Reference no: EM132407279
Assignment - Hands-on Lab: Setting Up a VPN Server
In this module, you have learned about the different types of VPNs. In this lab exercise, you are required to set up a VPN connection and determine that the traffic from your system is now encrypted and rerouted via the VPN server. This exercise is labeled as Option 1 below. If you are in a country which blocks or bans VPNs, there is an alternate version of the lab exercise below labeled Option 2.
Note: You will only complete one of the options below.
Complete Option 1 unless you are in a country that blocks VPNs. Refer to the following resource for a list of countries that ban or block VPNs: Le VPN. (2016, May). Countries where VPN use is prohibited.
If you are in such a country you will complete Option 2.
The hands-on-lab exercises are designed to provide students with experience in the cyber security domain. In this activity, students will install and use a SoftEther (Links to an external site.) VPN client software. You will use utilities including traceroute (Links to an external site.) and Wireshark (Links to an external site.) to determine that the traffic is encrypted and rerouted via the VPN server.
This activity will address module outcomes 2 and 3. Upon completion of this activity, you will be able to:
Describe the need for VPN security.
Identify VPN components.
After the lab exercise, you will prepare a report where you will include screenshots of every step you performed.
Option 1: Setting up a VPN
The following activities should be completed by the student. The questions below should be answered with details including screenshots:
1. Download and install Wireshark from the following resource:
Wireshark (Links to an external site.). (n.d.).
2. Run Wireshark and start sniffing the traffic on the network interface that connects to the Internet (typically listed as Wifi or Local Area Connection).
3. While Wireshark is still running, open a browser to a website that begins with HTTP (not an HTTPS). Use Wireshark to sniff this traffic. Determine that the traffic is visible without encryption in Wireshark.
4. Familiarize yourself with the traceroute option (tracert on Windows or traceroute on Unix)
5. Use the tracert command with any public IP address - say Google's public DNS server 8.8.8.8. Write down the hops (all the addresses the packet was sent through) when connecting from your system to this IP address.
6. Download the SoftEther VPN client from the following resource:
SoftEther VPN. (n.d.). SoftEther VPN open source.
7. Install it and connect to any VPN server. You could choose one that is within the same state or country that you are in currently. This would make the VPN traffic faster to process.
8. Repeat steps 2 to 5 and note down the difference.
Answer the following questions:
Does the Wireshark output change when it is run without SoftEther client and when run with it? What is the change, if any? Explain with reasons and screenshots.
Did the tracert output change when run without SoftEther client and when run with it? What is the change, if any? Explain with reasons and screenshots.
What encryption technology does the SoftEther VPN use?
When would it be beneficial for businesses or individuals to employ a VPN? Please describe several uses for this technology.
Option 2: Designing a VPN and comparing VPN types
This is linked to the same scenario listed in Module 4 - using encryption to protect highly sensitive data stored in a military database. The application server is hosted by the Department of Defense (DoD) in their data center.
This application is now fully developed and will be put into production
The application is accessed in two ways:
- From military bases around the country
- By individual military personnel from wherever they might be - home, airport, hotel, etc.
Please explain the following and include a network diagram of your VPN solution:
1. What type of VPN setup do you propose for the first case - military bases that connect to this application, and why?
2. What type of VPN setup do you propose for the second case - military personnel connected on their personal devices wanting to connect to this application, and why?
3. In both of the above cases, provide a network diagram showing the architecture the VPN components. Make sure all elements in the diagram are clearly labeled. If an existing image is used it must be applicable and properly cited as a direct quote according to APA format.
4. In addition to the above types of VPN, are there other VPN options available? Explain a third option and provide a table comparing all three options. In what circumstances would be each be most beneficial?
Use the American Psychological Association (APA) style (6th edition) to write your assignment. The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.
Attachment:- Assignment File.rar