The network security and users requirements

Assignment Help Management Information Sys
Reference no: EM131516485

Virtual Private Networks (VPN) : iLab Overview

Scenario/Summary

In this lab, you will explore, select, and justify the selection of a virtual private network (VPN) for a midsize network.

You shall actually identify the hardware and software needed to meet the network security and users requirements.

The reason for this lab is to allow you to experience the VPN technology selection process, while working with a limited set of requirements and the current industry offerings.

Basic VPN requirements and assumptions are as follows.

· Access control to the VPN is based on a user ID and password.

· 120 simultaneous VPN connections must be supported.

· User (client) connection speeds range from 3 to 30 megabits.

· No, or minimal, client software setup is required.

· No special hardware is required by the client system.

· Full data encryption for all network traffic is required. Protection against man-in-the-middle attacks is required.

· Remote administration (includes reconfiguration) to the VPN is required.

· Access control and right or permissions are integrated into other services, such as active directory for Windows configurations.

· Access (read or write) to network resources, such as file shares (virtual drives), web servers, database servers, and so forth is required.

· Assume users will be using a Windows, MAC, and Linux client system released within the last 3 years.

· Assume a web browser will be used to access the web servers. Assume the client will have preinstalled applications that can access file shares and database servers.

· Assume the host firewall will support your selection.

· The selected vendor(s) must have an excellent reputation for quality and support.

· Cloud-based, non-cloud-based, and hybrid solutions are all acceptable.
Listen

Deliverables

NOTE

Submit your assignment to the Dropbox, located at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions.

(See the Syllabus section "Due Dates for Assignments & Exams" for due dates.)
Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.

Lab Document Framework

· Potentially Acceptable VPN Solution: State the general characteristics of one solution that meets the security and user requirements. Name the vendor(s) and VPN services. It is generally about 3 sentences.

· VPN Solution Overview: Outline the technical functionality and customer requirements of your first choice for a VPN service. This may take the form of a feature chart that is mapped to the requirements. Include any special conditions, limitations, or exceptions that exist. It is generally about 2 pages.

· Network Design Illustration: Using a graphic illustration tool, such as Visio, document the logical design of your VPN solution. It is generally about 2 pages.

· Citations and Resources Used in this Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit and tell us why you believe it is correct.

Step 1

Given the above requirements (see scenario or summary), select one (1) potentially acceptable VPN solution found through your research (see suggested resources). This is likely to be a combination of vendor products and services. An example is provided in the textbook and in the URLs below.
Listen

Step 2

Outline the technical functionality and customer requirements of your first choice for a VPN service. Indicate what the VPN can do, with respect to the requirements.
Listen

Step 3

Create a graphic illustration of the logical network design. Show how the technical functionality and customer requirements come together in your selection of a VPN service.

Listen

Suggested Resources

Your textbook and other related textbooks

The DeVry Online Library

Professional Journals and Security Website

Reference no: EM131516485

Questions Cloud

Discuss the social exchange theory : What are some great topics and example essays to write on for an informative critique essay on "referential theory" and also example topics and essays.
Phases of the smp and sisp processes : discuss the key similarities and differences in comparing the first three phases of the SMP and SISP processes.
What are your thoughts on environmental degradation : For this next source you will listen to a short podcast of several interviews on environmental history. Environmental History is a growing field of study.
Briefly state your reasoning for attending school : I have attached the student's appeal letter which doesn't meet the requirements. It looks like he doesn't have a serious/unforeseen mitigating circumstance.
The network security and users requirements : Identify the hardware and software needed to meet the network security and users requirements.
What does this mean in terms of organizing an essay : Remember the "streetcar" metaphor: "People need to know what streetcar they are getting onto, you see, because they want to know where they will be.
Define regular expressions and explain their purpose : Define regular expressions and explain their purpose. Examine the shortcomings of regular expressions.
How should company f report the given facts : How should company F report the above facts on its December 31, 20XX balance sheet and income statement? Support your answer.
Describe the pathophysiology of the disease process : Discussed the genomic issues inherent in the disease process, including what is known and what is not known.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Joint application developmenti do agree with you that jad

joint application developmenti do agree with you that jad has its advantages over the traditional design techniques of

  In working out your responses to the discussion question

in working out your responses to the discussion question you should choose examples from your own experience or find

  How do i set-up the problem

How do I set-up the problem and What formula, if any, should be used in this problem?

  Write five takeaways

Write 5 "takeaways" from the files that are in the assignment file attached.

  Effective change in an organizationwho owns change in an

effective change in an organizationwho owns change in an organization? the party creating the change or the party that

  Define what professional organizations you might join

Assignment : I need someone to Write a no more than 2-page paper discussing what professional organizations you might join, and websites you might visit, that would provide insight into a career in network security that includes responsibility for..

  Evaluate the four risk-mitigation options and strategies

Explain how ITPM best practices can facilitate process change within an organization. Determine if ITPM would be used differently depending upon the industry in which it was used. Explain your answer.Evaluate the four risk-mitigation options and st..

  What evidence do you have to support your thesis

Provide an overview of what your paper is about, including a thesis statement. What background information is necessary to understand your thesis?

  Describe at least two forms of fraud techniques

describe two forms of fraud techniques from your research. Include identity of government agencies that provide awareness for these types of fraud techniques.

  Calculate rollback values for determining optimal strategy

Calculate rollback values for determining the optimal strategy - Decision tree models include such concepts as nodes, branches, terminal values, strategy, payo? distribuGon, certain equivalent, and the rollback method

  Calculate the probability that these two cards are an ace

Two cards are to be drawn from a standard deck of 52 cards. Calculate the probability that these two cards are an ace and a 10, drawn in any order.

  Research and read about operating systems

Give a summary of the article, including the primary topic, your own summary of the information presented, and the author's conclusion. Give your personal evaluation of the article, including topics that made the article interesting to you (or not..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd