country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

BN305 Virtual Private Network 2

tag 1 Download6 Pages / 1,420 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: BN305
  • University: Melbourne University Of Technology
  • Country: Australia

Question:

Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria.  See detailed instruction in the next section.

There are two sites existed in different Australian cities that belong to the same organization, where you need to consider for this VPN network design in this assignment. This is in addition to remote users who should be able to access their work from the company site while travelling.

  1. Design a network for thisSME
  2. Build VPN services for the users
  1. Report mustinclude:
    • Introduction
    • Scopes andLimitations
    • Requirements (Network parts and VPN serviceparts)
    • SolutionDesign
  2. LogicalDesign
  3. PhysicalDesign
  4. NetworkTopologies
  5. IPaddressing
  6. Security features andPolicies
  7. Redundancy and Failoverplans
  8. VPN service Deployment andimplementation

How to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity

 

Answer:

Introduction

After a detailed investigation of the infrastructure of the organization and identification of the needs of the network the report is prepared. The current needs of the organization is to establish a VPN connection between remote sites of the same organization and securely transmission of the data packets in the network. The success of the development of the network depends on the successful implementation of the VPN. The VPN services that should be identified that are needed by the organization and the scopes of the project should be defined for the implementation of the new technology.

Scopes and Limitations

For the development of the VPN network the current network framework should be identified and with the required number of hardware and software that are essential for the development of the network. The network device should be configured according to the needs of the organization and there should be used in future for the expansion of the current network. The network should be connected with a wireless router such that the users with mobile devices can connect with the wifi network for sending and receiving data packets in the network. A secure cloud solution can be used for the storage of the data and allowing the access to the limited number of users for the management of the information.

During the project development different barrier or constraint can rise that can affect the project development such as the addition of extra cost during the progress of the project. The unavailability of a hardware device and incompatibility of a device with the protocols and service required for the configuration of the vpn network should be identified before the selection of the network hardware. The skills and knowledge of the network engineer for configuration and troubleshooting the network can also become a problem for the development of the network.

 

Requirements

For the analysis of the requirement the stakeholders must be involved and the service required by them should be identified. The list of requirement for the development of the network are listed below:

  • Quality of standards should be followed for the selection of the hardware device and its installation in different parts of the network.
  • The traffic in the network should be sub divided by creating different vlan for each of the department
  • The access of the servers connected in the network should be restricted such that the employees cannot physically access the data.
  • The server should be virtualized for the management of the load and fulfill the request of the user without any delay.
  • Use of Ip addressing plan should be prepared according to the number of user for each of the department and configuration of the access network device according to the addressing plan.
  • A RADIUS server should be installed for the management of the authentication and authorization of the user connected with then network.

Solution Design

a. Logical Design

 

b. Physical Design

 

c. Network Topologies

For the development of the network the selection of the topology is important for the deployment of the network device and configuration of the network. The branch is connected using the vpn hub and spoke topology such that all the communication between the remote branches is done using the central server. A site to site vpn connection is established between the remote branches connected with each other and traffic of the internal network is passed via the hub and then the out to the destination address.

d. IP Addressing

Major Network: 172.139.28.0/22

Available IP addresses in major network: 1022

Number of IP addresses needed: 500

Available IP addresses in allocated subnets: 696

About 69% of available major network address space is used

About 72% of subnetted network address space is used

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Administrative network

50

62

172.139.30.128

/26

255.255.255.192

172.39.30.129 - 172.39.30.190

172.139.30.191

Finance Network

100

126

172.139.30.0

/25

255.255.255.128

172.39.30.1 - 172.39.30.126

172.139.30.127

Sales Network

200

254

172.139.28.0

/24

255.255.255.0

172.139.28.1 - 172.139.28.254

172.139.28.255

Dispatch Network

150

254

172.139.29.0

/24

255.255.255.0

172.139.29.1 - 172.139.29.254

172.39.29.255

 

e. Security features and policies

The application of the IPSec design between the routers can create an encrypted channel with the spoke router. The A multi-layer security model is selected for the management of the security of the network framework. The internal network is divided into different modules such that a specific module can be provided with limited access. The use CHAP authentication and RADIUS server help in maintaining the identity of the user.

f. Redundancy and failover plans

The fail over plan and the redundancy can be used for the creation of the back up link and help in increasing the network uptime. The source can reach the destination via multiple path and if one path is unavailable the other path is selected for successfully delivering the data packet.

g. VPN service implementation

For the implementation of the vpn service the router of the organization needs to be configured with the ipsec policy and an encryption key should be used for the authentication of the access of the remote user. For the implementation of the VPN service a research is done on maintaining the confidentiality of data, tunneling, authentication, integration of data. The IPSEC, PPP, MPPE protocols are used for the management of the authorization and encryption of the channels to secure the network.

VPN Network

For the development of the network the access of the security controls should be available to the network administrator such that it is ensured that the data is sent and received using secure communication tunnel. A proper authentication mechanism is followed for the authentication and authorization of the users  for creating a unique identification procedure. It is used for management of the corporate resources and ensuring secure transmission of data.

Network Diagram for configuring IPsec Client VPN

 

Configuration of Crypto isakmp

 

DMZ Zone for file and Email Server

Installation of the Email and the file server in the DMZ zone improves the security and reliability of the network and it creates a perimeter of the network where the internal resources are secured from the external resources. The DMZ is configured such that an additional security layer is imposed in the network and allows the network administrator to easily identify the breaches in the network. The demilitarized zone is created for protecting the network from different types of vulnerability and protect the network from the internal and the outside users.

Conclusion

It can be concluded that the requirement of a SME organization should be analyze for the selection of the vpn service that would help the organization to meet their long term goals. It is important to create an security policy for maintaining the access of the user to the different parts of the network. For the establishment nt of the remote connection the VPN hub and spoke topology is selected where a failover plan is also created for the management of the complexity of the network. The network suitable for the small and medium sized organization should be identified for the management of the current network capacity and management of the growth of the organization.

 

Bibliography

  1. Brewer, "Advanced persistent threats: minimising the damage", Network Security, vol. 2014, no. 4, pp. 5-9, 2014.

"IEEE/ACM Transactions on Networking society information", IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. C3-C3, 2016.

  1. Langenhan, VMware View Security Essentials. Packt Publishing, 2013.

"Optical Switching and Networking", Optical Switching and Networking, vol. 10, no. 4, pp. 463-464, 2013.

  1. Subramaniam, M. Brandt-Pearce, P. Demeester and C. Vijaya Saradhi, Cross-Layer Design in Optical Networks. Boston, MA: Springer US, 2013.

"Introduction to Information Security", Network Security, vol. 2013, no. 12, p. 4, 2013.

"The Practice of Network Security Monitoring", Network Security, vol. 2014, no. 10, p. 4, 2014.

Wang, "The Design of Improved Elman Network Intrusion Detection Algorithm in Digital Campus Network", Advanced Materials Research, vol. 1049-1050, pp. 2096-2099, 2014.

Kermanshahi, Y. Shafahi and M. Bagherian, "Application of a new rapid transit network design model to bus rapid transit network design: case study Isfahan metropolitan area", Transport, vol. 30, no. 1, pp. 93-102, 2013.

Yadegari, M. Zandieh and H. Najmi, "A hybrid spanning tree-based genetic/simulated annealing algorithm for a closed-loop logistics network design problem", International Journal of Applied Decision Sciences, vol. 8, no. 4, p. 400, 2015.

Liu and W. Qu, "Design of Campus Network Database Access Based on Encryption", Applied Mechanics and Materials, vol. 608-609, pp. 331-335, 2014.

Hosapujari and A. Verma, "Development of a Hub and Spoke Model for Bus Transit Route Network Design", Procedia - Social and Behavioral Sciences, vol. 104, pp. 835-844, 2013.

