architecture and topology of the Kuala Lumpur
office of Company-A and Singapore Company-B.
The Kuala Lumpur office has simple network architecture. Clients’ workstations are connected to an access
switch, then connected to a distributed switch and then to the routers inside interface. The firewall outside
interface connects directly to the internet service provider (ISP) router. The ISP completely manages this router,
and the company-A has no control over it. A third interface on the firewall hosts a demilitarized zone (DMZ)
hosting several servers. These servers include web, email, and FTP applications.
The goal is to protect the internal and DMZ hosts from external threats. As a network security specialist, you
are required to provide a security solution for company-A and company-B. All your configuration using ipv6
and ipv4.
There are some requirements in the above scenario that must be considered in this security design.
1. Client workstations (sales, engineering and finance) must be able to access the web server at the DMZ
over HTTP and HTTPS. The web server should be reachable from the external clients over HTTP and
HTTPS only. (Solution and configuration)
SEC3014 Advance Network Security Assignment
2. Clients should also be able to put and get files via FTP to the same server. The company requires
implementing FTP with user and password is essential for each transaction. (Solution and
configuration.)
3. Engineering and sales workstations must be able to access the Internet (to reach company B) over
HTTP and HTTPS with DNS. No other protocol access is allowed to the Internet. (Solution and
configuration.)
4. Client workstations must be able to check their e-mail on the e-mail server at the DMZ. (Solution and
configuration.)
5. The e-mail server should be able to receive e-mail from external hosts over the simple mail transfer
protocol (SMTP). (Solution.)
6. No client from sales, engineering and finance department is able to access clients in the other
departments. (Solution and configuration.)
7. Layer two securities is a requirement in the company-A LAN. (Solution and configuration.)
8. Bastion host works as an application proxy. You are required to explain the solution in detail.
(Configuration is not required.)
10. Data transmitted over the network must be kept disguised and only intended recipient can read it.
Hackers are unable to understand the content even they are able to wiretap the communication.
(Solution on the techniques, no configuration is required)
11. The company requires implementing intrusion detection systems (IPS). (No Configuration is required.)
12. Implement VPN (Tunneling) between Singapore and Kuala Lumpur. (Configuration is required.)
13. Implement IpSec encryption between Singapore and Kuala Lumpur. (Solution)
14. Implement AAA (Authentication, Authorization and Accounting) for K.L network (Configuration)
Note: The “solution” in the parenthesis means that you must recommend what should be done in order
to fulfil the company’s requirement. In this case, you do not have to configure any of the device(s) in
the topology. The “configuration” in the parenthesis means that, in addition to the solution that you
provide, you have to implement it by configuring the appropriate device with commands and setups. b
SEC3014 Advance Network Security Assignment
In your document the report is to be written in a professional manner, paying due regard to the following
aspects:
1 inch 1 inch
1 inch
1 inch
1 inch
1 inch 1 inch
Every report must have a front cover. A transparent plastic sheet can be placed in front of the report to
protect the front cover. The front cover should have the following details:
o Name
o Intake code.
SEC3014 Advance Network Security Assignment
o Subject.
o Project Title.
o Date Assigned (the date the report was handed out).
o Date Completed (the date the report is due to be handed in).
Submission requirements
A softcopy containing an electronic version of the document and video presentation via terms (15 minutes) of
group member. The total word count of the main body of the document (excluding title & contents pages) is to
be in the region of 5000 words.
Marking Table
Please note that during the preparation of your assignment, you must include the following marking table.
Ensure you fill in the details of your team members’ full names and their respective student IDs.
The marking table must be placed on a single page, located as either the second or third page of your final
assignment documentation. Each team member’s name must only appear once. The schedule for the
presentation will be announced in due time.
Assessment Criteria:
SEC3014 Advance Network Security Assignment
Poor research Very brief Research and Well research Very well
and research and investigation and analysis and
investigation of investigation of are done but investigation is investigation of
the problem. the problem. not in depth. done. Good the problem.
Poor Poor evaluation Appropriate evaluation of Outstanding
evaluation of of the evaluation of the evaluation of
the requirement. the requirements the
requirement. requirements with proper requirements
Network with proper reasoning with with proper
Design reasoning with proper project reasoning.
proper project planning and Outstanding
planning and management. project planning
management. and
management
with the
screenshots of
used tools.
Practical Poor in basic Not able to Able to apply Able to apply Able to apply
Demonstrati knowledge apply new idea new idea on new idea or new idea or
on (30 or knowledge to knowledge to a knowledge to a knowledge to a
marks) a given problem given problem given problem given problem
with assistance and but unable and able to
from lecturer to propose propose
or student
alternative alternative
applications applications
Technical Poor in basic Not able to Able to apply Able to apply Able to apply
Configuratio knowledge apply new idea new idea on new idea or new idea or
n (30 marks) or knowledge to knowledge to a knowledge to a knowledge to a
a given problem given problem given problem given problem
with assistance and but unable and able to
from lecturer to propose propose
or student
alternative alternative
applications applications
Total Marks