How to Complete a Three-Part Secure Network Infrastructure Design Assignment
This assignment has three moving parts: a Visio network diagram, a 6–10 page device configuration paper, and an updated final diagram that enforces VPN access rules, department segmentation, and daily vulnerability scanning. Here is exactly how to approach each part without getting lost in the complexity.
🖧 Need expert help with your network infrastructure diagram, paper, or both? Our cybersecurity specialists are ready.
Get Cybersecurity Assignment Help →What This Three-Part Assignment Actually Involves
You are designing a secure corporate network infrastructure across three deliverables: (1) an initial network diagram in Visio or an open-source alternative, (2) a 6–10 page technical paper documenting device selection, configurations, IP addressing, security features, and planning/testing considerations, and (3) a final updated diagram that incorporates vendor details, IP addresses, and four specific security enforcement requirements. All three parts must be cited with specific, credible sources.
Before you open Visio, understand the scope. There are 14 distinct device types to place, configure, and document. The paper is not a narrative essay — it is a technical specification document, and your marker is looking for precision. Vague statements like “the firewall provides security” will not earn marks. Specific statements like “the Cisco ASA 5506-X uses stateful packet inspection to allow outbound HTTP/HTTPS while blocking all uninitiated inbound connections from the untrusted zone” will.
The good news: once you understand the logical architecture — the zones, the traffic flows, and the security rationale — the device placement, configuration, and IP addressing fall into place fairly naturally. Start with the architecture. Let the devices follow from it. If you need expert help getting any part of this assignment done, Smart Academic Writing’s computer science specialists work on exactly this type of infrastructure design assignment.
Part 1: Initial Diagram
Visio or draw.io network topology showing all 14 device types placed logically within the corporate network.
Part 2: 6–10 Page Paper
Vendor, model, IP, OS, five security features, admin controls, and configuration impact for every device — plus planning and testing elements.
Part 3: Final Diagram
Updated diagram with vendor/model/IP annotations and four specific enforcement rules about VPN, segmentation, and vulnerability scanning.
≥4 Credible Sources
Academic or technical sources — NIST publications, Cisco documentation, peer-reviewed security papers — cited at least once each.
Part 1: Building the Network Diagram
The diagram is not decorative. It is an argument — a visual claim about where each device belongs and why. Before you place a single icon, decide on your network zones. A well-structured corporate network diagram for this assignment will have three to four distinct zones, and every device the assignment lists maps logically to one of them.
Which Tool to Use
Microsoft Visio works. If you do not have access to it, draw.io (diagrams.net) is free, runs in the browser, and has dedicated network shape libraries that include all the device types you need. Export as PNG or SVG and embed in your paper. Lucidchart also has a free tier with network templates. Do not use PowerPoint — it lacks the proper network shape sets and will look like it.
The Zone Framework
Think in terms of trust levels. Devices on the public internet are untrusted. Devices inside your network are trusted. Devices that need to be reachable from both — your web server, FTP server, VPN server — sit in a demilitarized zone (DMZ), which is semi-trusted. This three-zone model (Internet → DMZ → Internal Network) is the foundation of nearly every secure corporate network design. Add an internal segmentation layer for your server zone and your departmental VLANs, and you have your architecture.
Network Zones and Where Each Device Belongs
This is the section most students get wrong. They place devices randomly rather than according to security logic. Here is the correct placement rationale for all 14 required device types — not a prescription to copy, but a framework for building your own justified design.
Internet-Facing Layer (Untrusted / Edge)
Edge router, edge firewall — the outermost protection boundary
DMZ (Demilitarized Zone)
Web server, FTP server, VPN server — publicly accessible but isolated from internal network
Internal Server Zone
Authentication server, anti-virus server, vulnerability scanner, IDS, web proxy
Core Infrastructure Layer
Core router, distribution router, switch — the internal routing and switching fabric
Diagram Layout Tips for draw.io
Use draw.io’s built-in network shape library (Extras → Edit Diagram, or the search bar for “router,” “firewall,” “server”). Structure your diagram top-to-bottom with the internet cloud at the top, edge devices below it, DMZ in the middle, and internal network at the bottom. Use labeled boxes or swim-lane backgrounds to visually define each zone. Add brief annotation labels to each device connection explaining what traffic is permitted. For Part 3, use color-coded VLANs to show the departmental segmentation visually.
