Reference no: EM132304981
Low-Level Design and Configuration of Lan/WAN network for an SME network
Purpose of the Assessment
The purpose of this assignment is to simulate the network for an SME (small and medium sized enterprise) proposed and designed based on the requirements. A thorough verification and evaluation analysis should be presented to meet the ULO mapping in the Unit Description.
c. Evaluate, different WAN protocols; such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment, and configure, verify, troubleshoot related equipment;
d. Plan and design LAN and WAN networks and evaluate their performance;
e. Implement IPv4 and IPv6 in WAN networks and critically compare their designs;
f. Propose, and report on, hierarchical network models for campus and other applications;
g. Develop a systematic approach to analyse and solve various network problems.
Assignment Description
There are two parts to this assignment, part A and part B.
Two broad areas to be considered for VPN network design in this assignment are as under;
1. Propose/design a VPN for the scenario given below including LAN and WAN settings.
2. Configure and implement the network at low-level design, this part should be done using CISCO Packet Tracer.
Contents must include:
High-level network design summary Solution Design
i. Network Topologies
ii. IP addressing
iii. Configuration details and screenshots to present low-level design
iv. Verification methodologies and evaluation analysis
Scenario
Many companies use frame relay or leased lines to provide secure communications with their business partners, subsidiaries, and vendors. Unfortunately, these solutions are often expensive and geographically limiting. VPN offers an alternative for companies who want private, cost-effective communications.
Suppose you are a major parts supplier to a manufacturer. Since it is critical that you have the specific parts and quantities at the exact time required by the manufacturing firm, you always need to be aware of the manufacturer's inventory status and production schedules. Perhaps you handle this interaction manually today, and find it time consuming, expensive and even inaccurate at times. You want to find an easier, faster, and more effective way to communicate with your manufacturing company. However, given the confidentiality and time-sensitive nature of the information you exchange, the manufacturer does not want to publish it on its corporate Web site or distribute it monthly in an external report. By exploiting the public Internet, you can easily establish a VPN to meet the needs of both companies. The objectives of this scenario are as follows:
Objectives
In this scenario, MyCo wants to establish a VPN between a host in its parts division and a host in the manufacturing department of one their business partners, TheirCo.
Because the information these two companies share is highly confidential, it must be protected while it travels across the Internet. In addition, data must not flow in the clear within either company's networks because each network considers the other untrusted. In other words, both companies require end-to-end authentication, integrity, and encryption.
The VPN must protect all data traffic between the Human Resources department's subnet and the Finance department's subnet.
• Data traffic does not require VPN protection once it reaches either of the department's subnets.
• All clients and hosts on each network have full access to the other's network, including all applications.
• The gateway systems can communicate with each other and access each other's applications.
Details
The following figure illustrates the network characteristics of MyCo and TheirCo:

Figure-1: Sigma Inc. Office configuration
MyCo Supply Network
System A has an IP address of 10.6.1.1. This is the connection endpoint, as well as the data endpoint. That is, System A performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.
System A is in subnet 10.6.0.0 with mask 255.255.0.0 Only System A can initiate the connection with System C.
TheirCo Manufacturing Network
System C has an IP address of 10.196.8.6. This is the connection endpoint, as well as the data endpoint. That is, System C performs IKE negotiations and applies IPSec to incoming and outgoing IP datagrams and is also the source and destination for data that flows through the VPN.
System C is in subnet 10.196.8.0 with mask 255.255.255.0
Configuration tasks
You must complete each of these tasks to configure the business to business connection described in this scenario:
Completing the planning worksheets
The planning checklists illustrate the type of information you need before you begin configuring the VPN. All answers on the prerequisite checklist must be YES before you proceed with VPN setup.
Configuring VPN on System A
Complete the following steps to configure a VPN connection on System A.
Configuring VPN on System C
Follow the same steps you used to configure VPN on System A, changing IP addresses as necessary. Use your planning worksheets for guidance.
Activating packet rules
The VPN wizard automatically creates the packet rules that this connection requires to work properly. However, you must activate them on both systems before you can start the VPN connection.
Starting a connection
After you have configured your VPN connection you need to start your VPN connection.
Testing a connection
After you finish configuring both systems and you have successfully started the VPN servers, test the connectivity to ensure that the remote subnets can communicate with each other
Part B: Presentation
The proposed network design will be presented in a 5-minute presentation during the week 12 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (hard copy, memory stick, website and email) will be considered but the presentation file submitted in Moodle. Marks will be given as below:
Presentation
Slides
Attachment:- Low-Level Design and Configuration of Lan.rar