SRE - Assignment - 022022 - Coppa - Updated - 06032022
SRE - Assignment - 022022 - Coppa - Updated - 06032022
SRE - Assignment - 022022 - Coppa - Updated - 06032022
LEARNING OUTCOMES:
• CLO3: Propose WLAN concepts and configuration using WLC and Layer 2 security best
practices (A3, PLO9) – Configuration and Report
• CLO4: Demonstrate the strategies to implement switch security to mitigate LAN attacks
using appropriate tools (A3, PLO6) – Configuration and Report
Note:
Instructions:
This individual assignment carries 40% of your total module assessment marks. The total word
count of the report should not exceed 5000 words. No marks will be awarded for the entire
assignment if any part of it is found to be copied directly from printed materials or from another
student. All submissions should be made on or before the due date. Any late submissions after
the deadline will not be entertained. Zero (0) mark will be awarded for late submission unless
extenuating circumstances are upheld.
SCENARIO
Cyber Networks Inc. is a networking company that has planned to expand their services and
location in several branches (Remote Office Branch) and (Remote Branch). The network
administrator has planned to replace the current configuration with new VLAN design to make
the network more efficient and to enhance the security of the network especially in HQ branch
located in KL. Apart from that, the Remote Office Branch (Server Farm) will be managed
remotely by the Management department in HQ. For the Remote Branch in Krung Thep.
Thailand, the network administrator has planned to deploy WLC WLAN to ease the
configuration of Wireless network and its access.
The company may be characterised by its departments. The names and locations of these
departments are as follows:
Management - (HQ Site)
Human Resource (HR) - (HQ Site)
Design - (HQ Site)
Delivery - (HQ Site)
R&D - (Remote Branch)
WLC Management - (Remote Branch)
Server Farm - (Remote Office)
As a newly appointed network executive, you have been asked to work on the design and
prototype of the new network. You need to create the logical topology as stated in figure 1 below
and configure all devices using Cisco Packet Tracer as the simulator to evaluate the design.
There are some requirements in the above scenario that must be considered in this design.
Each student is required to provide an individual report to justify the network topology and IP
addressing used in network plan. A written report should be completed based on the network
design and configurations implemented in Cisco Packet Tracer. Below are the proposed
guidelines for the report:
Your report must be typed using Microsoft Word with Times New Roman font and size 12.
Expected length is 5,000 words (excluding diagrams, appendixes, and references). You need
use to include a word count at the end of the report and it should be in 1.5 spaces.
Every report must have a front cover with the following details:
o Name
o Intake code.
o Subject.
o Project Title.
o Date Assigned (the date the report was handed out).
o Date Completed (the date the report is due to be handed in).
Submission Requirements:
Students are required to hand in their assignment (softcopy only) on time to the Online
Submission System (Moodle – Turnitin Assignment). In addition, demo / presentation of the
network design will be scheduled for all students before submission date.
Criteria A: CLO3: Propose WLAN concepts and configuration using WLC and Layer 2 security best
practices (A3, PLO9) – Personal Skills [100 Marks]
Marking 1 2 3 4 5
Weightage
Criteria (Fail) (Marginal (Pass) (Credit) (Distinction)
Fail)
Poor research Inadequate Well research Very well Poor research and
and research and and analysis and investigation of the
investigation of investigation investigation are investigation of problem. Poor
the problem. of the done. Good the problem. evaluation of the
Poor problem. Poor evaluation of Outstanding requirement.
evaluation of evaluation of the evaluation of the
Research &
the the requirements requirements
Investigation
requirement requirement. with proper with proper
reasoning with reasoning.
4
(20%)
proper project Outstanding
planning and project planning
management. and management
with the
screenshots of
used tools.
Marking 1 2 3 4 5
Criteria (Fail) (Marginal (Pass) (Credit) (Distinction) Weightage
Fail)
No in-text Minimal in-text Enough Recent source of Very good quality
citation and citation and references and references used, of references
very minimal references citation in the with proper used, with proper
references. used. Minor report. No issue reference list. citation and
Major issues in issues in the in the Limited in-text reference list for
Referencing the referencing referencing referencing citation in the all facts and
format. format. format report diagrams used 4
(20%) Referencing Not able to Able to fully Good utilization Proficient in using
was done fully utilize the utilize the of the referencing the referencing
manually, referencing referencing features in features in
without using features in features in Microsoft Word Microsoft Word,
Microsoft Word Microsoft Microsoft Word without error
features Word
Criteria B: CLO4: Demonstrate the strategies to implement switch security to mitigate LAN attacks using
appropriate tools (A3, PLO6) – Digital Skills [60 Marks]
Marking 1 2 3 4 5 Weightage
Criteria
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)
LAN and WAN Incomplete LAN Feasible LAN and Feasible LAN Good quality /
Configuration and WAN WAN and WAN complexity of
not clear. configuration. configuration with configuration LAN and WAN
minimum to configuration.
Major issues in requirement for demonstrate Extra effort
LAN and WAN
configuration the selected the selected shown to create
Configuration No (some parts are technique. technique a good design.
Techniques configuration 4
unable to ping).
found. Minimal issues in Successful Successful LAN
(20%)
configuration – not LAN and and WAN
fully working WAN configuration
according to the configuration (able to ping to
network design. (able to ping all devices).
to all
devices).
Layer 2 Feasible layer 2 Good layer 2 Good quality / Excellent quality /
security security security complexity of complexity of
mechanisms mechanisms mechanisms layer 2 layer 2 security
implemented is implemented, implemented, security mechanisms
not clear. meeting the showing complete mechanisms implemented.
Layer 2 Security
minimum coverage on the implemented.
Mechanisms
None or only requirement of a security setting of Very good choice
Deployment in
one network. the network Good number of relevant
configuration
mechanism of relevant mechanisms
4
deployed. (Not Satisfactory mechanisms good justification
(20%)
feasible). number of provided in for the diagrams
relevant the network with citation (if
mechanisms plan needed)
provided in the
network plan
Not showing Hardly able to Putting effort in Complete Very good quality
any progress. show the providing the work showed. of work showed.
progress on progress on time However, Well prepared,
Timeline time. but showing work need and not doing
Incomplete work incomplete work. some last minute work 2
(10%) as working far Need major changes and
behind the modifications to modifications
expected the work done for
timeline. improvement.
Demonstration
Marking
Criteria 1 2 3 4 5 Marks
Awarded
(Fail) (Marginal Fail) (Pass) (Credit) (Distinction)
Hardly able to
Utilization of use packet Least use of Satisfactory use of Good use of Excellent use of
tools for tracer packet tracer packet tracer packet tracer packet tracer
network design simulation tool simulation tool simulation tool simulation simulation tool 4
in providing providing providing network tool providing providing
(20%) network network design. design. network network design.
design. design.
Not submitting Able to show Show good Very good Outstanding
for project minimal understanding in understandin configuration
demonstration. understanding configuration but g in skills
on the can be improved configuration demonstrated,
Poor configuration in technical and IP and IP exceeding the
[Video understanding done addressing addressing expectation.
Submission- on the scheme scheme 2
content] configuration. knowledge. deployed. Able to explain
technical
Not very good in Able to configuration and
(10%) explaining explain excellent
technical technical verification
configuration and configuration commands.
average and good
verification verification
commands. commands.
A B C
Criteria 1 (16%) Criteria 2 (24%) Grand Total (40%) Final Assignment
Marks (100%)
X / 100 X / 100 A+B (C)/40 * 100
Appendices:
HQ Network – KL:
Networks:
1. HR – 192.168.1.0/24
2. Design – 192.168.2.0/24
3. Delivery – 192.168.3.0/24
4. Management – 192.168.50.0/24
5. BlackHole [Unused Ports]
6. Native
Networks:
1. ServerFarm – 198.51.100.0/24
2. BlackHole [Unused Ports]
3. Native
Networks:
1. RBMgmt – 192.168.100.0/24
2. R&D-Wireless – 192.168.10.0/24
3. BlackHole [Unused Ports]
WAN Connections:
WAN Connections:
1. WAN 1 – 200.100.100.0/30
2. WAN 2 – 200.100.100.4/30
3. WAN 3 – 200.100.100.8/30
4. WAN 4 – 200.100.100.12/30
5. WAN 5 – 200.100.100.16/30