Task - Configure, test, and demonstrate the VPN operation

Assignment Help Computer Networking
Reference no: EM132517977 , Length: word count:3000

CIS114-6 Network Systems and Administration Assignment - Portfolio

Unit learning outcomes -

1. Demonstrate deep and systematic understanding of system and networking concepts, including principles, technologies, and emerging trends.

2. Scientifically and critically analyse, implement and evaluate networking techniques, technologies, strategies and methodologies used in industry. Apply analytical and problem-solving skills in order to select and implement networking solutions appropriate to multiple organisational and environmental contexts.

Task - Your task is to implement a virtualised environment-based solution demonstrating the operation of a VPN operating in site-to-site (Tunnel mode). Your virtual machines (VMs) requirements must include 2 VyOS routers (fully configured using the VyOS router own commands - similar to Juniper and Cisco routers commands as shown in Figure 1 attached.

Figure 2 attached shows an optional configuration where additional XP VMs are to be used to demonstrate the VPN operations in both site-to-site and remote VPN (Tunnel and Transport modes) with additional Wireshark captures to be performed from one of the XP VMs.

Note: The values of XXX, and YYY will be allocated to each student separately by the unit staff and published on BREO to use in your configuration. No student is to use any numbers not allocated to them. Use of a command line sniffer such as tcpdump should is required on the networks to demonstrate the mode of operation.

You are required to either build the VMs from scratch or use the official VyOS VM available from our FTP server (see document on BREO), Dr Ali Mansour's shared Google drive (see link on BREO), or from the official website.

A brief description of the requirements is given below:

Task 1 - Implement the topology shown in Figure 1 with fully functional routers (i.e. a network connecting the two VyOS routers).

The network should be configured, tested, demonstrated, and clearly documented (part of task 3) showing its full operation. Routing between the two routers must be configured using any form of routing. Details of your routing implementation must be clearly stated/shown.

Task 2 - Configure, test, and demonstrate the VPN operation.

Captured traffic must be shown to demonstrate the operation of the VPN and when the VPN is not active.

Task 3 - Technical report documenting all the work done in the previous tasks. See the points below under Documentation Requirements.

Optional Task - Implement the topology shown in Figure 2 using the same network in Task 1 extended with 2 Windows XP VMs to demonstrate transport mode operation. The network should be configured, tested, demonstrated, and clearly documented as in Task 3 requirements showing its full operation. Wireshark captured traffic must be shown to demonstrate the operation of the VPN and when the VPN is not active.

Demonstrations - To demonstrate the full operation of your systems in your report with accompanying screenshots and sniffer dumps, follow the steps below:

1. Test the connectivity between the two routers to show successful results.

2. Capture the connection traffic using a sniffer installed on one of the routers.

3. Activate your VPN tunnel and check the connection between the routers.

4. Capture the traffic over the VPN tunnel.

5. Compare the two types of captured traffic and explain your results.

Attachment:- Portfolio Assignment Files.rar

Reference no: EM132517977

Questions Cloud

Effect on increasing the marginal propensity : Explain what effect on increasing the marginal propensity to save will have on the slope of the planned aggregate expenditures line
Discuss citibank return on equity : Discuss citibank's return on equity (ROE). Share the latest news about citibank (Things during Covid-19)
Solve the acquisition cost of the gizmo machine : Provide the journal entries that would appear in Tea Tree Bay Ltd's books to account for the acquisition of the Gizmo Machine.Solve the acquisition cost
How does the new project support cost control : How does this new project support cost control? What areas of concern should the health system be mindful of if pursuing this project?
Task - Configure, test, and demonstrate the VPN operation : Task 2 - Configure, test, and demonstrate the VPN operation. Captured traffic must be shown to demonstrate the operation of the VPN and when VPN is not active
Make only the general ledger bank account in t format : Make only the general ledger "Bank Account" in "T" format properly balanced. Show the number of the transaction, the contra account in the details column
Perform security evaluation on the provided virtual machine : Perform a security evaluation on the provided virtual machine image. You have not been supplied with either the IP address of the system or any usernames
Draw the firm profit maximizing graph : The table below shows the total cost and revenue of a pharmacy.
How many units will have to be sold to meet target profit : Assume that next year Management wants the company to earn the profit at least $150,000. How many units will have to be sold to meet this target profit?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd