
Design plan and deploy Cyber-Security Solutions | Juniper Networks
Project description
Daniel Cortez Security Assessment
Implement secure encryption technologies
Design and implement a security perimeter for ICT networks
Install and maintain valid authentication processes
Redesign the network security infrastructure for A company to meet the organization’s business requirements, and write a detailed proposal which I submitted to Spyon Technologies for consideration.
The final design proposal to the company included the following:
a detailed list of business requirements that must be met by the network security design
a complete and detailed discussion of the network security design proposal. This must include complete logical diagrams of the redesigned network and a discussion of the techniques and technologies used, e.g. Clustering, zones, policies, authentication, encryption, and VPN’s
details of how the network security design will meet all the business requirements
Prepare implementation plans
Document the network design and present the documentation to the appropriate person for approval
Present the design in a clear and logical fashion
Provide advice to the client on reasons for the design choice.




Scenario
My work in the cyber security division as a network engineer. My role is to assist with the planning and implementation of security measures and general network infrastructure.
IT Services The company uses the following server technologies:
1. Web servers for the company intranet and Web applications. This is accessed by remote workers.
2. Mail servers – Used by internal and external staff
3. Unified Communications servers
Tasks
1. The security perimeter must prevent all unauthorized access to company data.
2. All WAN links must be encrypted and secured.
3. All electronic communication within the company and with third parties must be encrypted and digitally signed.
4. Measures must be put in place to protect against DOS, DDOS, viruses, and all other cyber security threats.
5. The solution must be fault tolerant by eliminating single points of failure
Task 2
In order to calculate the risk level for each risk that is to be examined, it is necessary to calculate the impact of the threat occurring and the likelihood (or probability) of the threat occurring.
Make a list of possible cyber security threats. Allocate each threat an impact level, likelihood, and risk level.
Task 3
Using the list of threats, create a table that lists the defenses for each threat
Task 4
Design the firewall configuration
The design should include the following:
a. The name of each security zone I create
b. The inter-zone policy objectives
c.Traffic allowed into the zone
d. Traffic allowed between the zones
e. Other security measures to be implemented in the policy
f. Method of securing traffic from site to site
g. Method of securing traffic to and from the public internet
Task 5
Write the Juniper SRX configuration required to implement all the functionality described.. Provide the IP addressing scheme as a separate table.
Task 6
Design failover redundancy for the firewall so that a stateful failover of processes and services will occur in the event of system or hardware failure. Provide a diagram of the design and a description of how failover will be achieved in the event of a failure.
Task 7
Provide a typical failover redundancy configuration for a Juniper SRX firewall
Task 8
Provide a typical site to site VPN configuration for a Juniper SRX firewall.
Task 9
Is the network traffic traversing the IPSEC VPN encrypted using symmetric or asymmetric encryption? Compare 3 algorithms that could be used to encrypt the IPSEC VPN traffic. List the tests I performed to verify that the security measures and VPN are functioning as expected.
Questions?
Whether you’re curious about features, or vital information, we’re here to answer any questions.