SRE Assignment 062021 - Coppa Updated 10062021
SRE Assignment 062021 - Coppa Updated 10062021
LEARNING OUTCOMES:
• CLO3: Propose WLAN concepts and configuration using WLC and Layer 2 security best
practices (A3, PLO9) – Configuration and Report
• CLO4: Demonstrate the strategies to implement switch security to mitigate LAN attacks
using appropriate tools (A3, PLO6) – Configuration and Report
Note:
Instructions:
This individual assignment carries 40% of your total module assessment marks. The total word
count of the report should not exceed 5000 words. No marks will be awarded for the entire
assignment if any part of it is found to be copied directly from printed materials or from another
group. All submissions should be made on or before the due date. Any late submissions after the
deadline will not be entertained. Zero (0) mark will be awarded for late submission unless
extenuating circumstances are upheld.
SCENARIO
Aziata Sdn. Bhd. is a local hard disk manufacturing company that has headquarter in Penang
(PG). The PG HQ has simple network architecture. Clients’ workstations are connected to an
access switch, distributed switch and the router’s internal interface as shown in figure 1. The
firewall’s (DMZ_Router-Firewall) external interface connects directly to the internet service
provider (ISP) router. The third interface on the firewall hosts a demilitarised zone (DMZ)
hosting several servers. These servers include Web, DNS and FTP applications. The network
administrator in PG has planned to replace the current configuration with new VLAN design to
make the network more efficient and to enhance the security mechanisms in HQ.
On the other hand, the CEO and the management team also have planned to expand the
company’s services and location in Bangkok (BK), Thailand (Remote Office Branch). As for the
new Remote Branch in BK, the network administrator has planned to deploy WLC WLAN to
ease the configuration of Wireless network and its access.
The company may be characterised by its departments. The names and locations of these
departments are as follows:
Management - (HQ Site)
Human Resource (HR) - (HQ Site)
Manufacturing - (HQ Site)
Design - (HQ Site)
R&D - (Remote Branch)
WLC Management - (Remote Branch)
DMZ – Server Farm
As a newly appointed network executive, you have been asked to work on the design and
prototype of the new network. You need to create the logical topology as stated in figure 1 below
and configure all devices using Cisco Packet Tracer as the simulator to evaluate the design.
There are some requirements in the above scenario that must be considered in this design.
1. Implement DHCPv4 to operate across multiple LANs.
2. Configure a WLC WLAN to use a VLAN interface, a DHCP server, and WPA2
authentication. – Remote Branch – VLAN 10 – 192.168.10.0, Management&Native VLAN –
192.168.100.0/24.
3. Configure IPv4 static/dynamic routes.
4. Implement port security to mitigate LAN attacks.
5. Implement port security to mitigate MAC address table attacks.
Each student is required to provide an individual report to justify the network topology and IP
addressing used in network plan. A written report should be completed based on the network
design and configurations implemented in Cisco Packet Tracer. Below are the proposed
guidelines for the report:
The report is to be written in a professional manner, paying due regard to the following aspects:
The report is to be written in the 3rd person point of view.
The report should have a consistent layout and be divided into enumerated sections, sub-
sections, sub-sub sections etc.
The report should be fully referenced using the University standard.
Your report must be typed using Microsoft Word with Times New Roman font and size 12.
Expected length is 5,000 words (excluding diagrams, appendixes, and references). You need
use to include a word count at the end of the report and it should be in 1.5 spaces.
Every report must have a front cover with the following details:
o Name
o Intake code.
o Subject.
o Project Title.
o Date Assigned (the date the report was handed out).
o Date Completed (the date the report is due to be handed in).
Submission Requirements:
Students are required to hand in their assignment (softcopy only) on time to the Online
Submission System (Moodle – Turnitin Assignment). In addition, demo / presentation of the
network design will be scheduled for all students before submission date. Submission of report
Week 12 [5th September 2021]. Individual demonstration for the Network Layout [.pkt
file] on Week 12-13.
Criteria A: CLO3: Propose WLAN concepts and configuration using WLC and Layer 2 security best
practices (A3, PLO9) – Personal Skills [40 Marks]
Marking 1 2 3 4 5
Weightage
Criteria (Fail) (Marginal (Pass) (Credit) (Distinction)
Fail)
Poor research Inadequate Well research Very well Poor research and
and research and and analysis and investigation of the
investigation of investigation investigation is investigation of problem. Poor
the problem. of the done. Good the problem. evaluation of the
Poor problem. Poor evaluation of Outstanding requirement.
evaluation of evaluation of the evaluation of the
the the requirements requirements
requirement requirement. with proper with proper
Research & reasoning with reasoning.
Investigation proper project Outstanding
planning and project planning
2
management. and management
with the
screenshots of
used tools.
Marking 1 2 3 4 5
Criteria (Fail) (Marginal (Pass) (Credit) (Distinction) Weightage
Fail)
No in-text Minimal in-text Sufficient Recent source of Very good quality
citation and citation and number of references used, of references
very minimal references references and with proper used, with proper
references. used. Minor citation in the reference list. citation and
Major issues in issues in the report. No issue Limited in-text reference list for
the referencing referencing in the citation in the all facts and
Referencing
format. format. referencing report diagrams used 1
Referencing Not able to format Good utilization Proficient in using
was done fully utilize the Able to fully of the referencing the referencing
manually, referencing utilize the features in features in
without using features in referencing Microsoft Word Microsoft Word,
Microsoft Word Microsoft features in without error
features Word Microsoft Word
Criteria B: CLO4: Demonstrate the strategies to implement switch security to mitigate LAN attacks using
appropriate tools (A3, PLO6) – Digital Skills [60 Marks]
Marking 1 2 3 4 5 Weightage
Criteria
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)
LAN and WAN Incomplete LAN Feasible LAN and Feasible LAN Good quality /
Configuration and WAN WAN and WAN complexity of
not clear. configuration. configuration with configuration LAN and WAN
minimum to configuration.
Major issues in requirement for demonstrate Extra effort
LAN and WAN configuration the selected the selected shown to create
Configuration No (some parts are technique. technique. a good design.
Techniques configuration unable to ping). 3
found. Minimal issues in Successful Successful LAN
configuration – not LAN and and WAN
fully working WAN configuration
according to the configuration (able to ping to
network design. (able to ping all devices).
to all
devices).
Layer 2 Feasible layer 2 Good layer 2 Good quality / Excellent quality /
security security security complexity of complexity of
mechanisms mechanisms mechanisms layer 2 layer 2 security
implemented is implemented, implemented, security mechanisms
not clear. meeting the showing complete mechanisms implemented.
minimum coverage on the implemented.
None or only requirement of a security setting of Very good choice
Layer 2 Security one network. the network. Good number of relevant 3
Mechanisms mechanism of relevant mechanisms
deployed. (not Satisfactory mechanisms good justification
feasible). number of provided in for the diagrams
relevant the network with citation (if
mechanisms plan needed)
provided in the
network plan.
Not showing Hardly able to Putting effort in Complete Very good quality
any progress. show the providing the work showed. of work showed.
progress on progress on time However, Well prepared,
time. but showing work need and not doing
Incomplete work incomplete work. some last minute work.
Timeline
as working far Need major changes and
1
behind the modifications to modifications
expected the work done. for
timeline. improvement.
Demonstration
Marking
Criteria 1 2 3 4 5 Weightage
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)
Hardly able to
use packet Least use of Satisfactory use of Good use of Excellent use of
Utilization of tracer packet tracer packet tracer packet tracer packet tracer
tools for simulation tool simulation tool simulation tool simulation simulation tool 2
network design in providing providing providing network tool providing providing
network network design. design. network network design.
design. design.
Not turn up for Able to show Show good Very good Outstanding
project minimal understanding in understandin configuration
demonstration. understanding configuration but g in skills
on the can be improved configuration demonstrated,
Poor configuration in technical and IP and IP exceeding the
understanding done. addressing addressing expectation. 1
on the scheme scheme
Q&A
configuration. knowledge. deployed. Able to answer
all questions
Not very good in Able to posed perfectly.
handling answer most
questions asked of the
during project questions.
demonstration.
A B C
Criteria 1 (16%) Criteria 2 (24%) Grand Total (50%) Final Assignment
Marks (100%)
X / 40 X / 60 A+B (C/50) * 100