please find the attached document.
Description of the initial setup and requirements The IT team of Acme Inc. startup company has designed a network infrastructure for the company as depicted on Diagram 1. Your role as Security Architecture team is to provide detailed security architecture requirements that will protect the sensitive internal infrastructure, as well as the access to the company’s public resources in the DMZ. For this purpose, you have a Linux-based gateway (with full Netfilter kernel support) with three ethernet interfaces. The network infrastructure has the following details:  Linux Gateway with three ethernet interfaces: eth0: 192.168.0.1 (attached to the internal LAN:192.168.0.0/24); eth1: 192.168.10.1 (attached to the DMZ segment: 192.168.10.0/24) and eth2:3.3.3.3 (attached to the ISP provider network with default GW: 3.3.3.1).  Web Server: 192.168.10.2, running Apache on ports 80 and 443.  Mail server:192.168.10.3, listening on TCP/25.  DNS server: 192.168.10.4, listening on UDP/53.  Internal HTTP Caching Proxy: 192.168.0.2, listening on TCP/8080.  Internal workstations: 192.168.0.3-254. The Security Architecture team needs to provide the security requirements for the firewall, based on Linux Netfilter, i.e. the detailed policies and rules that should secure the environment and provide least privilege access to all company resources, at the same time fulfilling the functional requirements. 2 Please define the best security strategy and iptables implementation, following these functional requirements:  External entities on the internet need to access the company HTTP and HTTPS pages, as well as to be able to query company’s pubic DNS server and be able to send email to the public email server.  Due to the capacity limitations of the ISP pipeline and also the security policy, which requires content filtering in place for that access, the company wants to utilize the caching and content filtering services of the HTTP proxy they have. Due to the variety and dynamic nature of internal clients, the proxy needs to be transparent.  The company has only one system administrator for managing the servers in the DMZ. Their admin workstation has IP:192.168.0.20. The sysadmin tools to manage the servers in the DMZ are SSH client and SNMP monitoring application.  Due to the specific job responsibilities of the system administrator, they are allowed to access the internet directly as the only exception from the transparent proxy policy. Web Server 192.168.10.2 Mail Server 192.168.10.3 DNS Server 192.168.10.4 HTTP Cache 192.168.0.2 Internet Internal Clients 192.168.0.3-254 Interface eth1: 192.168.10.1 netmask 255.255.255.0 Interface eth0: 192.168.0.1 netmask 255.255.255.0 Interface eth2: 3.3.3.3 Default gateway: 3.3.3.1 Sysadmin Workstation 192.168.0.20 Diagram 1. Detailed Network Infrastructure of Acme Inc. 3 Term Project Report Guidelines Each term project will result in a detailed written report, signed by each member of the group to certify their participation and understanding. Only members who actively participated in the work should sign the report. The report must include the meeting minutes as an appendix. The meeting minutes should document clearly which team members were responsible for which tasks. The deadline for submitting the final report in soft copy is stated in the assignment’s due dates. The report should be organized as you would organize a paper. It should be written in IEEE Proceedings Manuscripts style: two columns, single-spaced. You may find a template file at URL: http://www.ieee.org/web/publications/authors/transjnl/index.htm1. The entire report should be no more than six pages, including all figures, equations, references, tables, and text (but excluding the meeting minutes). Please use the standard 8 ½ by 11 paper. The project report should be neat, readable, and self-contained. Any class member should be able to understand the report, and benefit from the results you obtain. Therefore, you should include adequate references and background materials. Also, using figures, diagrams, tables may be a better way to enhance the readers’ comprehension of your project. Each figure, graph, and table must be directly referenced in the text. Note that plagiarism is using the materials (ideas/words) of another as one’s own and without crediting the source. This behavior is prohibited. So, take the time to properly cite materials written by someone else – include reference. If you have any question about this, ask the instructor or refer to Student Handbook. The following format is suggested for writing the report. While you do not have to follow this outline exactly, all of these elements must be included in your final report. Requirement 1. A descriptive title, your names, course number, and term under the title. 2. A 200-300 word abstract clearly summarizing the problem you investigated, why this is an interesting problem, your methodology, the main results you obtained, any important problems or difficulties encountered in the project, and a summary of your main results and conclusions. 3. An introduction precisely stating the problem and explaining why what you’ve done is important and interesting. It also should include the background necessary to understand the report. 4 4. A summary of previous work in this area, along with an explanation that places your project in the context of what has been done before (i.e. what is different and similar about what you have done compared to what has been done before). You must supply citations within the paper to the previous work you summarized in your annotated bibliography, plus any additional papers you think should be included. 5. A thorough description of your methodology. 6. An explanation and interpretation of your results. 7. A conclusion summarizing what you have done and what it means in a broader context. 8. Recommendations for future work and unsolved problems (if applicable) 9. References 10. Appendices: include meeting minutes and other supporting materials as needed

ATTACHMENTS

network_sec_midterm_assignment.pdf
Get professional assignment help cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why choose our academic writing service?

Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently

 

Get Professional Assignment Help Cheaply

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor’s, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why Choose Our Academic Writing Service?

Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently

How It Works
1.      Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2.      Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3.      Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4.      Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

 

PLACE THIS ORDER OR A SIMILAR ORDER WITH Essay fount TODAY AND GET AN AMAZING DISCOUNT

The post The role of Security Architecture team appeared first on Essay fount.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"