logo

Network System Administration

17 Pages1806 Words192 Views
   

Added on  2023-04-21

About This Document

The report analyzes network operating system and services, evaluates solutions for configuring VPN services, and explores system architecture development.

Network System Administration

   Added on 2023-04-21

ShareRelated Documents
Running head: NETWORK SYSTEM ADMINISTRATION
Network System Administration
Name of the Student
Name of the University
Author’s Note
Network System Administration_1
1
NETWORK SYSTEM ADMINISTRATION
Abstract
The report is prepared for analysis of the network operating system and services with the use
of relevant services and protocols. Different mechanism is followed for setting the virtual
private network services and an architectural diagram is created for the management of the
necessary services. The necessary solution that can be implemented for the configuration of
the vpn services is evaluated for meeting the different service requirement. The necessary
mechanism and solution that can be applied for increasing the reliability of the proposed
solution is analysed for development of the system architecture.
Network System Administration_2
2
NETWORK SYSTEM ADMINISTRATION
Table of Contents
Introduction................................................................................................................................3
Background Information............................................................................................................3
Scope and Limitations................................................................................................................3
Literature Review.......................................................................................................................3
Experimental work and analysis................................................................................................5
Conclusion................................................................................................................................14
References:...............................................................................................................................15
Network System Administration_3
3
NETWORK SYSTEM ADMINISTRATION
Introduction
With the advancement of the technology and the influence of internet in various
domain, it has become important to have high speed and secure internet as the organizations
are moving to the cloud and hosting private and sensitive data there (Dongxu et al. 2018).
Due to this it has become important to protect the data as there are increased number of
cyber-attacks such as traffic hijacking and data breach. Now in order to increase the internet
access for better data protection and data security, VPN is an excellent strategy (Jyothi and
Reddy 2018).
Background Information
The main important feature of the open source software is that it does not require the
manufacturing license and free to access (Genç, Lenzini and Ryan 2018). Hence it is very
useful in the software development field and often considered for various activities like
cloning, evaluation and method for thread identification. The Debian Linux is used for the
configuration of VPN service and
Scope and Limitations
The main scope of the project is configure a vpn server and enabling client server
communication for management of the security issues such as handling different types of
attacks. The sever is configured with VPN service such as IPSec, Tunneling for increasing
the security of communication. Since a virtual environment is used for the configuration there
are some limitation faced for testing the configuration. Different types of attacks is needed to
be tested against the configuration.
Literature Review
Literature review is the systematic approach for reviewing and analysing methods
which are relevant with respect to a particular research topic. One area that has particularly
Network System Administration_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

REPORT ON VIRTUAL PRIVATE NETWORK
|12
|1820
|59

VPN: Hardware vs Software, Operation, and Security Protocols
|20
|4092
|72

Report on Virtual Private Network 2022
|12
|2383
|26

Assignment | The aim of this report is to analyse and understand the process and features of security of the emerging technologies.
|14
|2762
|18

Virtual Private Network (VPN) | Literature Review
|6
|926
|72