BN305 Virtual Private Networks Assignment

Assignment Help Other Subject
Reference no: EM132444722 , Length: 6 pages

BN305 Virtual Private Networks - Melbourne Institute of Technology

Assessment - Secure Network Design and Implementation

Purpose of the assessment

This assignment assesses the following

Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

• Describe architectural VPN design for small, medium and large businesses and corporations
• Report on the health of the existing VPN architecture, solution, data, application, and technology
• Discuss the appropriate security design and solutions for varieties of organisations
• Report on the current and future state of the management of VPN infrastructure and its technologies
• Interpret a roadmap process to transform the VPN architecture to support long- term organisations' goals
• Implement a process to support the administration and the management of VPNAssignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (CyberVision Inc.) by addressing the following criteria. See detailed instruction in the next section.

2. Presentation.

Part A description:

Situation

Many companies use frame relay or leased lines to provide secure communications with their business partners, subsidiaries, and vendors. Unfortunately, these solutions are often expensive and geographically limiting. VPN offers an alternative for companies who want private, cost-effective communications.

Suppose you are a major parts supplier to a manufacturer. Since it is critical that you have the specific parts and quantities at the exact time required by the manufacturing firm, you always need to be aware of the manufacturer's inventory status and production schedules. Perhaps you handle this interaction manually today, and find it time consuming, expensive and even inaccurate at times. You want to find an easier, faster, and more effective way to communicate with your manufacturing company. However, given the confidentiality and time-sensitive nature of the information you exchange, the manufacturer does not want to publish it on its corporate Web site or distribute it monthly in an external report. By exploiting the public Internet, you can easily establish a VPN to meet the needs of both companies.

Objectives

In this scenario, MyCo wants to establish a VPN between a host in its parts division and a host in the manufacturing department of one their business partners, TheirCo.

Because the information these two companies share is highly confidential, it must be protected while it travels across the Internet. In addition, data must not flow in the clear within either company's networks because each network considers the other untrusted. In other words, both companies require end-to-end authentication, integrity, and encryption.

Details

The following figure illustrates the network characteristics of MyCo and TheirCo:

Details
The following figure illustrates the network characteristics of MyCo and TheirCo:

414_Network setup.jpg

Figure-1: MyCo and TheirCo network setup

MyCo Supply Network
• System A has an IP address of 10.6.P.1. This is the connection endpoint, as well as the data endpoint, whereas P is number composed of last two (FIFTH and SIXTH) digit from your MIT ID number. That is, System A performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.
• System A is in subnet 10.6.P.0 with mask 255.255.0.0
• Only System A can initiate the connection with System C.

TheirCo Manufacturing Network
• System C has an IP address of 10.196.Q.8 , whereas Q is number composed of THIRD and FOURTH digit from your MIT ID number This is the connection endpoint, as well as the data endpoint. That is, System C performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.
• System C is in subnet 10.196.Q.0 with mask 255.255.255.0

Your Tasks

1. Design a network for MyCo and TheirCo Inc.
2. Build VPN services for the users. The network solution would be built on a simulator i.e CISCO Packet tracer and include establishing a VPN from two sites as discussed above.

Report must include:

• Introduction
• Scopes and Limitations
• Requirements (Network parts and VPN service parts)
• Solution Design

o Logical Design
o Physical Design
o Network Topologies
o IP addressing
o Security features and Policies
o Redundancy and Failover plans
o VPN service Deployment and implementation
• Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity.

Part B description:

Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well.

Attachment:- Secure Network Design and Implementation.rar

Reference no: EM132444722

Questions Cloud

Medical cost plus administration expenses : a. What is the PMPM rate that Bay Pines must set to cover medical cost plus administration expenses?
Describe the role of Courts : Write a 1,050 word paper in which you describe the role of courts in determining the nature of federal and state relations
Primary considerations in making the decision : What are the primary considerations in making the decision to develop this product?
Assess what role ethics and corporate social responsibility : Assess what role ethics and corporate social responsibility (CSR) appears to play in Caterpillar. What changes would you recommend regarding these and why?
BN305 Virtual Private Networks Assignment : BN305 Virtual Private Networks Assignment Help and Solution, Secure Network Design and Implementation Assessment Help- Melbourne Institute of Technology
Evaluating the health of a company : Based upon the outline you completed in Module 4, write a draft of your term project.
Briefly explain what the simulation modeling relies upon : According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior.
Reasons that a high proportion of funds : What are some of the reasons that a high proportion of funds should not be invested in current assets?
Review the strategic management project background : Identify and assess the two most important factors/issues of Caterpillar's internal environment.

Reviews

Write a Review

Other Subject Questions & Answers

  Regarding the employment at-will doctrine

Which is TRUE regarding the employment at-will doctrine in the United States?

  Codes should not be listed as principal diagnosis

Which of the following codes should not be listed as principal diagnosis?

  Personality disorder and bipolar personality disorder

What is the difference between borderline personality disorder and bipolar personality disorder?

  Operational definitions for sexual jealousy

Think of three operational definitions for sexual jealousy, decisiveness, and social anxiety. Consider the possibility of self-report, behavioral, and physiological measures. Be as precise as you can.

  Discuss two completely different controversial topics

Discuss two completely different controversial topics, not just one. This assignment is asking you to explore and brainstorm two possible persuasive essay topic

  Mysterious character of the commodity-form consists

"The mysterious character of the commodity-form consists therefore simply in the fact that the commodity reflects the social characteristics of men's own labor as objective characteristics of the products of labor themselves, as the socio-natural pro..

  What circumstances available to proceed with blood draw

CMRJ306 In the case The State of Texas v. David Villarreal, Officers pulled over and arrested David Villarreal on the charge of driving while intoxicated.

  Identify of effective testimony in the video murder

a description of the four examples of effective testimony you selected from the video Murder on a Sunday Morning. Then explain why and how you think each is effective, and be sure to identify the elements of each example that contribute to its eff..

  Distinguish between descriptive and inferential statistics

what are statistics and how are they used in the behavioral sciences? your answer should be 100 to 200

  What are the building blocks of sexual identity

SOC 64 Assignments - Sociology of Sexuality. What are the building blocks of sexual identity? Provide examples. What is the concept of fluidity in sexuality

  Scenario planning helps managers to ensure the safety

reviewing the current scholarship and professional publications - Scenario Planning helps managers to ensure the safety of the environment for society

  Explain the strengths and weaknesses of each board

In a brief memo to your instructor, describe the strengths and weaknesses of each and which job board appears to be the easiest to use? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd