Project Cover Sheet-CSF 4203 Project (25%) : Higher Colleges of Technology
Project Cover Sheet-CSF 4203 Project (25%) : Higher Colleges of Technology
Declaration; Individual:
No part of this assignment has been copied from another source, (not from another group or student, an
internet source or a book)
When another person’s words are used, this is shown in the text with “…” and referenced.
No part of this assignment has been written for me by any other person.
I have a copy of this assignment that I can produce if the first copy is lost or damaged.
Declaration; Group:
No part of this assignment has been copied from another source, (not from another group or student, an
internet source or a book)
When another person’s words are used, this is shown in the text with “…” and referenced.
No part of this assignment has been written by anyone other than the members of the group named below.
We have a copy of this assignment that we can produce if the first copy is lost or damaged.
Names and Signatures :
N.B. The marker may choose not to mark this assignment if the above declaration is not signed.
Introduction
You are part of a telecommunication company that provides network and
security solutions. You have been called by a client to plan and design the
network system and the needed security controls for the company. The idea of
this project is to create a full connectivity network infrastructure across
multiple locations. Your job is to propose and design an integrated solution
based on the following requirement.
In the other side, and regardless of the company size all companies require high
level of security to be achieved. Here are the set of security techniques that you
must use in the design and implementation of the company network:
PPP with Authentication between any two sites.
Firewall Server.
Syslog and NTP.
VPN technology (Site-to-Site VNP).
P a g e | 2 of 8
201920 CSF 4203 Project
The Deliverables
This is a team project with the following deliverables:
The Project Design and Document (25%)
The Project Solution –Packet Tracer File (25%)
The Project Demo and Oral Defence (50%)
In the same project document, add the following sections as part of the
design you are proposing:
Network Topology: Provide a clear network topology/map with description of
each network device and what technology is used on that device.
Addressing Table(s): Provide an addressing table with interfaces, IP
addresses, subnet masks, gateways, etc.
WAN Security: Describe how security controls specified (such as Site-to-Site
VPN, Firewall, AAA) were applied on the different components of the WAN.
What is being protected and how. Be sure that these security controls satisfy
the requirements and constrains mentioned in the previous section.
Assumptions and Limitations: A brief discussion of your assumptions and
design limitations.
P a g e | 3 of 8
201920 CSF 4203 Project
Your research topics should include all elements listed in the Network
Requirements section above.
Use APA style formatti ng.
You should include a references page and in-text citation.
You may cite the course and the textbook but it’s not enough. The
textbook/course should be accompanied by another reference.
Important Notes:
Ensure that all components are working
Ensure you’re using a recent version of Packet Tracer
Important Notes:
Students will be assessed individually on their knowledge of the design
and the solution
Submission Requirements
Submit before midnight
You must submit one folder (zipped) with all files to Bb Learn site.
Your folder must contain two files
o One project report
o One Packet Tracer file
Your zipped folder should be named as per names of team members
P a g e | 4 of 8
201920 CSF 4203 Project
o Example: Mohamad-Ismail-Salem
Each file in the folder must also have the same naming format:
o Example: name-name-name
Your project report should include a cover page sheet must also have the
same naming format:
o Example: name-name-name
P a g e | 5 of 8
201920 CSF 4203 Project
P a g e | 6 of 8
201920 CSF 4203 Project
5
WAN Security A description of how security was applied on the different
components of the WAN.
Score Incomplete A description of Additional analysis
description or what is being of risks of
elements of protected and how. successful exploits.
ambiguity exist.
5
Project Solution. Provides an implemented solution in the
3 form of a Packet Tracer file.
0 1 2 3 4 5
Absent EMERGING COMPETENT MASTERING
15
P a g e | 7 of 8
201920 CSF 4203 Project
Project Demo & Discussion. The group will demo the solution
and describe different parts of the WAN and its components.
4 However, students will be marked individually and will be
assessed on their knowledge based on 4 questions for each.
Students should be competent in all aspects of the solution.
0 1 2 3 4 5
Absent EMERGING COMPETENT MASTERING
Student 1 Name:
Score Remarks: Remarks: Remarks:
50
Student 2 Name:
Score Remarks: Remarks: Remarks:
50
Student 3 Name:
Score Remarks: Remarks: Remarks:
50
P a g e | 8 of 8