Critically compare and evaluate iam and zero trust solutions

Assignment Help Computer Networking
Reference no: EM133959032

Design Network Infrastructure

Assessment Item 1:

Session 1:
Download and install FreePBX
Submit a MS Word report/PDF with screenshots of you installing FreePBX in a virtual machine and include your answers to the following: Explain where VoIP, MQTT, IAM, Carrier Ethernet, and Cloud lie on Ganter Hype Cycle.
Also identify new Networking technologies that you may become mainstream and why.

Session 2:
Configure FreePBX with softphones.
Submit a MS Word report/PDF with screenshots of phone configurations and include your answers to the following:

What protocols does freePBX use (tip: use wireshark and capture the packets from FreePBX to determine) Critically compare VoIP protocols
Discuss the future of VoIP.

Session 3:
Download and install flexiwan.
Research and configure flexiwan for load balancing and WAN compression.
Submit a MS Word report/PDF with screenshots of your flexiWAN configuration and include your answers to the following: Explain how load balancing and WAN compression can be considered Software Defined Networks.
Explain how Software Defined Networks separates the control, data and management plane. Research Kubernetics and Minicube. Explain the difference and collect links on how to install them.

Session 4
Download and install Minikube on an Ubuntu. Following this tutorial:
If you get the following errors:
Minikube Errors:
Install:

Error: This computer doesn't have VT-X/AMD-v enabled at minikube VBoxManage modifyvm <VirtualMachineName> --nested-hw-virt on

e.g.
cd c:\Program Files\Oracle\VirtualBox
./VBoxManage modifyvm Ubuntu --nested-hw-virt on

Error: PR_VBOX_DEVICE_MISSING ... install virtualbox-dkms sudo apt-get install virtualbox-dkms

sudo dpkg-reconfigure virtualbox-dkms sudo dpkg-reconfigure virtualbox
sudo apt-get install linux-headers-generic

Note: MiniKube is still a bit unstable on a standalone PC. You are better off in a Cloud environment.
Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how to use MiniKube and what are some practical implementation you can do on a Ubuntu Virtual Machine. Explain how Network Function(s) has benefited from Network Orchestration.
Explain two Network Functions.

Session 5
Install MQTT broker and a subscriber in Ubuntu Virtual Machine see the following youtube link.
Try to subscribe to your neighbour's MQTT broker. Explain your attempt.
Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how to implement MQTT.
Explain the network architecture of MQTT and think of new application it can be used for.

Session 6
Download and Install TheOpenEM software on a Windows Server see the following videos and homepage for details:

Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how you can configure End Point Management System and justify why this is critical in the modern IT world. Explain what else needs to be done to make sure End Point Management is possible. (Agents, Firewall rules, etc)

Session 7
Download and Install KeyCloak on a Windows Servers Evaluation version see the following link:

Session 8
Download and install Cisco see the following link:

Create a login and download the latest version of UCSPE 4.2(2a).

Submit a MS Word Report/PDS with screenshots of your Keycloak configuration and include your answers to the following: Justify why organization needs a datacentre
Explain why many organisations will still need an on-premises datacentre.

Session 9
Configure Cisco UCS Platform Emulator using the following video as a guide:
Submit a MS Word Report/PDS with screenshots of your UCS configuration and include your answers to the following: Explain how to connect datacentres to the Internet
Explain how Carrier Ethernet and MPLS is used

Session 10
Create an account on Schneider Electric
Complete one Energy Efficiency Course and one Data Centre Course

Assessment Details for Assessment Item 2:
Overview

Introduction
You will submit work in assignment activities during the study period. This is an individual assessment.

You are a junior network engineer at a managed services provider that has recently onboarded a client with multiple branch offices across different geographic locations. The client is transitioning from a legacy telephony system to a modern, IP-based communication infrastructure. Due to budget constraints and the need for rapid deployment, the client has requested a proof-of-concept (PoC) for a virtualized VoIP solution that can operate across segmented networks.

Your role is to design and demonstrate a prototype that simulates this environment using virtual machines. The solution must showcase inter- office communication capabilities, scalability potential, and basic call functionality between remote endpoints.
Your task is to complete and make a 6-8 min video presentation on the following:
Environment Setup
Deploy a VoIP server within a virtualized environment (e.g., using VirtualBox or similar). You may use any open-source VoIP platform (e.g., FreePBX, Asterisk) to simulate enterprise-grade communication capabilities.
Inter-Server Communication
Configure and establish communication pathways (e.g., SIP trunks) between two independent VoIP servers hosted on separate virtual machines.
Provision and register VoIP endpoints (softphones or virtual IP phones) on each server.

