Network Plan for ABC Corp Essay

Download this Essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Essay:



The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers.

Extended Access Control Lists for ABC Corporation using Port Numbers

access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20

access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21

access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22

access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25

access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35

access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18

access-list 101 permit tcp 172.16.5.35/16. 0.0.0.255 any eq19

access-list 101 permit tcp 172.16.0.0/16. 0.0.0.255 any eq39

access-list 101 deny tcp 172.16.0.254/16. 0.0.0.255 any eq26

access-list 101 deny tcp 172.16.5.35/16 . 0.0.0.255 any eq23

Further steps is the configuration of ACL for ABC Corporation. Configuration of Extended Access Control list is critical for the protection of network infrastructures of ABC Corporation.

Configuration of Extended Access Control Lists for ABC Corporation using Port Numbers.

The following commands are used for the configuration of Extended Access Control List for the ABC Corporation network infrastructure.:

R1(config)#access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20

R1(config)#access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21

R1(config)#access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22

R1(config)#access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25

R1(config)#access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35

R1(config)#access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18

R1(config)#access-list 101 permit tcp 172.16.5.35/16. 0.0.0.255 any eq19

R1(config)#access-list 101 permit tcp 172.16.0.0/16. 0.0.0.255 any eq39

R1(config)#access-list 101 deny tcp 172.16.0.254/16. 0.0.0.255 any eq26

R1(config)#access-list 101 deny tcp 172.16.5.35/16 . 0.0.0.255 any eq23

Based on the configuration of the ACL for ABC Corporation, the paper re-creates the diagram.

Fig 2: Re-create of ACL Diagram for ABC Corporation

With the ACL commands, the paper recreates the diagram, and creates filtering rules for the router to follow. From the diagram in Fig 2, router will filter all hosts 172.16.5.35 from getting access onto the Internet. When host 172.16.5.35 attempts to get access into the internet, the ACL commands will prevent host 172.16.5.35 from getting access. This is very important because some malicious users may want to get access to the internet using these devices. By creating the ACL filtering rules, the host 172.16.5.35 will not be able to get access to the ABC Corporation.

Additional filtering rules that will be implemented based on Fig 2 are that the router will deny all other traffic to get access to 172.16.5.3.0. The router will serve as a guard to prevent other network from getting access to 172.16.5.3.0. In these devices, when a packet arrives onto the network router, and based on the filtering rules, the packet will extract information from the packet and the router will make decision whether to pass the information into the network or deny the information. Based on the filtering rules created, the router will deny other network traffic from getting access to the 172.16.5.3.0.

More importantly, the router will not allow outside traffic to ping telnet and ftp. This is very important for security reason because Telnet does not encrypt the data that come from other network. Thus, it is practical for eavesdropper to extract information from the network if allowing outside traffic to get access to the network. Moreover, there is no authentication that would ensure that there is no interception when the communication is being carried out over the network. Based on the shortcoming of the Telnet, it is very critical for ABC Corporation not to allow outside network from getting access to the Telnet.

Additionally, part of the filtering rules is not to allow outside network to get access to the File Transfer Control (FTP). Typically, FTP is a standard network protocol that is used to transfer files over the network. While FTP may have security devices such as authentication, there are still security loopholes identified with FTP based on the sophisticated method that malicious users tamper with network protocol. Typically, the FTP infrastructure is not designed with security to protect itself against sophisticated it hackers. Thus, FTP could face series of vulnerable problems such as Spoof attacks, Bounce attacks, Port stealing, brute force attacks, and Packet capture sniffing. Based on the security vulnerability of Telnet and FTP, the ACL will not allow outside network to get access to the Telnet and FTP.

To enhance greater understanding on the importance of access control lists, the paper provides justification of ACL for ABC Corporation.

Justification of Access Control Lists for ABC Corporation

In the contemporary business environment, various malicious users attempt to get access to the organizational network infrastructure to steal valuable information. Typically, many of these malicious users tampers with the network devices of organization in order to steal valuable information through several technique such as sniffing, eavesdropping and other malicious technique. ACL has been identified as an effective security device. ABC Corporation could enjoy several benefits from using ACL for the company network security.

