Firewall Selection and Placement for Corporation Techs Network

Firewall Selection and PlacementScenarioThe senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.TasksFor this part of the project, perform the following tasks:
1.Research and select firewalls for the Corporation Techs network.a.Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.b.Address network, server, and workstation firewalls.
2.Describe a plan for creating a DMZ, and explain how it makes the network more secure.
3.Research network authentication and create a high-level plan for secure authentication to internal network resources.
4.Create a draft report detailing all information as supportive documentation.
5.Cite sources, where appropriate.

find the cost of your paper

Sample Answer

 

 

 

Firewall Selection and Placement for Corporation Techs Network

1. Firewall Selection

a. Firewall Selection and Placement

1. Network Firewall: Palo Alto Networks PA-Series

– Why: Palo Alto Networks is known for its advanced threat prevention capabilities, application visibility, and control features. The PA-Series offers next-generation firewall security, including intrusion prevention, SSL decryption, and URL filtering.
– Placement: The network firewall should be placed at the perimeter of the network to inspect all incoming and outgoing traffic, providing a secure barrier between the internal network and external threats.

2. Server Firewall: Sophos XG Firewall

– Why: Sophos XG Firewall provides comprehensive protection for servers with features like IPS, ATP, sandboxing, and application control. It offers granular control over server traffic and application usage.
– Placement: The server firewall should be deployed on each server to protect them from targeted attacks and unauthorized access.

3. Workstation Firewall: Windows Defender Firewall

– Why: Windows Defender Firewall is a built-in solution that provides basic inbound and outbound traffic filtering for workstations. It offers essential protection against network-based threats.
– Placement: The workstation firewall should be enabled on all workstations to control traffic flow and block malicious activities.

2. Creating a DMZ

Plan for DMZ Implementation

– DMZ Purpose: A DMZ is a network segment that isolates publicly accessible services from the internal network. It enhances security by adding an additional layer of protection against external threats.
– Implementation Steps:1. Identify services to be placed in the DMZ, such as web servers, email servers, or FTP servers.
2. Deploy a separate subnet for the DMZ with restricted access from both the internal and external networks.
3. Implement firewall rules to control traffic flow between the DMZ and internal network, allowing only necessary communication.
4. Monitor and regularly update security policies for the DMZ to maintain a secure environment.

3. Network Authentication Plan

Secure Authentication Plan

– Implementation Steps:1. Implement multi-factor authentication (MFA) for all users accessing internal network resources.
2. Utilize strong password policies, including regular password changes and complexity requirements.
3. Employ user access controls based on roles and least privilege principles to limit unauthorized access.
4. Monitor authentication logs and perform regular audits to detect and respond to suspicious activities promptly.

4. Draft Report

Report Summary

The proposed security enhancements for Corporation Techs network include upgrading firewalls, implementing a DMZ for service isolation, and enhancing network authentication mechanisms. These measures aim to strengthen network security, protect critical assets, and mitigate cybersecurity risks effectively.

5. Sources

– Palo Alto Networks. (n.d.). Next-Generation Firewalls by Palo Alto Networks. https://www.paloaltonetworks.com/network-security/next-generation-firewall
– Sophos. (n.d.). XG Firewall Features. https://www.sophos.com/en-us/products/next-gen-firewall/features.aspx
– Microsoft. (n.d.). Windows Defender Firewall with Advanced Security overview. https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security-overview

 

 

This question has been answered.

Get Answer