Demonstrate a successful call session between endpoints across the segmented network.
Technical Reflection
Summarize your implementation strategy, highlight any technical hurdles encountered, and explain how you addressed them.
Presentation Delivery
Your video should clearly articulate your design choices, configuration steps, and outcomes. Marks will be awarded for clarity, depth of explanation, and professionalism.

You may use any of the following software or software approved by your tutor. Additional marks may be gained by using advanced techniques not taught in the laboratories.

Assessment details
Assessment 3:

Introduction
You will submit work in assignment activities during the study period. This is an individual assessment.

Assignment 3 is a group assessment with 3-4 students in a group. Configure and demonstrate link aggregation using EtherChannel aggregation techniques, including PAgP and LACP, as Cisco and IEEE 802.3ad defined. Configure load balancing and redundancy techniques on physical switches to enable load balancing for WAN connections.

SDWAN simplifies the deployment and management of WAN connections, enabling the addition of multiple links between headquarters and branch offices. SDWAN can enable load balancing across multiple links, which balances the traffic load across the links and even provides resiliency in the case of a single link failure. However, when SDWAN is combined with load balancing, it becomes a potent option that brings branch offices better connectivity to the applications and data they need to run their local operations. Businesses can further enhance their edge connectivity by adding aggregation to the mix. Tunnel bandwidth aggregation maximises bandwidth use, ensuring that applications can perform at their best levels without hindering the performance of other applications competing for bandwidth.

Configure and demonstrate link aggregation using EtherChannel aggregation techniques, including PAgP and LACP, as Cisco and IEEE 802.3ad defined. Configure load balancing and redundancy techniques on physical switches to enable load balancing for WAN connections. Marks will be awarded based on the sophistication and difficulty of the demonstration. Submit the video on configuration and demonstrate the working features.

Your task is to complete and make a 6-8 min video presentation on the following:
Download and install the Cisco packet tracer. Create a topology according to Figure 1, configure addresses according to Table 1, or devise your own addressing scheme.
Demonstrate (narration of your actions recorded by video) demonstrate a working conversation.
Prepare the switches
Enable each switch as VTP Transparent Mode

Assign Access VLANs to the appropriate ports on each switch (SW1: int range fa0/5 - 6)
Repeat for fa0/7 - 8 and assign vlan 20, complete the same task on SW2. On SW3 assign fa0/5 - 6 vlan 30 and on SW4 assign fa0/5 - 6 vlan 40

Create Trunk links between switches MLS1: int range fa0/1 - 4
MLS1: switchport trunk encap dot1q SW1: int range fa0/1 - 2
SW2: int range fa0/3 - 4
test the default spanning-tree results for MLS1, SW1,SW2: sho spanning-tree vlan 1
Create Link aggregation
PAgP for EtherChannel between MLS1 and SW1
LACP for EtherChannel between MLS1 and SW2
Manual ON for EtherChannel between SW3 and SW4
Look at the spanning tree and verify that the port-channel interfaces have the least-cost path and that no ports are in a blocking state. This indicates that all uplink ports are in use. Check each switch.
Verify that EtherChannel is working.

Load Balancing
Check the default load balance method used
Change the load-balance method to src-dst-ip
Configure the Intervlan routing
Turn on routing for the MLS1 switch
Configure R1 with intervlan routing
Test successful pings from PC1-V10 to PC7-V20, PC10-V30, and PC12-V40. All pings should respond successfully. Otherwise, troubleshoot appropriate EtherChannel, trunks, and intervlan routing.
Show the output of extended ping and record the route. (Use show ip route, trace and extended ping commands)
Summarize your findings.
Present the results in a video presentation.

This is the Group assessment; therefore, every member must present his/her task in a single video presentation. Please submit the video presentation and demonstration explaining how you have completed all these tasks. Remember to turn on the camera and screen record. The

presentation should show all the configuration and workings of the assignment, and you will receive marks based on the marking rubric. The names of all the virtual machines should include your Student ID.
Additional marks may be gained by using advanced techniques not taught in the laboratories.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop- boxes will not be considered. Submissions must be made by the end of session 5.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer's submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.

Please Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.

Assessment 4: Introduction
You will submit work in assignment activities during the study period.

This is a group project with 3 - 4 students in a group. You will critically compare and evaluate IAM and zero trust solutions. You will install and configure an IAM and zero trust solutions and analyse their operations and limitations. You will present your findings in a report and demonstrate your IAM and zero trust solutions.

Project Report
You will critically compare and evaluate IAM and zero trust solutions. You will install and configure an IAM and zero trust solutions and analyse their operations and limitations. You will present your findings in a report and demonstrate your IAM and zero trust solutions.

Students are to develop a network and explain its topology. There should be several virtual machines. To set up a larger virtual network, you may need to connect two or more computers together. Get AI-free online assignment help from experienced academic experts.

Your team has been assigned to simulate a secure enterprise network environment and evaluate two critical cybersecurity technologies: Identity and Access Management (IAM) and Zero Trust Network Access (ZTNA). These technologies are increasingly adopted by organizations to protect digital assets, enforce access control, and reduce the risk of breaches.

The objective of this project is to design and implement a simplified enterprise network using three or four virtual machines, deploy IAM and Zero Trust solutions, and critically assess their effectiveness. You will demonstrate how these systems manage user authentication, enforce access policies, and integrate with supporting infrastructure.

This project is designed to reflect real-world deployment scenarios while remaining feasible for students working on personal laptops.
Virtual Environment Requirements
You may use three or four virtual machines to simulate the following components as you are designing and implementing them.
Directory & DNS Server
Install either Windows Server (with Active Directory and DNS roles) or Ubuntu Server (with OpenLDAP and BIND DNS).
This server will manage user identities and provide name resolution across the network.

IAM Server
Install Keycloak or TheOpenEM on a Windows or Linux VM (Ubuntu recommended).
Configure user authentication, role-based access control, and integrate with the directory server.

Zero Trust Server
Install a Zero Trust solution (e.g., TheOpenEM or similar) on a separate Linux VM.
Configure device-based access control, segmentation policies, and secure login workflows.

Client Machine
Use Windows 10/11 or Ubuntu Desktop.
Simulate user login and access to protected resources.
Use this machine to test IAM and Zero Trust configurations.

Implementation Tasks
Install and configure IAM and Zero Trust platforms.
Integrate both with the directory server for centralized identity management.

Demonstrate:
User login and role-based access
Policy enforcement and segmentation
Secure access to resources from the client machine

You may use any of the following software or software approved by your tutor. Additional marks may be gained by using advanced techniques not taught in the laboratories.

Project Demonstration and Presentation
You will demonstrate and present your project in Assessment Item 4 at the end of the study period, and you will be assessed both as an individual and as a member of the group.

Reference no: EM133959032

Questions Cloud

Hewlett-Packard case study : Do you think anything is missing from the problem solving methodology described in the Hewlett-Packard case study?
What you believe best next step for puerto ricans and island : Describe what you believe is the best next step for Puerto Ricans and the island? Is it statehood? Becoming independent?
Which neural networks are related to symptoms of adhd : Discuss which neural networks are related to symptoms of Attention-Deficit/Hyperactivity Disorder (ADHD) or Fetal Alcohol Spectrum Disorders (FASD).
Is clinical change project highly significant to nursing : Nurs 691- Is your clinical change project highly significant to nursing? Does the project encompass the core graduate nursing competencies of patient-centered?
Critically compare and evaluate iam and zero trust solutions : ITNE3006 Design Network Infrastructure, Victorian institute of technology - critically compare and evaluate IAM and zero trust solutions.
Explain the reasons for us military intervention in vietnan : Contrast and compare the international contexts (Cold War vs. the War on Terror) and explain the reasons for U.S. military intervention in Vietnam and Iraq.
How that was different from former suffragettes : Name one of the main leaders, and explain what she strived for and how that was different from former suffragettes.
What information about alcohol metabolism : What information about alcohol metabolism do you think would be helpful for college students to have?
How your emotional state influences your eating behaviors : Explain how your emotional state influences your eating behaviors. Besides emotional state and food advertising, what other factors influence your eating habits

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd