Designing a VPN and comparing VPN types

Assignment Help Operating System
Reference no: EM132407279

Assignment - Hands-on Lab: Setting Up a VPN Server

In this module, you have learned about the different types of VPNs. In this lab exercise, you are required to set up a VPN connection and determine that the traffic from your system is now encrypted and rerouted via the VPN server. This exercise is labeled as Option 1 below. If you are in a country which blocks or bans VPNs, there is an alternate version of the lab exercise below labeled Option 2.

Note: You will only complete one of the options below.

Complete Option 1 unless you are in a country that blocks VPNs. Refer to the following resource for a list of countries that ban or block VPNs: Le VPN. (2016, May). Countries where VPN use is prohibited.

If you are in such a country you will complete Option 2.

The hands-on-lab exercises are designed to provide students with experience in the cyber security domain. In this activity, students will install and use a SoftEther (Links to an external site.) VPN client software. You will use utilities including traceroute (Links to an external site.) and Wireshark (Links to an external site.) to determine that the traffic is encrypted and rerouted via the VPN server.

This activity will address module outcomes 2 and 3. Upon completion of this activity, you will be able to:

Describe the need for VPN security.

Identify VPN components.

After the lab exercise, you will prepare a report where you will include screenshots of every step you performed.

Option 1: Setting up a VPN

The following activities should be completed by the student. The questions below should be answered with details including screenshots:

1. Download and install Wireshark from the following resource:

Wireshark (Links to an external site.). (n.d.).

2. Run Wireshark and start sniffing the traffic on the network interface that connects to the Internet (typically listed as Wifi or Local Area Connection).

3. While Wireshark is still running, open a browser to a website that begins with HTTP (not an HTTPS). Use Wireshark to sniff this traffic. Determine that the traffic is visible without encryption in Wireshark.

4. Familiarize yourself with the traceroute option (tracert on Windows or traceroute on Unix)

5. Use the tracert command with any public IP address - say Google's public DNS server 8.8.8.8. Write down the hops (all the addresses the packet was sent through) when connecting from your system to this IP address.

6. Download the SoftEther VPN client from the following resource:

SoftEther VPN. (n.d.). SoftEther VPN open source.

7. Install it and connect to any VPN server. You could choose one that is within the same state or country that you are in currently. This would make the VPN traffic faster to process.

8. Repeat steps 2 to 5 and note down the difference.

Answer the following questions:

Does the Wireshark output change when it is run without SoftEther client and when run with it? What is the change, if any? Explain with reasons and screenshots.

Did the tracert output change when run without SoftEther client and when run with it? What is the change, if any? Explain with reasons and screenshots.

What encryption technology does the SoftEther VPN use?

When would it be beneficial for businesses or individuals to employ a VPN? Please describe several uses for this technology.

Option 2: Designing a VPN and comparing VPN types

This is linked to the same scenario listed in Module 4 - using encryption to protect highly sensitive data stored in a military database. The application server is hosted by the Department of Defense (DoD) in their data center.

This application is now fully developed and will be put into production

The application is accessed in two ways:

- From military bases around the country

- By individual military personnel from wherever they might be - home, airport, hotel, etc.

Please explain the following and include a network diagram of your VPN solution:

1. What type of VPN setup do you propose for the first case - military bases that connect to this application, and why?

2. What type of VPN setup do you propose for the second case - military personnel connected on their personal devices wanting to connect to this application, and why?

3. In both of the above cases, provide a network diagram showing the architecture the VPN components. Make sure all elements in the diagram are clearly labeled. If an existing image is used it must be applicable and properly cited as a direct quote according to APA format.

4. In addition to the above types of VPN, are there other VPN options available? Explain a third option and provide a table comparing all three options. In what circumstances would be each be most beneficial?

Use the American Psychological Association (APA) style (6th edition) to write your assignment. The length of your assignment should be 3 to 5 pages, and you should include at least three quality references.

Attachment:- Assignment File.rar

Verified Expert

The report has demonstrated the use of SoftEther to analysed data traffic and the Wireshark is used on the technology to understand the effect of data traffic and the integration between the local IP address and the client server. Description has been given related to the utilization of SoftEther Vpn server. The use of VPN in traffic controlling and data monitoring have been well explained in the report.

Reference no: EM132407279

Questions Cloud

What is best approach to learn new tools used in pentesting : What OS it runs on, whether it is part of the Kali Linux distribution. What is the best approach to learn "new" tools used in pentesting?
Identify the common targets of ransomware : Identify the common targets of ransomware. Explain why these targets are so attractive to hackers. Compare and contrast viruses, worms, and Trojans.
How the data might be collected and accessed : A description of the focus of your scenario. Describe the data that could be used and how the data might be collected and accessed.
Determine whether an organization is ethical or not : What is the organization and how would you describe it? How do you determine whether an organization is ethical or not?
Designing a VPN and comparing VPN types : Option 2: Designing a VPN and comparing VPN types. What type of VPN setup do you propose for the first case - military bases that connect to this application
Conduct a comprehensive literature search : Conduct a comprehensive literature search - Identify three components and determine two or three efficient approaches to implementing
Organization handles ethic concerns : what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns as they relate to information management.
What are the different phases of business cycle : Read about the business cycle. What are the different phases of business cycle? Explain any one phase and discuss what happen to GDP, unemployment.
Writing of the 24 legal briefs by hiring : Would your company save money in the writing of the 24 legal briefs by hiring the four new paralegals and firing some attorneys?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd