This project aims to provide a comprehensive understanding of the SAML (Security Assertion Markup Language) security standard, by examining the main concepts underlying this authentication standard.
*Define and configure the Firewall physical ports (LAN, WAN and DMZ)
*Create the required Firewall objects (IP, subnets...)
*Create the required routes so internal users in both sites are able to reach the internet
*Create the appropriate Firewall rules/policies to secure the network:
-internal users (in HQ and branch) should be able to reach internet with web filter restriction to block access to Social media and Social network sites
-company website (www server in DMZ) should be published and reachable from public internet on port HTTPS
-mail server (SMTP server in DMZ) should be reachable internally in HQ and from users in the branch through VPN
*Create the required NAT rules for DMZ published WWW server
*Add the appropriate security profiles (IPS / AV ..)
*Create an IPSec VPN tunnel between HQ and Branch and allow local subnets in each site to reach each others and branch users to reach DMZ servers
*Company users in both sites should be able to reach IT systems and servers remotely using SSL VPN[](url)
*Define and configure the Firewall physical ports (LAN, WAN and DMZ)
*Create the required Firewall objects (IP, subnets...)
*Create the required routes so internal users in both sites are able to reach the internet
*Create the appropriate Firewall rules/policies to secure the network:
*Create the required NAT rules for DMZ published WWW server
*Add the appropriate security profiles (IPS / AV ..)
*Create an IPSec VPN tunnel between HQ and Branch and allow local subnets in each site to reach each others and branch users to reach DMZ servers
*Company users in both sites should be able to reach IT systems and servers remotely using SSL VPN[](url)