Part 2: Structuring the 6–10 Page Configuration Paper
The paper has two main bodies of content: device documentation and planning/testing elements. Do not try to write these as a continuous narrative. Use clear headings for each device and each planning element — this makes the paper easier to write, easier to read, and easier for your marker to verify that all required elements are present.
A clean structure for the paper looks like this: an introduction stating the network’s purpose and architecture overview, a device documentation section (one subsection per device), a planning and testing section covering each of the 13 required elements, and a references section. With 14+ devices and 13 planning elements to cover in 6–10 pages, you are working at roughly 200–250 words per device and 80–120 words per planning element. That is not much. Be precise. Cut everything that does not directly address a required element.
If the writing volume and technical depth of this paper feel unmanageable alongside your other coursework, the technical writing specialists at Smart Academic Writing handle exactly this type of paper — from device selection through full configuration documentation.
How to Document Each Device: The Required Elements
For every device in your network, the assignment requires vendor/make, model, IP address, OS identification, five security features, administrative controls, and an explanation of each configuration’s impact on overall network security. Here is how to approach that for each category of device.
Firewalls (Edge Firewall + Internal Firewall)
The primary enforcement points of your security architecture
For vendor and model, Cisco is the most commonly documented choice for academic assignments — the Cisco ASA 5506-X for the edge firewall and the Cisco ASA 5505 for the internal firewall are well-documented in vendor documentation and widely cited in network security literature. Alternatively, Fortinet’s FortiGate series (e.g., FortiGate 60F) or Palo Alto Networks’ PA-220 are strong choices with extensive configuration documentation available.
When documenting the five security features, go beyond generic statements. For a Cisco ASA, your five security features might be: (1) stateful packet inspection, (2) application-aware firewall (Layer 7 inspection), (3) intrusion prevention integrated with Cisco Firepower, (4) site-to-site and remote-access VPN support, and (5) identity-based access control via Cisco ISE integration. For administrative controls, cover role-based access to the management interface, management plane separation, SNMP monitoring, syslog integration, and scheduled configuration backups. Each of these should be tied back to its impact on overall network security — not just listed in isolation.
Web Server, FTP Server, VPN Server
DMZ-hosted services with controlled external accessibility
For the web server, a common academic choice is an Apache HTTP Server running on Ubuntu Server 22.04 LTS, or Microsoft IIS on Windows Server 2022. For the FTP server, vsftpd (Very Secure FTP Daemon) on Linux is a well-documented, security-focused option that is straightforward to configure. For the VPN server, Cisco ASA 5506-X with AnyConnect is the standard enterprise choice; OpenVPN on Linux is a well-documented open-source alternative. Assign each server an IP in your DMZ subnet. The web server configuration should cover TLS 1.3 enforcement, HTTP-to-HTTPS redirection, disabling unused modules, access logging, and OS hardening. The VPN server configuration needs to explicitly address the Part 3 requirement — that all VPN connections terminate at the VPN server in the DMZ before passing authenticated traffic through the internal firewall.
Authentication Server
Identity and access management for the corporate network
The most commonly used and best-documented choice here is Microsoft Active Directory Domain Services on Windows Server 2022. For RADIUS authentication (required for VPN and network device access), you can run Network Policy Server (NPS) as a RADIUS server on the same Windows Server instance, or use a dedicated appliance like Cisco ISE. Five security features to document: Kerberos authentication, LDAP over SSL (LDAPS), Group Policy Objects for workstation configuration enforcement, account lockout policies after failed login attempts, and Multi-Factor Authentication via Azure AD integration or similar. The administrative controls section should cover the principle of least privilege for service accounts, separation of administrator and user accounts, privileged access workstations for AD administration, and audit logging of all authentication events.
Anti-Virus Server, IDS, Vulnerability Scanner
Threat detection and continuous monitoring layer
For the anti-virus server (which includes both server-based and client-based components as noted in the assignment), Symantec Endpoint Protection Manager or McAfee ePolicy Orchestrator (ePO) are well-documented enterprise options. The client component is installed on each workstation; the server component manages signature updates and policy enforcement centrally. The IDS should be Snort (open-source, extremely well-documented, backed by Cisco) or a commercial option like Cisco Secure IDS. Position the IDS sensor at the SPAN port of your core switch for maximum internal visibility. For the vulnerability scanner, Tenable Nessus Professional is the industry-standard choice and has comprehensive documentation. Document how Nessus is scheduled for daily scans with credentialed access to all subnets — this directly addresses the Part 3 requirement for daily workstation scanning.
Web Proxy, Routers, Switch
Traffic control, routing infrastructure, and internal connectivity
For the web proxy, Squid Proxy running on Linux is the most widely used open-source option, with extensive academic and technical documentation. The proxy enforces content filtering, caches frequently accessed content, and logs all outbound web requests. For routers, Cisco is the standard choice: Cisco 4321 ISR for the edge router and core router, Cisco 3750 for the distribution layer. Assign IP addresses to each router interface: the edge router has one interface facing the internet (public IP) and one facing the DMZ; the core router connects the DMZ to the internal network via the internal firewall; the distribution router aggregates the departmental VLANs. For the switch, a Cisco Catalyst 2960-X running in managed mode with VLAN configuration is the natural complement to the Cisco router stack. Document port security, VLAN segmentation, and STP configuration as key security features.
Building a Coherent IP Addressing Scheme for the Entire Network
Every device needs a specific IP address in the paper and in the Part 3 diagram. Use RFC 1918 private addressing for all internal devices. Here is a clean scheme you can adapt.
| Zone / Segment | Subnet | Example Devices and IPs |
|---|---|---|
| Edge / External | 203.0.113.0/30 (documentation IP per RFC 5737) | Edge Router WAN: 203.0.113.1 / Edge Router LAN: 10.0.0.1 |
| DMZ | 10.0.1.0/24 | Web Server: 10.0.1.10 / FTP Server: 10.0.1.11 / VPN Server: 10.0.1.12 / Edge Firewall DMZ: 10.0.1.1 |
| Server Zone (Internal) | 10.0.2.0/24 | Auth Server: 10.0.2.10 / AV Server: 10.0.2.11 / Vuln Scanner: 10.0.2.12 / IDS: 10.0.2.13 / Web Proxy: 10.0.2.14 / Internal FW: 10.0.2.1 |
| Core Routing | 10.0.0.0/30 (transit links) | Core Router: 10.0.0.2 / Distribution Router: 10.0.0.5 |
| IT Department (VLAN 10) | 10.0.10.0/24 | IT Desktops: 10.0.10.100–10.0.10.150 / IT Laptops: 10.0.10.200–10.0.10.220 |
| Engineering (VLAN 20) | 10.0.20.0/24 | Engineering Workstations: 10.0.20.100–10.0.20.200 |
| Finance & Accounting (VLAN 30) | 10.0.30.0/24 | Finance Workstations: 10.0.30.100–10.0.30.200 |
Using Documentation IP Addresses in Academic Work
For the public-facing IP on your edge router, use addresses from IANA’s designated documentation ranges rather than inventing arbitrary public IPs. 203.0.113.0/24 (TEST-NET-3 per RFC 5737) is specifically reserved for documentation and examples, which makes it the correct choice for academic assignments. Using real public IP addresses that belong to actual organizations in your diagram is technically incorrect and may appear sloppy to a marker who notices it. Cite RFC 5737 as your source for this choice — it demonstrates that you understand IP address management conventions.
How to Document Five Security Features and Administrative Controls Per Device
This is the highest-volume requirement in Part 2 and the area where students most often lose marks by being generic. Your marker has read a hundred papers where “the firewall protects the network” is listed as a security feature. That earns nothing. Here is how to write device security documentation that actually scores.
What a Strong Security Feature Entry Looks Like
Cisco ASA 5506-X — Edge FirewallGeneric (earns no credit): “The firewall blocks unauthorized traffic.”
Specific and credible (earns credit):
The ASA 5506-X maintains a connection state table that tracks the state of all active TCP/UDP sessions. Inbound packets are only permitted if they correspond to an established outbound session or match an explicitly permitted access control entry. All other inbound traffic is dropped by default. This prevents TCP session hijacking, port-scanning-based reconnaissance, and unsolicited inbound connections from reaching the DMZ or internal network. Configuration is enforced at the interface level using
inspect class maps within the global policy framework (Cisco, 2023).Security Feature 2: Network Address Translation (NAT)
The ASA performs dynamic PAT on outbound traffic, translating internal RFC 1918 addresses to the single public-facing IP on the outside interface. This conceals the internal addressing scheme from external observers, preventing reconnaissance of internal subnet structure. Static NAT entries are configured for the DMZ servers (web, FTP, VPN) to allow controlled inbound access to specific services.
