Implement network for an small and medium sized enterprise

Assignment Help Computer Networking
Reference no: EM132219617

Assignment - Propose/design a VPN for the scenario given below including LAN and WAN settings.

Purpose of the Assessment

The purpose of this assignment is to implement a VPN network for an SME (small and medium sized enterprise), details are given below.

A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description.

In preparing the assignment, students should acquire not only the knowledge of current technical aspects of IP networks but also research, data collection, analysis and writing skills.

Assignment Description

There are two parts to this assignment, part A and part B.

A. Design and model Implement (in Netsim) of VPN for Sigma Inc. by addressing the following criteria. See detailed instructions in the next section.

B. Presentation

Part A: Design and Report

Two broad areas to be considered for VPN network design in this assignment are as under;
1. Propose/design a VPN for the scenario given below including LAN and WAN settings.
2. Configure and implement the network at low-level design, this part should be done using BOSON NETSIM Simulator.
Contents must include:
High-level network design summary Solution Design
i. Network Topologies
ii. IP addressing
iii. Configuration details and screenshots to present low-level design
iv. Verification methodologies and evaluation analysis

Scenario
In this scenario, Sigma, Inc. wants to establish a VPN between the subnets of its Human Resources and Finance departments through a system models which does not have any firewall deployed at either end. Both systems will act as VPN gateways. In terms of VPN configurations, a gateway performs key management and applies IPSec to the data that flows through the tunnel. The gateways are not the data endpoints of the connection.

The objectives of this scenario are as follows:

- The VPN must protect all data traffic between the Human Resources department's subnet and the Finance department's subnet.
- Data traffic does not require VPN protection once it reaches either of the department's subnets.
- All clients and hosts on each network have full access to the other's network, including all applications.
- The gateway systems can communicate with each other and access each other's applications.

Details

The following figure illustrates the network characteristics of Sigma Inc.

1900_Sigma Inc Office configuration.png

Figure-1: Sigma Inc. Office configuration

Human Resources Department

• System A acts as the Human Resources Department's VPN gateway.
• Subnet is 10.6.0.0 with mask 255.255.0.0. This subnet represents the data endpoint of the VPN tunnel at the Sigma Inc., Melbourne site.
• System A connects to the Internet with IP address 204.146.18.227. This is the connection endpoint. That is, System A performs key management and applies IPSec to incoming and outgoing IP datagrams.
• System A connects to its subnet with IP address 10.6.11.1.
• System B is a production system in the Human Resources subnet that runs standard TCP/IP applications.

Finance Department

• System C acts as the Finance Department's VPN gateway.
• Subnet is 10.196.8.0 with mask 255.255.255.0. This subnet represents the data endpoint of the VPN tunnel at the Sigma Inc., Sydney site.
• System C connects to the Internet with IP address 208.222.150.250. This is the connection endpoint. That is, System C performs key management and applies IPSec to incoming and outgoing IP datagrams.
• System C connects to its subnet with IP address 10.196.8.5.

Configuration tasks
You must complete each of these tasks to configure the branch office connection described in this scenario:

Completing the planning: The planning checklists illustrate the type of information you need before you begin configuring the VPN. All answers on the prerequisite checklist must be YES before you proceed with VPN setup.

Configuring VPN on System A: Complete these task to configure System A

Configuring VPN on System C: Follow the same steps you used to configure VPN on System A, changing IP addresses as necessary. Use your planning worksheets for guidance.

Starting VPN: After you have configured your VPN connection on System A and C you need to start your VPN connection.

Testing a connection: After you finish configuring both systems and you have successfully started the VPN servers, test the connectivity to ensure that the remote subnets can communicate with each other.

Part B: Presentation

Task B

The proposed network design will be presented in a 5-minute presentation during the week 12 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking.

Verified Expert

In this assignment, a low level design is presented.Network topology is designed, device configuration done and verification and analysis done.In the configuration area, I provided names to the networking devices, assigned IP addresses to the devices, configured RIP routing protocol to the routers and finally configured VPN.

Reference no: EM132219617

Questions Cloud

Branch of sizable international company : You are the office manager of a branch of a sizable international company.
Define what changes would you want and why : Consider a job you hold now or have held recently. Would you want this job to be redesigned to place more emphasis on efficiency, motivation, ergonomics.
Prepare a statement of income : Prepare a statement of income, a statement of changes in equity, a statement of financial position (unclassified), and a statement of cash flows for 2016
What resources would health information consultant : What resources would a health information consultant find helpful in consulting for ESRD facilities? What has changed in the buying process?
Implement network for an small and medium sized enterprise : ME504 - Advanced Networking - A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description
What is the supply value chain : What is the supply value chain? How does the supply value chain help organisation manage their supply chains?
What is the financial advantage for the company : What is the financial advantage (disadvantage) for the company from processing one batch of sugar cane into the end products industrial fiber and molasses
Strict product liability apply in context of cyberspace : In what circumstances might the doctrine of strict product liability apply in the context of cyberspace?
Determine any gains or income that may be recognized : Determine any gains/losses or income that may be recognized incident to the formation of ABCD Corp. What would be the result if Beth's property were worth $250,

Reviews

len2219617

1/20/2019 10:45:06 PM

Reference Style Clear styles with excellent source of references Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors Presentation and Diagrams Proper writing and drawings professionally presented Properly written and drawing, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation

len2219617

1/20/2019 10:45:00 PM

Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Identification and Analysis and description Highly valid and appropriate Valid and appropriate Generally valid and appropriate Valid but not appropriate Not Valid and not appropriate Explanation/ Justification All elements are present and well integrated. Components present with good cohesion Component present and mostly well integrated Most components present Lacks structure

len2219617

1/20/2019 10:44:46 PM

3 Screenshots and procedures (steps, commands, results) This section should include appropriate commands executed and results. There must be heading and steps with proper explanation, e.g. the purpose of the steps and expected outcome. 10 4 Analysis and Evaluation Include a section for results analysis and evaluate the outcome of the implementation of the network. Critical analysis and evaluation should be addressed. 5 Total 25

len2219617

1/20/2019 10:44:39 PM

No Categories Description Marks 1 Report Quality The document should include all necessary headings and content to depict a Level 2 (e.g. Ethernet, VPWS, VPLS) and Level 3 (e.g. VPRN) services and network design. It should not omit any necessary section to be used for network evaluation. 5 2 Low Level Design Multiple figures and tables should be included to show the requirements development. All sections need to be in line with the high-level design proposed by the group. Any changes made should be addressed properly and clearly by ‘Change request’ section. 5

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd