NWSAssignment Coppa - 022021 16022021
NWSAssignment Coppa - 022021 16022021
LEARNING OUTCOMES:
CLO2: Propose a network that demonstrates a working IP configuration for an organisation. (A5,
PLO4)
CLO3: Build a secure network by integrating layer 2 security, layer 3 security, Virtual Private
Network or firewall technologies using appropriate simulation tool. (P3, PLO3)
This assignment consists of TWO (2) sections: Section A and Section B. Section A is group that
contributes 20% of total 50% while Section B is the remaining 30%.
Instructions:
This group assignment carries 50% of your total module assessment marks [Group Assignment], with
60% of the total contributed by an individual component and 40% by group components. A group consist
of maximum 4 students. (Minimum 2 students). The total word count of the report should not exceed
5000 words. No marks will be awarded for the entire assignment if any part of it is found to be copied
directly from printed materials or from another group. All submissions should be made on or before the
due date. Any late submissions after the deadline will not be entertained. Zero (0) mark will be awarded
for late submission, unless extenuating circumstances are upheld.
Scenario:
ALU Sdn. Bhd. is processor manufacturing company based in Penang. Its headquarter office in Penang
consists of 3 departments: Sales, Engineering and Finance. It has a branch company in Bangkok, Thailand
located 250km away from Penang and hosts 150 employees. Only R&D and Delivery departments are
located there. The following topology illustrates the network architecture and topology of the Penang HQ
and its branch in Bangkok for ALU Sdn. Bhd.
The Penang HQ has simple network architecture. Clients workstations are connected to an access switch,
distributed switch and the router’s internal interface as shown in figure 1. The firewall’s external interface
connects directly to the internet service provider (ISP) router. The ISP completely manages this router
and the ALU Sdn. Bhd. has no control over it. A third interface on the firewall hosts a demilitarised zone
(DMZ) hosting several servers. These servers include web, email and FTP applications.
a) In a group, design and configure basic network requirements based on network diagram given using
packet tracer. Phase 1 – Presentation – Group Assessment – Week 8 [12 th April 2021 – 16th April
2021]
a) The goal is to protect the internal and DMZ hosts from external threats. As a network security
specialist, each of you are required to provide a security solution for Penang HQ and Bangkok Branch
office.
There are some requirements in the above scenario that must be considered in this security design.
1. Client workstations (sales, engineering, finance, R&D and delivery) must be able to access the
web server at the DMZ over HTTP and HTTPS. The web server should be reachable from the
external clients over HTTP and HTTPS only. (Solution and configuration)
2. Clients should also be able to put and get files via FTP to the same server. The company requires
implementing FTP with user and password is essential for each transaction. (Solution and
configuration.)
3. Engineering, finance and sales workstations must be able to access the Internet (to reach the
branch company) over ICMP, HTTP and HTTPS with DNS. No other protocol access is allowed
to the Internet. (Solution and configuration.)
4. Client workstations must be able to check their e-mail on the e-mail server at the DMZ. (Solution
and configuration.)
5. The e-mail server should be able to receive e-mail from external hosts over the simple mail
transfer protocol (SMTP). (Solution.).
6. VLAN technology is mandatory to be implemented in all sub networks. Management and Native
VLAN are required for deployment. Implement secured VLAN is mandatory. (Solution and
configuration.)
7. No client from sales, engineering and finance department can access clients in the other
departments. (Solution and configuration.)
8. Explain any THREE types of layer two attacks. Implement layer two securities as a requirement
in the company LAN. (Solution and configuration.)
9. Bastion host works as an application proxy. You are required to explain the solution in detail.
(Configuration is not required.).
10. Connectivity between HQ in Penang and branch office in Bangkok is a requirement. What is the
best solution? Elaborate on the solution. (Configuration is not required).
11. Data transmitted over the network must be kept disguised and only intended recipient can read it.
Hackers are unable to understand the content even they can wiretap the communication. (Solution
on the techniques, no configuration is required)
12. The company requires implementing intrusion detection systems (IDS). (No Configuration is
required.)
13. Implement VPN between Penang and Bangkok network. (Configuration is required.)
b) Presentation on the proposed solution. Students must demonstrate their project using packet tracer to
show all the requirements are fulfilled. Phase 2 – Presentation – Individual Assessment – Week 13
[17th May 2021 – 21st May 2021]
Note: The “solution” in the parenthesis means that, you have to recommend, what should be done in order
to fulfil the company’s requirement. In this case, you do not have to configure any of the device(s) in the
topology. The “configuration” in the parenthesis means that, in addition to the solution that you provide,
you have to implement it by configuring the appropriate device with commands and setups.
Document the results of your work in a professional and systematic manner, in the form of a
computerized report. One (1) softcopy of your documentation is to be submitted.
In your document the report is to be written in a professional manner, paying due regard to the following
aspects:
The report is to be written in the 3rd person.
The report should have a consistent layout and be divided into enumerated sections, sub-sections,
sub-sub sections etc.
The report should be fully referenced using the University standard.
Your report must be typed using Microsoft Word with Times New Roman font and size 12. Expected
length is 5,000 words (excluding diagrams, appendixes, and references). You need use to include a
word count at the end of the report and it should be in 1.5 spaces.
Submission of reports that are unprofessional in its outlook (dirty, disorganised, inconsistent look,
varying coloured paper and size) will not fare well when marks are allocated.
Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper.
The report should have a one (1”) margin all around the page as illustrated below:
1 inch 1 inch
1 inch
1 inch
1 inch
1 inch 1 inch
Every report must have a front cover. A transparent plastic sheet can be placed in front of the report
to protect the front cover. The front cover should have the following details:
o Name
o Intake code.
o Subject.
o Project Title.
o Date Assigned (the date the report was handed out).
o Date Completed (the date the report is due to be handed in).
Submission requirements
An online submission through Moodle is required for this module for both individual and group sections.
The total word count of the main body of the document (excluding title & contents pages) is to be in the
region of 5000 words. Submission of report Week 12 [15th May 2021]
Assessment Criteria:
Individual:
Switch configuration 10
Router 10
Configuration
VPN configuration 15
ACL 15
Presentation 10
Total Marks 60
Group:
Leadership and 5
Teamwork
Workload Distribution 5
Network Design 15
IP Configuration 15
Total Marks 40
Marking 1 2 3 4 5
Criteria (Fail) (Marginal Fail) (Pass) (Credit) (Distinction) Weightage
Marking 1 2 3 4 5
Criteria (Fail) (Marginal Fail) (Pass) (Credit) (Distinction) Weightage