Continue this pattern for all five features. Each entry should name the feature, explain how it is configured in this specific device, and state its direct impact on network security.
For administrative controls, document the management-plane configuration separately from the data-plane security features. Administrative controls for most devices should cover: who can access the management interface and how (role-based access, SSH only, no Telnet), how authentication for administrative access is handled (local accounts vs. RADIUS/TACACS+), how configuration changes are logged and monitored, how software/firmware updates are managed, and what backup and recovery procedures exist for the device configuration.
Addressing the 13 Planning and Testing Elements
The second major body of the paper requires you to address 13 specific planning and testing considerations. Each one needs a paragraph or two — not a textbook definition, but a specific statement of how it applies to your corporate network design. Here is a brief orientation for each element so you know what to actually write.
| Element | What to Address in Your Paper | Key Consideration |
|---|---|---|
| Organizational requirements | Define the assumed organizational context — size, industry, regulatory environment (e.g., PCI-DSS if Finance is involved) | Regulatory compliance shapes every security control — name applicable regulations |
| Budget | Acknowledge that vendor and model choices reflect budget constraints; discuss TCO of hardware vs. cloud-based alternatives | Academic assignments need a budget rationale, not a real budget number |
| Modularity for security and testing | Explain how your VLAN segmentation allows changes to one segment without impacting others; how devices can be tested in isolation | Segmentation is the key word — connect it to your actual VLAN design |
| Naming conventions | Define a device naming scheme that encodes location, role, and sequence — e.g., FW-DMZ-01, RTR-CORE-01, SW-DEPT-IT-01 |
Naming conventions that reveal zone and function simplify troubleshooting and audit trails |
| Network speed and data capacity | Specify interface speeds for each segment — 1Gbps access layer, 10Gbps core uplinks — and justify based on workload assumptions | Bottlenecks at the distribution or core layer affect the entire network’s availability |
| Vendor support | Discuss the support lifecycle for chosen vendors (Cisco SmartNet, Microsoft Premier Support) and the risk of EOL hardware | Unsupported hardware is a direct security risk — unpatched vulnerabilities cannot be fixed without vendor support |
| Risk and redundancy | Identify single points of failure in your design and propose redundancy (dual firewalls in HA mode, redundant core switches) | Your vulnerability scanner’s daily scan schedule is a risk event that should not degrade production performance — schedule off-peak |
| Uptime requirements | Define expected uptime (99.9% = 8.76 hours downtime/year) and map it to redundancy, UPS, and failover configuration | Finance department systems often have stricter uptime SLAs — note this in relation to the Finance VLAN design |
| Continuous data monitoring | Explain how the IDS, web proxy logs, firewall logs, and vulnerability scanner outputs feed into a centralized SIEM or log management system | The IDS alone is not enough — you need a monitoring architecture that aggregates events across all devices |
| Load balancing | Discuss load balancing for the web server (if serving external users) and the VPN server (if handling multiple concurrent sessions) | The VPN server is a likely bottleneck if all remote users connect simultaneously — address this explicitly |
| Testing for latency | Explain how tools like ping, traceroute, and iPerf can identify latency at each network hop; set acceptable latency thresholds by segment | VPN adds encryption overhead and latency — document expected VPN throughput impact |
| Bandwidth and throughput | Distinguish between bandwidth (maximum capacity) and throughput (actual utilization); describe how SNMP-based monitoring tracks both | Web proxy caching reduces bandwidth consumption — document the expected cache hit rate as a bandwidth optimization |
| Specific software and tools | Name the specific tools used for each function — Nessus for vulnerability scanning, Wireshark for packet capture, SolarWinds for SNMP monitoring, Splunk for SIEM | Every tool name should link back to a device or function you have already documented — no orphan tool references |
According to NIST Special Publication 800-41 Revision 1, firewalls should be deployed as part of a layered security architecture — not as standalone protection. Every element of your network design should demonstrate that you understand defense-in-depth.
— NIST SP 800-41 Rev. 1, Guidelines on Firewalls and Firewall Policy (Scarfone & Hoffman, 2009), available at nvlpubs.nist.govPart 3: Creating the Final Annotated Diagram
Part 3 builds directly on Part 1. You are updating your initial diagram to include: vendor names, model numbers, and IP addresses on every device; at least 11 of the 14 required device types; and four specific enforcement requirements that must be visually represented and verifiable in the diagram.
Do not start from scratch. Take your Part 1 diagram, add the vendor/model/IP annotations in callout boxes or tooltip labels beside each device icon, and update it to reflect the four requirements. The annotations make the diagram denser and harder to read if done carelessly — use consistent label formatting and consider a legend box in the corner of the diagram that clarifies the annotation format.
A clean annotation format for each device: [Device Name] | [Vendor Model] | [IP Address]
Example: Edge Firewall | Cisco ASA 5506-X | 10.0.1.1
Meeting the Four Specific Security Requirements in the Final Diagram
These four requirements are the hardest part of Part 3 to get right, because they require both a design decision and a visual representation in the diagram. Here is exactly what each requirement means and how to show it.
VPN sessions are only allowed to access IT department desktops — by IT employees only
This is an access control rule, not a topology change. It should be implemented at the internal firewall or the distribution router as an ACL: traffic arriving from the VPN server’s subnet (10.0.1.12) is only permitted to reach 10.0.10.0/24 (IT VLAN). All VPN traffic destined for Engineering (10.0.20.0/24) or Finance (10.0.30.0/24) is blocked. The authentication requirement (“by IT employees only”) is enforced at the VPN server via RADIUS authentication against the Active Directory group “IT Department.” In your diagram, show this with a labeled arrow from the VPN Server to the IT Department VLAN, with a red X or blocked arrow toward Engineering and Finance. Add a note: “VPN → IT VLAN only. ACL on Distribution Router blocks VPN subnet from VLAN 20 and VLAN 30.”
All VPN connections from the Internet terminate at the VPN server
This is a topology requirement already addressed by placing the VPN server in the DMZ. The key is showing it clearly in the diagram. Draw the VPN connection path: Internet cloud → Edge Router → Edge Firewall → DMZ → VPN Server. Then show a separate authenticated path from VPN Server → Internal Firewall → IT VLAN. The internet cloud should have no direct path to the internal network — all paths pass through the edge firewall and then the VPN server. Add a diagram label: “All external VPN sessions terminate at VPN Server (10.0.1.12). No direct external access to internal subnets.” This makes the enforcement requirement visually unambiguous.
Engineering and Finance/Accounting cannot communicate
This is inter-VLAN communication blocking. Engineering is on VLAN 20 (10.0.20.0/24) and Finance is on VLAN 30 (10.0.30.0/24). The distribution router routes between VLANs — and you need an ACL on the distribution router that denies traffic from 10.0.20.0/24 to 10.0.30.0/24 and vice versa. In your diagram, show the two VLANs connected to the distribution router, with a labeled blocking symbol between them. Add a note: “Inter-VLAN ACL on Distribution Router: deny 10.0.20.0/24 ↔ 10.0.30.0/24.” If you use VLAN color-coding in your diagram, use distinct colors for Engineering and Finance and no connecting line between them.
Vulnerability scans occur daily, with all desktops scanned at least once per day
This is a scanning coverage and scheduling requirement. The Nessus vulnerability scanner (10.0.2.12) needs to reach all departmental VLANs — 10.0.10.0/24, 10.0.20.0/24, and 10.0.30.0/24. Show scan paths in your diagram from the Vulnerability Scanner to each departmental VLAN with a labeled arrow: “Daily credentialed scan, 02:00–04:00 UTC.” The firewall rules must permit Nessus to initiate connections to workstations on these subnets — document this firewall rule in Part 2. In Part 3, the diagram note should specify both the schedule and the credential approach: “Credentialed Nessus scan of all VLAN 10/20/30 hosts — scheduled 02:00 daily.” This directly addresses the “at least once per day” requirement.
