The network security and users requirements

Assignment Help Management Information Sys
Reference no: EM131516485

Virtual Private Networks (VPN) : iLab Overview

Scenario/Summary

In this lab, you will explore, select, and justify the selection of a virtual private network (VPN) for a midsize network.

You shall actually identify the hardware and software needed to meet the network security and users requirements.

The reason for this lab is to allow you to experience the VPN technology selection process, while working with a limited set of requirements and the current industry offerings.

Basic VPN requirements and assumptions are as follows.

· Access control to the VPN is based on a user ID and password.

· 120 simultaneous VPN connections must be supported.

· User (client) connection speeds range from 3 to 30 megabits.

· No, or minimal, client software setup is required.

· No special hardware is required by the client system.

· Full data encryption for all network traffic is required. Protection against man-in-the-middle attacks is required.

· Remote administration (includes reconfiguration) to the VPN is required.

· Access control and right or permissions are integrated into other services, such as active directory for Windows configurations.

· Access (read or write) to network resources, such as file shares (virtual drives), web servers, database servers, and so forth is required.

· Assume users will be using a Windows, MAC, and Linux client system released within the last 3 years.

· Assume a web browser will be used to access the web servers. Assume the client will have preinstalled applications that can access file shares and database servers.

· Assume the host firewall will support your selection.

· The selected vendor(s) must have an excellent reputation for quality and support.

· Cloud-based, non-cloud-based, and hybrid solutions are all acceptable.
Listen

Deliverables

NOTE

Submit your assignment to the Dropbox, located at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions.

(See the Syllabus section "Due Dates for Assignments & Exams" for due dates.)
Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.

Lab Document Framework

· Potentially Acceptable VPN Solution: State the general characteristics of one solution that meets the security and user requirements. Name the vendor(s) and VPN services. It is generally about 3 sentences.

· VPN Solution Overview: Outline the technical functionality and customer requirements of your first choice for a VPN service. This may take the form of a feature chart that is mapped to the requirements. Include any special conditions, limitations, or exceptions that exist. It is generally about 2 pages.

· Network Design Illustration: Using a graphic illustration tool, such as Visio, document the logical design of your VPN solution. It is generally about 2 pages.

· Citations and Resources Used in this Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit and tell us why you believe it is correct.

Step 1

Given the above requirements (see scenario or summary), select one (1) potentially acceptable VPN solution found through your research (see suggested resources). This is likely to be a combination of vendor products and services. An example is provided in the textbook and in the URLs below.
Listen

Step 2

Outline the technical functionality and customer requirements of your first choice for a VPN service. Indicate what the VPN can do, with respect to the requirements.
Listen

Step 3

Create a graphic illustration of the logical network design. Show how the technical functionality and customer requirements come together in your selection of a VPN service.

Listen

Suggested Resources

Your textbook and other related textbooks

The DeVry Online Library

Professional Journals and Security Website

Reference no: EM131516485

Questions Cloud

Discuss the social exchange theory : What are some great topics and example essays to write on for an informative critique essay on "referential theory" and also example topics and essays.
Phases of the smp and sisp processes : discuss the key similarities and differences in comparing the first three phases of the SMP and SISP processes.
What are your thoughts on environmental degradation : For this next source you will listen to a short podcast of several interviews on environmental history. Environmental History is a growing field of study.
Briefly state your reasoning for attending school : I have attached the student's appeal letter which doesn't meet the requirements. It looks like he doesn't have a serious/unforeseen mitigating circumstance.
The network security and users requirements : Identify the hardware and software needed to meet the network security and users requirements.
What does this mean in terms of organizing an essay : Remember the "streetcar" metaphor: "People need to know what streetcar they are getting onto, you see, because they want to know where they will be.
Define regular expressions and explain their purpose : Define regular expressions and explain their purpose. Examine the shortcomings of regular expressions.
How should company f report the given facts : How should company F report the above facts on its December 31, 20XX balance sheet and income statement? Support your answer.
Describe the pathophysiology of the disease process : Discussed the genomic issues inherent in the disease process, including what is known and what is not known.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd