20 Aug you have recently purchased a Cisco router that will need to be implemented in a government facility at the perimeter of the network.
you have recently purchased a Cisco router that will need to be implemented in a government facility at the perimeter of the network. This router will handle sensitive data. In order for the government to implement the router, you must perform a manual scan of the appropriate STIGs and determine what configurations will need to be implemented in order to get rid of at least 90% of the vulnerabilities.
Here are some of the details of the network you need to know.
1. The only routing protocol used is OSPF(RIP and BGP is not used).
2. SNMP will be used to monitor the router.
Here are your tasks:
1. Download and install the STIG viewer from the DISA website.
2. Determine the appropriate STIG for the device you are scanning and download the STIGs
3. Manually scan through the vulnerabilities in the STIG viewer and using the provided router configuration text file, determine which vulnerabilities are either a finding (or open), not a finding or not applicable.
4. Modify the router config file so that at least 90% of the vulnerabilities are fixed.
***** Prepare a power point presentation which should include the STIGs that were reviewed, the findings you found and what fixes you implemented to reach at least 90% vulnerability fixed requirement ***** This router will handle sensitive data. In order for the government to implement the router, you must perform a manual scan of the appropriate STIGs and determine what configurations will need to be implemented in order to get rid of at least 90% of the vulnerabilities.
Here are some of the details of the network you need to know.
1. The only routing protocol used is OSPF(RIP and BGP is not used).
2. SNMP will be used to monitor the router.
Here are your tasks:
1. Download and install the STIG viewer from the DISA website.
2. Determine the appropriate STIG for the device you are scanning and download the STIGs
3. Manually scan through the vulnerabilities in the STIG viewer and using the provided router configuration text file, determine which vulnerabilities are either a finding (or open), not a finding or not applicable.
4. Modify the router config file so that at least 90% of the vulnerabilities are fixed.
***** Prepare a power point presentation which should include the STIGs that were reviewed, the findings you found and what fixes you implemented to reach at least 90% vulnerability fixed requirement *****
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.