Four-Fifths Calculation for Part 3
The assignment requires four-fifths of the listed devices. The list has 14 device types: web server, FTP server, VPN server, authentication server, anti-virus server, edge firewall, firewall, vulnerability scanner, IDS, web proxy, edge router, core router, switch, distribution router. Four-fifths of 14 = 11.2, so you need at least 11 device types in your Part 3 diagram. If you include all 14 (which you should, since they are all already in your Part 1 diagram), you exceed the minimum. The three you could technically omit are the FTP server, the distribution router, or the web proxy — but omitting any of them weakens the diagram’s completeness and the paper’s device documentation. Include all 14.
Finding Four or More Credible Sources for This Assignment
The assignment requires at least four specific and credible academic sources, each cited at least once within the paper. Generic IT blogs or Wikipedia will not meet this standard. Here is where to look and what to look for.
NIST Special Publications
Free, peer-reviewed, government-authored — the gold standard for network security citations
Vendor Technical Documentation
Cisco, Fortinet, and Tenable publish detailed configuration guides that qualify as credible technical sources
Peer-Reviewed Academic Sources
IEEE Xplore and the ACM Digital Library for network security architecture papers
Sources to Avoid
- General IT news sites (TechRepublic, ZDNet, Bleeping Computer) — informative but not credible academic sources
- Wikipedia — never acceptable as a citation in a technical paper at this level
- Anonymous blog posts or forum threads — even Stack Overflow, despite its usefulness, does not qualify as a credible source for citations
- Vendor marketing materials — distinguish between a Cisco white paper authored by engineers (acceptable) and a Cisco product brochure (not acceptable)
- Sources older than 10 years for rapidly changing fields like network security — a 2012 source on firewall configuration may no longer reflect current best practices and may predate significant CVEs in the devices discussed
Mistakes That Cost Marks on This Assignment
What Weakens the Submission
- Placing the web server inside the internal network instead of the DMZ
- Using the same IP address twice or using public IPs for internal devices
- Listing security features without explaining how they are configured or what they protect against
- Omitting the operating system identification for each device
- Treating the IDS as a firewall — documenting it as blocking traffic when IDS only detects, not blocks (that is an IPS function)
- Failing to show both the client and server components of the anti-virus deployment
- Using generic sources like Wikipedia or IT news blogs instead of NIST or IEEE
- Part 3 diagram that does not visually represent the four enforcement requirements
- Planning and testing section that reads as a glossary rather than as design decisions applied to your network
What Strengthens the Submission
- Two-firewall DMZ architecture with edge firewall and internal firewall clearly separate
- Consistent IP addressing scheme across diagram and paper with no overlapping subnets
- Security features that name specific technical mechanisms (stateful inspection, LDAPS, credentialed scanning) rather than generic terms
- Administrative controls documented separately from data-plane security features
- NIST SP citations for firewall, IDS, and server configuration documentation
- Part 3 diagram with labeled ACL descriptions showing the four enforcement rules
- Naming convention section that defines a scheme and applies it consistently to all devices in the diagram
- Vulnerability scanner configuration that explicitly addresses the daily scan and desktop coverage requirement
- All four Part 3 requirements traceable in the diagram — annotated, not just implied
FAQs: Secure Network Infrastructure Design Assignment
Where to Focus Your Time Across All Three Parts
The diagram in Part 1 is the foundation. Get the zone architecture right — two firewalls, DMZ in the middle, segmented internal VLANs — and everything else in the assignment flows from it. A logically sound Part 1 diagram means your Part 2 device documentation and Part 3 enforcement rules have a coherent structure to anchor them.
Part 2 is where most of the marks live, because it is where the assignment tests whether you actually understand the devices and not just their names. Do not rush the security features and administrative controls section. Five specific, technically accurate, cited security features per device takes time to write — but it is the difference between a passing grade and a strong one. Use NIST SPs as your citation backbone and vendor documentation to fill in the configuration specifics.
Part 3 is faster than it looks once Part 1 exists. Annotate the diagram, add the vendor/model/IP labels, and make the four enforcement requirements visually explicit. The diagram annotations should be clear enough that a reader who has not read your Part 2 paper can still understand what each enforcement rule does and where it is implemented.
If any of these three parts — the diagram, the paper, or the final annotated design — are beyond your current time or knowledge bandwidth, the technical specialists at Smart Academic Writing are available. You can access cybersecurity assignment help, computer science assignment support, technical writing services, and research paper writing — all with the documentation specificity and credible sourcing this assignment requires.