GET ASSURED A++ GRADE IN EACH SECURITY TECHNIQUES AND POLICIES ASSIGNMENT ORDER - ORDER FOR ORIGINALLY WRITTEN SOLUTIONS!
BN305 Virtual Private Networks Assignment - Secure Network Design and Implementation, Melbourne Institute of Technology, Australia
Purpose of the assessment (with ULO Mapping) -
1. Describe architectural VPN design for small, medium and large businesses and corporations.
2. Report on the health of the existing VPN architecture, solution, data, application, and technology.
3. Discuss the appropriate security design and solutions for varieties of organisations.
4. Report on the current and future state of the management of VPN infrastructure and its technologies.
5. Interpret a roadmap process to transform the VPN architecture to support long- term organisations' goals.
6. Implement a process to support the administration and the management of VPN.
Task - Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria.
1. Design a network for National Cyber Security Services Inc.
2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main branch in Brisbane.
3. You need to select the IP address of your network at main branch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other branches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection.
NO PLAGIARISM POLICY - ORDER NEW SECURITY TECHNIQUES AND POLICIES ASSIGNMENT & GET WELL WRITTEN SOLUTIONS DOCUMENTS WITH FREE TURNTIN REPORT!
Solution - Secure Network Design and Implementation
Introduction
The case study that is being discussed is about "National Cyber Security Services" situated at Brisbane. It has decided for enlarging the business processes across Australia in two new locations namely: Sydney and Melbourne.
They have as well instituted a plan of interconnecting the three sites through a connection which is secure. The corporate office provides a remote location services for two new sites planned. Of which the two towns: Melbourne and Sydney will have 5 and 3 connections respectively.
Specifically, VPN relates to a kind of network architecture which employs a private network to connect the devices with the internet. All processes of communication are conducted through a system that is well encrypted and secured. Basically, the goal of VPN network is to safeguard the integrity of communications. Accordingly, it puts in place diversity and mechanism of authentication checks and authorization to ensure that only the right people are able to access their accounts. The strict authorization and authentication measures are meant to prevent unauthorized access.
The scope and Limitations of this Project
This project's scope entails connecting three different locations of a company via a secure network connection and provides a platform to connect employees situated at new location remotely. The Corporate IT department is planning to establish the new technology based on a VPN Network.
VPN service Parts and Network Parts Requirements
Hardware Components
- Desktop machine required Qty
- L4 Switch port
- Router with a capability of connecting three sites network
- optic fibre
- I-Internet S-S P I-Internet Provider
- Printing machine
- Network Interfaces
- Add-on tools and devices
Virtual Private Components
- Client VPN software
- Routers, Switches, and Firewalls to be placed at client side
- Monitoring tool for the networks
ENDLESS SUPPORT IN SECURITY TECHNIQUES AND POLICIES ASSIGNMENTS WRITING SERVICES - YOU GET REVISED OR MODIFIED WORK TILL YOU ARE SATISFIED WITH OUR SECURITY TECHNIQUES AND POLICIES ASSIGNMENT HELP SERVICES!
Logical design VPN Network
The design of the VPN network within the whole organization is described below
The 2 new sites were planned to be connected via VPN IP Security Channel to provide remote access services to corporate office.
Physical design
The network is fully analysed and circuit was developed for interconnection. The physical components from Cisco packet tracer were placed accordingly to our requirement. IP were configured at all nodes and simulated short ping between the 2 nodes.
Topology for Virtual (V) Private (P) Network (N)
Design of this Network indicates the meaningful organization entities that are connected through this network. The Network is designed on 2-d topologies based on the data flows within the network and the way they are connected.
The designing of the network design consists of various topologies by design.
The topology of Hub spoke (HS)
point topology- Point -
Full mesh VPN network topology
The diagram above better illustrates the different topologies of the VPN network. The comapnys head office is based in Brisbane, Australia. There are also a number of branches within the larger Australia. 3 sites will be connected via VPN's IPsecurity tunnel. With this design services for the remote employees can be provided. Currently, mesh topology is the preferred and suggested network infrastructure.
IP Addressing Outline
Within the internet, every computer harbours what we call an IP address. In this regard, the network administrator is mandated to assign a specific IP address for every computer which has a network connection. IP are classified in 2 groups, that is, Static and dynamic IP addresses.
In any network, every IPv address is unique. If two becomes similar, then this will result into duplication. The standard size for a normal IP address is 4-byes long. The internet is established by combining more than one network. A router is then used to connect the different networks. The router traces the IPv address for each of the components connected in a network.
24/7 AVAILABILITY OF TRUSTED SECURITY TECHNIQUES AND POLICIES ASSIGNMENT WRITERS! ORDER ASSIGNMENTS FOR BETTER RESULTS!
Internet Protocol (IP) address Groups
IP addressing is done by vendors and those are classified as class A, B, C, D and E. However, the class D and E are not available for general utilisation.
Scheme of IP address
The above diagrams illustrate the different IP addresses as well as the range of IP addresses supported by each class. For these 4 parts, Class A the network ID is represented by the decimal parts while for class B, the network ID is represented by first two parts. On the other hand, class C network ID is represented by the first three parts. When a network ID carries more bits compared with the host ID, it then becomes possible for the type of class is capable of holding many networks compared with the host.
Similarly, if a Host ID happens to occupy more bits of IP address compared to what the network ID has, this implies that the class harbours more host compared to the networks. On the basis of host identifier and network Identifier, the number of host networks and machines are assigned.
Corporate office of the company will be connected to the new branch sites. The 3 sites will be connected via the IPs security tunnel of the VPN's network. Besides, the network will be able to deliver services even for remote users as well. The specific network infrastructure harbours different networks while every network carries a diversity of terminals. Class B is deemed viable in connecting all terminals and networks.
Policy and techniques for Security features
Policies for VPN contains access rights, list of user connected to the network. When users from remote location pings the host machine of other users, he will be getting a output.
Various techniques are also available for the secure connection [3].
Steps to be followed for secure connection via VPN.
1. Fire wall shall be upgraded to latest
2. Antivirus shall be available in all sites
3. OS features like security features shall be discussed at earlier stage.
4. IP private network
SAVE DISTINCTION MARKS IN EACH SECURITY TECHNIQUES AND POLICIES ASSIGNMENT WHICH IS WRITTEN BY OUR PROFESSIONAL WRITER!
Plans for Failover and Redundancy
Redundancy
Redundancy refers to a precautionary action taken against VPN network failures. In this regard, a secured link will be used to interconnect the remote devices inherent in the VPN networks. Furthermore, alternative links are also used to connect the inter-connected devices. Redundancy is also a term commonly used in reference to a concept where devices are connected via alternative measure. Even if one part of a network fails, there would be no inconveniences since there will always be others to take charge. With this concept, the corporate network will operate smoothly and without interruptions. Network redundancy is a critical factor when it comes to corporate networking.
Plans for Failover
Encrypted transmission channel is commonly employed in VPN network are for communication purposes within the devices. The IPSecchannel is identified as tunnel.
- The tunnel is protected by firewalls on both sides
- All firewalls are equipped with interfaces
VPN service deployment and Implementation
For effective deployment of VPN network it is required that the software at client's base be installed with components like core switch, VPN routers. The VPN router and Load balancer will ensure that traffic is minimised at VPN. The IPsec channel is a secure channel which is used to connect VPN securely. This network needs a NAT network address Translation rather than a standard router IP forwarding system. Furthure, it also needs an IDS I-intrusion, S-System as well as D-Detection on both sides of the IPsec channel to provide stable security services.
Conclusion
The establishment of network connection at two new sites is deemed successful. The company has also a plan in place to guarantee that the interconnection of the three sites is done through a secure secured connection. The final corporate network will be able to support remote service operation of company employees in Melbourne and Sydney.
Basically, the project analysed the VPN requirement, design and implementation for the case company. The report has represented the key requirements of the VPN network implement for the specific organisation within the set specifications. The stimulation of the VPN network is done using CISCO packet tracer simulation equipment.
HIRE PROFESSIONAL WRITER FROM EXPERTSMINDS.COM AND GET BEST QUALITY SECURITY TECHNIQUES AND POLICIES ASSIGNMENT HELP AND HOMEWORK WRITING SERVICES!
Avail the best Melbourne Institute of Technology, Australia Assignment Help for below mentioned units and courses:-
- BN301 Industry-Based Project Assignment Help
- BN303 Wireless Networks and Security Assignment Help
- BN309 Computer Forensics Assignment Help
- BN311 IT Security Management Assignment Help
- BN314 System Architecture Assignment Help
- BN315 Enterprise Architecture Assignment Help
- BN321 Advanced Network Design Assignment Help
- BN322 Software Defined Networking Assignment Help
- BN323 Ethical Hacking and Security Governance Assignment Help
- BN324 Enterprise Cyber Security and Management Assignment Help