CIS114-6 Network Systems and Administration Assignment

Assignment Help Computer Network Security
Reference no: EM132507448 , Length: word count:3000

CIS114-6 Network Systems and Administration - Majan University College - University of Bedfordshire

Learning Outcome 1: Demonstrate deep and systematic understanding of system and networking concepts, including principles, technologies, and emerging trends.

Learning Outcome 2. Scientifically and critically analyse, implement and evaluate networking techniques, technologies, strategies and methodologies used in industry. Apply analytical and problem-solving skills in order to select and implement networking solutions appropriate to multiple organisational and environmental contexts.

Your Problem is to implement a virtualised environment-based solution demonstrating the operation of a VPN operating in site-to-site (Tunnel mode). Your virtual machines (VMs) requirements must include 2 VyOS routers (fully configured using the VyOS router own commands - similar to Juniper and Cisco routers commands

1314_figure.jpg

Figure 2 shows an optional configuration where additional XP VMs are to be used to demonstrate the VPN operations in both site-to-site and remote VPN (Tunnel and Transport modes) with additional Wireshark captures to be performed from one of the XP VMs.

Use of a command line sniffer such as tcpdump should is required on the networks to demonstrate the mode of operation.
You are required to either build the VMs from scratch or use the official VyOS VM available from our FTP server (see document on BREO), Dr Ali Mansour's shared Google drive (see link on BREO).

Problem 1 Implement the topology shown in Figure 1 with fully functional routers (i.e. a network connecting the two VyOS routers).
The network should be configured, tested, demonstrated, and clearly documented (part of Problem 3) showing its full operation. Routing between the two routers must be configured using any form of routing. Details of your routing implementation must be clearly stated/shown.

Problem 2 Configure, test, and demonstrate the VPN operation.
Captured traffic must be shown to demonstrate the operation of the VPN and when the VPN is not active.

Problem 3 Technical report documenting all the work done in the previous tasks. See the points below under Documentation Requirements.

Attachment:- Network Systems and Administration.rar

 

Reference no: EM132507448

Questions Cloud

How strict or how lenient you want to make the policies : You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked.
What is the project year 0 net cash flow : What is the project's Year 0 net cash flow? What is the project's Year 1 net cash flow?
Discussion about the topic telecommunications : Telecommunications Topics Paper: Select a topic on either 1) The Internet of Things (Industrial Internet), 2) Cloud Computing, or 3) Security.
What would be the fixed cost per unit at an activity level : What would be the fixed cost per unit at an activity level of 3,500 units? Assume that this level of activity is within the relevant range.
CIS114-6 Network Systems and Administration Assignment : CIS114-6 Network Systems and Administration Assignment Help and Solution, Majan University College - University of Bedfordshire - Assessment Writing Service
What would be the approximate wacc : This project relates to construction of a new airport in Ankara and expected cash flows are as follows. If the MIRR is 10,3%, what would be the approximate WACC
Discuss corporate success and corporate failure : Discuss corporate success or corporate failure scenario of leader where leader either resonated or failed to resonate with culture required on global scale.
What is cost of goods sold budget for andrews company : What is cost of goods sold budget for Andrews Company? Round your answers to the nearest dollar. I am stuck on how to calculate direct labor
Calculate the sales volume variance for variable costs : Calculate the sales volume variance for variable costs.Static Budget, Actual budget:- sales volume, sales price, Variable cost, fixed cost.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  What types of risks or vulnerabilities could be transferred

What types of risks or vulnerabilities could be transferred from a supplier and/or imposed upon a purchaser of cyber security related products and/or services?

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  What services are provided by the ssl record protocol

What services are provided by the SSL Record Protocol? What is the purpose of HTTPS? What services are provided by IPsec?

  Analyse and discuss common emerging threats and attacks

Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

  Implementation of various systems moving forward

Explain how the impact of HIPPA and HITECH regulations will impact the implementation of various systems moving forward. Consider impacts to and from federal, local, software vendors/users, hardware vendors/users, infrastructure, and organizationa..

  What is a spoofing attack

What is a spoofing attack? Briefly provide two common types of spoofing attacks executed by adversaries to attack access control.

  Identify laws that would be effective to convict offenders

Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations.

  Determine what the risk to an organisation is

Determine what the risk to an organisation is, you need to know what the problems could be - how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

  Draft the required system security plan for a system

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System

  Provide a historical timeline of homeland security events

Provide a historical timeline of homeland security incidents along with the call for improved preparedness, response and recovery needs that lead to the creation of National Incident Management Systems and the National Response Framework documents..

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd