Highlights
Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to evaluate student’s ability on working with the routers, firewalls and VPN tunnels and adopting those technologies in enterprise level networks.
The following ULOs are assessed in this assent assessment.
LO 1 Explain network security issues and develop a comprehensive network security policy to counter threats against information security
LO 2 Analyse and configure routers on the network perimeter with router software security features
LO 3 Evaluate and configure firewall protocols and features to perform basic security operations on a network
LO 4 Critically review the enterprise network requirements and configure site-to-site virtual private networks using standard router software features
LO 5 Analyse the enterprise security requirements and configure intrusion prevention systems
In this Assignment you are required to complete all the following parts:
Task 1: Configure Basic Device Settings:
• Configure host names as shown in the topology plus your student ID.
• Configure interface IP addresses as shown in the IP Addressing Table.
• Configure static and dynamic routing
Task 2: Configure Secure Router Administrative Access
• Configure encrypted passwords and a login banner.
• Configure the EXEC timeout value on console and VTY lines.
• Configure login failure rates and VTY login enhancements.
• Configure Secure Shell (SSH) access and disable Telnet.
• Configure local authentication, authorization, and accounting (AAA) user authentication.
• Secure the router against login attacks and secure the IOS image and the configuration file.
• Configure a router NTP server and router NTP clients.
• Configure router syslog reporting and a syslog server on a local host.
Task 3: Configure a Zone-Based Policy Firewall and Intrusion Prevention System
• Configure a Zone-Based Policy Firewall (ZPF) on an R3 using the CLI.
• Configure an intrusion prevention system (IPS) on an R3 using the CLI.
Task 4: Secure Network Switches
• Configure passwords and a login banner.
• Configure management VLAN access.
• Secure access ports.
• Protect against Spanning Tree Protocol (STP) attacks.
• Configure port security and disable unused ports.
Task 5: Configure ASA Basic Settings and Firewall
• Configure basic settings, passwords, date, and time.
• Configure the inside and outside VLAN interfaces.
• Configure port address translation (PAT) for the inside network.
• Configure a Dynamic Host Configuration Protocol (DHCP) server for the inside network.
• Configure administrative access via Telnet and SSH.
• Configure a static default route for the Adaptive Security Appliance (ASA).
• Configure Local AAA user authentication.
• Configure a DMZ with a static NAT and ACL.
• Verify address translation and firewall functionality.
Task 6: Configure a DMZ, Static NAT, and ACLs on an ASA
• Configure static NAT to the DMZ server using a network object.
• View the DMZ Access Rule (ACL) generated by ASDM.
• Test access to the DMZ server from the outside network.
Task 7: Configure ASA Clientless SSL VPN Remote Access Using ASDM
• Configure a remote access SSL VPN using the Cisco Adaptive Security Device Manager (ASDM).
• Verify SSL VPN access to the portal.
Task 8: Configure a Site-to-Site VPN between the ASA and R3
• Configure an IPsec site-to-site VPN between the ASA and R3-S0000 using ASDM and the CLI.
• Activate and verify the IPsec site-to-site VPN tunnel between the ASA and R3.
This IT/Computer Science Assignment has been solved by our IT/Computer Science Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.