Perimeter Security
The project deliverables are as follows:
• Update the Information Network Security Architecture Design document title page with a new date and project name.
• Update your previously completed sections based on instructor feedback.
• Perimeter Security
o Perimeter Security Requirements
- Define the perimeter security requirements for your network.
- Research Internet and Web perimeter security models, and select a model that is appropriate for your network.
- Describe the model, and identify the appropriate aspects of the model that are associated with your requirements.
o Perimeter Security Design
- Provide a design for the perimeter security architecture of your network based on the model you selected in the previous step.
- Your design should include the following areas for consideration:
- State-based filters
- Border routers
- Screened subnets
- Internet Protocol Security (IPSec)
- Intrusion Detection Systems (IDS)
- Proxy firewalls
- Digital signatures
- Access control list filters
- Fail-safe equipment
- Equipment redundancy
• Be sure to update your table of contents before submission.