"The Comprehensive Evaluation Research of Campus Network Security Based on the Analytic Hierarchy Process (AHP)", INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences, vol. 5, no. 7, pp. 809-816, 2013.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Virtual Private Network 2. Retrieved from https://myassignmenthelp.com/free-samples/bn305-virtual-private-network-2.

"Virtual Private Network 2." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/bn305-virtual-private-network-2.

My Assignment Help (2019) Virtual Private Network 2 [Online]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network-2
[Accessed 14 August 2020].

My Assignment Help. 'Virtual Private Network 2' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/bn305-virtual-private-network-2> accessed 14 August 2020.

My Assignment Help. Virtual Private Network 2 [Internet]. My Assignment Help. 2019 [cited 14 August 2020]. Available from: https://myassignmenthelp.com/free-samples/bn305-virtual-private-network-2.


Are you feeling frustated running over assignment writing services who commit something and deliver other? Are you tired os pending huge on getting simple help for your solve my assignment problems? Well, we do not say that you should hire us but of course, you should give us a try. We know you will never look anywhere else after that. This is because we have one of the fastest turnaround time in the industry, a team of 5000+ phd experts, a strong editorial team and an ever responding student support team. Know what quality assignment means just by joining us.

Latest Networking Samples

HIST 0824 Analysis Of Sumerian Temple

Download : 0 | Pages : 2

Answer: Introduction: The artwork that I intend to discuss and that is documented in the book of Sayre is Discovering Humanities is the Sumerian Ur, the Sum. The temple of Sumer is reflective of the love of temples by the Sumerians. The Sumerians inhabited along the region between Euphrates and Tigris. They had no building stone area and therefore, the Sumerians used clay to build their buildings (Sayre, 2016). Sumerian architects also used m...

Read More arrow

MITS5003 Wireless Networks And Communication 4

Download : 0 | Pages : 2
  • Course Code: MITS5003
  • University: Victorian Institute Of Technology
  • Country: Australia

Answer: A The value of free space path loss may be gathered using distance and frequency and in the given question there are two distances and frequencies which are given below: Distances= 8 km and 16 km Frequencies= 3.6 GHz and 4.2 GHz Therefore, the value of FPSL can be obtained using the above formula and the below table indicates free space path loss at different distance and frequency:       &n...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

BIT243 Network Security

Download : 0 | Pages : 7

Answer: Introduction Macros Computer Solutions is a company that specializes in the delivery of computer accessories to its clients. All the transactions are managed by a web application software which is hosted by the company. For smooth running of the company’s activities, the company set up a network which is made up the following: Cisco 1900 Series Router, Cyberoam Firewall, a server Computer, Telephony server, a Network Access Stor...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

COSC 2671 Social Media And Network Analytics

Download : 0 | Pages : 4

Answer: Introduction Social media platforms like Twitter generates massive amount of data at every second due to the posts by its users.  There are almost 7986 tweets/second are posted on the twitter by its users (while twitter only allows 140 characters for each tweet). For this sentiment analysis of the twitter data we selected the recent ball tampering event happened in between the Australia and South Africa test match. Data collecti...

Read More arrow Tags: Australia Melbourne Management University of Melbourne 

MITS5003 Wireless Networks And Communication 3

Download : 0 | Pages : 8
  • Course Code: MITS5003
  • University: University Of Victoria
  • Country: Canada

Answer: Introduction Wireless networks and communication is a broad topic that basically explains communication using wireless devices. It can mainly be subdivided into main bits. One is wireless communication and the other one is communication. Wireless communication is a type of communication that is performed and delivered wirelessly (Acemoglu, Malekian, & Ozdaglar, 2016). This terms broadly defined all procedures and forms of communic...

Read More arrow Tags: Australia Lakemba 45 wireless network and communication University of Victoria 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,385,831

Orders

4.9/5

Overall Rating

5,086

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

184 Order Completed

96% Response Time

Arapera Billing

Masters in Management, MMgt

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!

flag

User Id: 383727 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied

flag

User Id: 463334 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.

flag

User Id: 194216 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.

flag

User Id: 411395 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?