First, ACL will prevent ABC Corporation from ISL tagging attack. Malicious users often tagging attacks to get access onto the network. For example, an attacker could send fake DTP onto the network in order to get access. ACL is very effective to prevent this sort of attack into the network by preventing such attack getting into the network. Moreover, ACL could prevent organization from brute force attack. Malicious user tries to exploit switch potential vulnerability to get access into the network. The attack could use attack such as bugs to attack the network. With ACL in place, this type of attack will be ineffective on to the company network.

More importantly, ACL will prevent ABC organization from flooding attack. This type of attack is to send flood of traffic onto the network in order to sniff information from the organizational network. There are several programs to perform this type of malicious acts and when attackers identify weakness in the network, they use flooding attack to exploit the network devices. Typically, an attacker could use this attack to impersonate permitted network. To protect network infrastructure against this sort of attack, ACL will be very effective to prevent this type of attack from occurring onto the company network.

Conclusion

The technical paper provides a security plan that ABC Corporation could employ to protect network infrastructure. ABC Organization has just installed a new router onto the network, and since malicious user often attack network infrastructure from the router, the proposal provides security plan to enhance adequate security for the organizational network. To implement effective security for the ABC organization, Access Control Lists are used for the…[continue]

Cite This Essay:

"Network Plan For ABC Corp" (2012, March 12) Retrieved December 8, 2016, from http://www.paperdue.com/essay/network-plan-for-abc-corp-54972

"Network Plan For ABC Corp" 12 March 2012. Web.8 December. 2016. <http://www.paperdue.com/essay/network-plan-for-abc-corp-54972>

"Network Plan For ABC Corp", 12 March 2012, Accessed.8 December. 2016, http://www.paperdue.com/essay/network-plan-for-abc-corp-54972

Other Documents Pertaining To This Topic

  • Marketing Strategies the Marketing Plan

    The difference in country's economic condition makes Coca Cola to fix difference prices for the same product across different countries. 3.2: Integrating Pricing strategy with branding strategy ATC will use a unique brand position to ensure that customer accept prices fixed for its product and services, and the company will use differentiation strategy to make customer accept the prices fixed for its product. By creating a strong brand position, ATC will

  • Organization Applicability Activity Based Costing Abc Cisco Corporation...

    organization applicability Activity-Based Costing (ABC). CISCO Corporation. Identify a product service organization ABC. You technique selling administrative costs. Then identify activities ABC cost drivers activities. Activity-Based Costing at Cisco Cisco Systems is one of the largest global corporations. It is headquartered in San Jose, California, and it employs over 70,000 individuals. The organization manufactures consumer electronic goods, as well as other types of product and services, such as the networking or

  • Internal Control and Accounting Analysis of ABC

    Internal Control and Accounting Analysis of ABC Limited: Analysis of Weaknesses and Recommendations The report was prepared to cover the requirements of the AAT ICAS unit. The AAT ICAS refers to an Internal Control and Accounting System where the report serves as investigation of the weakness area of the business control and makes the recommendation to fix this problem. The following report reviews the restaurant business particular in payroll area. The

  • Marketing Plan Aimed at Launching

    On one hand, this may alter the consumers' trust in the company's products which are perceived as intangible compared with those goods that can be purchased from the shelves of specialized stores. On the other hand, resorting to intermediaries implies paying a certain commission which results in higher prices for the respective products. Moreover, the success of selling through indirect channels depends, to a great extent, on the distributors'

  • Strategic Plan for AOL

    Strategic Plan for AOL What is the meaning of progress? In general it means that the group of individuals or organization is being able to keep pace with the changes that keep coming in with time. AOL was a very large and important unit in the Internet services before the broadband access concepts came in. Today, their technology is backdated and they are trying to come in with new technology. At

  • Communications Markets and Media Broadcasting

    ] Younger people (18- to 34-year-olds) are much more likely to view television news as mainly interested in serving the public interest (57.5% vs. 46.7%). Creating a local brand and attracting the most viewers is the name of the game in the battle for ratings and revenues. The local newscast defines the image of the station, and now more than ever local stations need up-to-date newscasts to keep audiences tuned in.

  • Marketing Segmentation and Product Positioning

    The company will also offer training service for small and home businesses. ATC will achieve strategic positioning by delivering value proposition for its product and services. ATC will use packaging, brand name, styling, quality, and safety to position its products. The company will use cost advantages to compete in distinctive way. Price: ATC will offer its product and services at industry average price. The company will not offer its products


Read Full Essay
Copyright 2016 . All Rights Reserved