A company has been using SSH for secure communication between HQ and employees when they are not at the work place. The employees using SSH are usually Advance users who know how to securely stablish connection with the servers’ company however, it is not a good solution for regular or unexperienced users. The company is a small family business with only 20 employees which usually share account details to access the company’s system. Even though the company do not follow many of the security standards recommended to protect the company’s data everything has been ok so far. However, things are changing, and the company has had a significant growth over the past months and has decided to hire more people to cope with the demand, which means new security features must be implemented.
The company is interested in allowing some of their current and new employees to work from home to save expenses on infrastructure and implement a new more dynamic business approach. However, there are concerns on how much security needs to be implemented especially in the communication channel between the company and its employees since some of the data handled is quite sensitive (passwords, credit cards numbers, emails, etc.). In addition, they are interested on implementing a more secure WLAN network for their employees and guest. The current network consists of one router (provided by the ISP) and 10 Desktops plus wireless devices
I need to design and implement a new security plan, which must include, policies, a new enterprise network (LAN AND WLAN, Use Cisco Unified Architecture), a new alternative for the current SSH connection, secure guest access to the network, and authentication services.
Use CPT 7.3.1 for your implementation. Design and deploy a Cisco Wireless Unified Architecture which must support Redundancy, and other security measure such as privacy and authentication. Your solution must include a Firewall (ASA 5505), a DMZ, WLC (2504) with light weight AP, a RADIUS server for guest authentication, WLAN with at least two subnets one for employees and one for guest, a level 3 switches (3650), secure access for customers from outside the network. Provide email and web services for the internal network.
Produce a report addressing the following:
1. Produce a plan with security solution implementation for future growth, redundancy and security needs.
2. Network design
3. Description of Hardware and Software
4. Configuration Details (take screenshot of the process and make relevant comments as discussed in class. Also do not use #showrun command for this step. You may use it in step 10 “Testing and Outcomes”) in each screenshot explain to configuration
5. Hardening techniques applied
6. Testing and Outcomes
7.Review of implemented features
attached topology, don’t hesitate in make change
Such a cheap price for your free time and healthy sleep
All online transactions are done using all major Credit Cards or Electronic Check through PayPal. These are safe, secure, and efficient online payment methods.