Creating A Firewall

  Almost all of us have some type of Ethernet network at home. Usually, the Internet service provider (ISP) installs a gateway to the Internet at your house, and your network connects to the gateway using a home router. The TCP/IP stack of your intranet computers are configured to use the ISP router as a gateway to the Internet. Many of us also use Wireless Ethernet (IEEE 802.11 standard) to connect to the Internet. . For this interactive assignment, assess your current home network. (If you do not currently have a home network, you may consider your work network for this assessment.) In a separate document, create a diagram that illustrates your intranet setup and your Internet connection. Consider the potential vulnerabilities of your current network setup as well as your digital resources. Create a second diagram in your document that illustrates an ideal network, including firewall(s) and other controls that would protect your digital resources against hackers. Attach your completed diagram document to your initial post. Within the initial post, explain how the design of the network best suits your needs and typical usage. Additionally, explain how your planned firewall architecture provides better security than your current network setup.  

Sample Solution

     

Home Network Assessment

Current Network Setup

My current home network is relatively simple. It consists of the following devices:

  • ISP router: This device is provided by my ISP and provides me with access to the Internet. It also functions as a firewall for my network.
  • Wireless router: This device provides wireless access to my network for my laptops, smartphones, and other devices.
  • Desktop computer: This computer is used for work, personal projects, and gaming.
  • Laptop computer: This computer is used for work, travel, and personal use.
  • Smartphone: This device is used for communication, browsing the internet, and using apps.

Full Answer Section

    The diagram below illustrates my current network setup: [Diagram of current network setup] Potential Vulnerabilities One potential vulnerability in my current network setup is the lack of a dedicated firewall. While my ISP router does provide some firewall protection, it is not as comprehensive as a dedicated firewall. Additionally, the wireless router is a potential security risk, as it can be accessed by anyone within range. Another potential vulnerability is the fact that all of my devices are connected to the same network. This means that if one device becomes infected with malware, the malware could easily spread to other devices on the network. Ideal Network Setup The diagram below illustrates an ideal network setup for my home network: [Diagram of ideal network setup] In this ideal network setup, I would have a dedicated firewall between my home network and the Internet. The firewall would be configured to block all unauthorized traffic, both inbound and outbound. I would also have two separate wireless networks: one for guests and one for my own devices. The guest network would be isolated from the rest of my network, so that guests could not access my personal devices or data. Finally, I would use VLANs to segment my network further. For example, I would create separate VLANs for my desktop computer, laptop computer, and smartphone. This would help to prevent malware from spreading between my devices. Benefits of the Ideal Network Setup The ideal network setup would provide a number of benefits over my current network setup. First, the dedicated firewall would provide a more robust layer of security for my network. Second, the guest network would help to protect my personal devices and data from unauthorized access. Third, the VLANs would help to prevent malware from spreading between my devices. How the Ideal Network Setup Best Suits My Needs and Typical Usage The ideal network setup would best suit my needs and typical usage because it would provide me with a secure and reliable way to connect my devices to the Internet. I would be able to work, browse the web, and stream video without having to worry about security threats. Additionally, the VLANs would allow me to segregate my network in a way that would make it more difficult for malware to spread. How the Planned Firewall Architecture Provides Better Security Than My Current Network Setup The planned firewall architecture would provide better security than my current network setup because it would be a dedicated firewall that is specifically designed to protect networks from attack. The firewall would be configured to block all unauthorized traffic, both inbound and outbound. Additionally, the firewall would be regularly updated with the latest security patches to ensure that it is effective against the latest threats. In contrast, the firewall in my current ISP router is not as comprehensive and is not updated as regularly. Additionally, the wireless router in my current network setup is a potential security risk, as it can be accessed by anyone within range. Conclusion The ideal network setup would provide me with a secure and reliable way to connect my devices to the Internet. The dedicated firewall, guest network, and VLANs would all work together to protect my network from attack.  

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS