Part 1: Create an Acceptable Use Policy appropriate for XYZCorp. Part 2: XYZCorp has decided to implement onsite servers which will be available for client access from the internet. Multiple servers may be purchased for this project. You need not specify

business

Description

Part 1: Create an Acceptable Use Policy appropriate for XYZCorp. Part 2: XYZCorp has decided to implement onsite servers which will be available for client access from the internet. Multiple servers may be purchased for this project. You need not specify hardware, but provide a recommendation for the number of servers running each OS desired. Anonymous ftp will provide access to pdf manuals for all equipment. Some business partner users will be allowed logins to access to software used to configure equipment sold by XYZCorp.The company will end its current hosting agreement and begin hosting its own basic webserver to provide potential clients information about XYZCorp.Describe the network architecture, hardware and software you would need to securely provide these services. How would you incorporate switches, routers, firewalls, subnets, VLANS, log servers etc in implementing your network architecture? Part 3: Explain how you would routinely monitor the network of XYZCorp. Include a discussion of the frequency, hardware and software tools used to monitor the stability and security of the network. Part 4: XYZCorp wants to provide secure wireless access to their LAN for the mobile sales staff. How would you implement this so only known, approved users have access. - (I was thinking only accepting certain MAC addresses to the wireless network) Discuss tools and techniques required, do not create a step by step configuration guide. Part 1: Create an Acceptable Use Policy appropriate for XYZCorp. Part 2: XYZCorp has decided to implement onsite servers which will be available for client access from the internet. Multiple servers may be purchased for this project. You need not specify hardware, but provide a recommendation for the number of servers running each OS desired. Anonymous ftp will provide access to pdf manuals for all equipment. Some business partner users will be allowed logins to access to software used to configure equipment sold by XYZCorp.The company will end its current hosting agreement and begin hosting its own basic webserver to provide potential clients information about XYZCorp.Describe the network architecture, hardware and software you would need to securely provide these services. How would you incorporate switches, routers, firewalls, subnets, VLANS, log servers etc in implementing your network architecture? Part 3: Explain how you would routinely monitor the network of XYZCorp. Include a discussion of the frequency, hardware and software tools used to monitor the stability and security of the network. Part 4: XYZCorp wants to provide secure wireless access to their LAN for the mobile sales staff. How would you implement this so only known, approved users have access. - (I was thinking only accepting certain MAC addresses to the wireless network) Discuss tools and techniques required, do not create a step by step configuration guide.

Instruction Files

Related Questions in business category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.