CIS114-6 Network Systems and Administration Assignment

Assignment Help Computer Network Security
Reference no: EM132507448 , Length: word count:3000

CIS114-6 Network Systems and Administration - Majan University College - University of Bedfordshire

Learning Outcome 1: Demonstrate deep and systematic understanding of system and networking concepts, including principles, technologies, and emerging trends.

Learning Outcome 2. Scientifically and critically analyse, implement and evaluate networking techniques, technologies, strategies and methodologies used in industry. Apply analytical and problem-solving skills in order to select and implement networking solutions appropriate to multiple organisational and environmental contexts.

Your Problem is to implement a virtualised environment-based solution demonstrating the operation of a VPN operating in site-to-site (Tunnel mode). Your virtual machines (VMs) requirements must include 2 VyOS routers (fully configured using the VyOS router own commands - similar to Juniper and Cisco routers commands

1314_figure.jpg

Figure 2 shows an optional configuration where additional XP VMs are to be used to demonstrate the VPN operations in both site-to-site and remote VPN (Tunnel and Transport modes) with additional Wireshark captures to be performed from one of the XP VMs.

Use of a command line sniffer such as tcpdump should is required on the networks to demonstrate the mode of operation.
You are required to either build the VMs from scratch or use the official VyOS VM available from our FTP server (see document on BREO), Dr Ali Mansour's shared Google drive (see link on BREO).

Problem 1 Implement the topology shown in Figure 1 with fully functional routers (i.e. a network connecting the two VyOS routers).
The network should be configured, tested, demonstrated, and clearly documented (part of Problem 3) showing its full operation. Routing between the two routers must be configured using any form of routing. Details of your routing implementation must be clearly stated/shown.

Problem 2 Configure, test, and demonstrate the VPN operation.
Captured traffic must be shown to demonstrate the operation of the VPN and when the VPN is not active.

Problem 3 Technical report documenting all the work done in the previous tasks. See the points below under Documentation Requirements.

Attachment:- Network Systems and Administration.rar

 

Reference no: EM132507448

Questions Cloud

How strict or how lenient you want to make the policies : You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked.
What is the project year 0 net cash flow : What is the project's Year 0 net cash flow? What is the project's Year 1 net cash flow?
Discussion about the topic telecommunications : Telecommunications Topics Paper: Select a topic on either 1) The Internet of Things (Industrial Internet), 2) Cloud Computing, or 3) Security.
What would be the fixed cost per unit at an activity level : What would be the fixed cost per unit at an activity level of 3,500 units? Assume that this level of activity is within the relevant range.
CIS114-6 Network Systems and Administration Assignment : CIS114-6 Network Systems and Administration Assignment Help and Solution, Majan University College - University of Bedfordshire - Assessment Writing Service
What would be the approximate wacc : This project relates to construction of a new airport in Ankara and expected cash flows are as follows. If the MIRR is 10,3%, what would be the approximate WACC
Discuss corporate success and corporate failure : Discuss corporate success or corporate failure scenario of leader where leader either resonated or failed to resonate with culture required on global scale.
What is cost of goods sold budget for andrews company : What is cost of goods sold budget for Andrews Company? Round your answers to the nearest dollar. I am stuck on how to calculate direct labor
Calculate the sales volume variance for variable costs : Calculate the sales volume variance for variable costs.Static Budget, Actual budget:- sales volume, sales price, Variable cost, fixed cost.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd