This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:43:51 GMT -06:00https://www.coursehero.com/file/42408208/ITT-307-Week-4-Network-Designdocx/ Network DesignNetwork design and network security go hand and hand in the modern world of business. Cyber security must be considered in every aspect of the layout, functionality, and implementation of any new network. When designing new networks, or upgrading and updating an existing network, the security of that network was often an after-thought. However, this mentality has changed greatly over the years. The attached network design has been built to address modern security needs while still providing quick and reliable usage. As data comes into the network form the internet the edge router will filter and block any unexpected or malicious traffic using various routing rules and access lists. Once past this device, the data fill be further filtered and checked by the external firewall. This firewall will provide high speed packet scanning and filtering to remove any data that may contain damaging code or information. The next router will pass information to the Web Servers installed in the DMZ. This will allow for a more secure environment for the companies forward facing hardwareand services. Moving further into the network, data that is destined to