This report analyzes the network requirements of AgriDigital and identifies the VPN service parts. It discusses the scope, limitations, solution design, topologies, IP address allocation, security features, redundancy, failover plan, and implementation of VPN services.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:VIIRTUAL PRIVATE NETWORK Virtual Private Network Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1VIRTUAL PRIVATE NETWORK Summary The purpose of this report is to analyse the requirements of the network and identify the VPN service parts being used in the existing network infrastructure of AgriDigital and discusses about the scope and limitations of the project. First the report talks about the project scope after which the limitations of the network is described. Following this the report goes on to provide the summary of requirements related to the network and the VPN services being used. After that the report enters the solution design section where the logical network design and the physical network design is provided and discussed along with diagrams. Then the report speaks about the networking topologies that were used to implement the network and VPN solution. Thereafter the IP address allocation is detailed with relevant IPs of sub networks given in tabular format. After giving the IP address allocation and listing explaining the method the security features and policies get discussed followed by the redundancy and failover plans. Then after talking about implementation of VPN services the report ends with concluding notes.
2VIRTUAL PRIVATE NETWORK Table of Contents Introduction...............................................................................................................................3 ScopeofProject..........................................................................................................................3 Limitations..................................................................................................................................4 Requirements Summary.............................................................................................................4 Solutions Design.........................................................................................................................4 Logical Network Design..........................................................................................................4 Physical Network Design........................................................................................................4 Network Topologies...............................................................................................................4 IP Address Allocation..............................................................................................................5 Security Policy and features...................................................................................................5 Redundancy and Failover Plan...............................................................................................5 Implementation of VPN services............................................................................................5 Conclusion..................................................................................................................................5 References..................................................................................................................................6
3VIRTUAL PRIVATE NETWORK Introduction The following report analyses the network based requirements of the company AgriDigital and proceeds to identify also the VPN service parts and discusses about the scope and limitations of the project. This report begins by talking about the project scope after which the limitations of the network is described. Following this the report goes on to provide the summary of requirements related to the network and the VPN services being used. After that the report enters the solution design section where the logical network design and the physical network design is provided and discussed along with diagrams [4]. Then the report speaks about the networking topologies that were used to implement the network and VPN solution. Thereafter the IP address allocation is detailed with relevant IPs of sub networks given in tabular format. After giving the IP address allocation and listing explaining the method the security features and policies get discussed followed by the redundancy and failover plans. Then after talking about implementation of VPN services the report ends with concluding notes. Scope of Project The project aims to improve the existing network infrastructure of AgriDigital while keeping in mind long term network performance evolution so as to optimize the present capability and capacity of the network. The purpose this process is about accommodating organizational expansion and ability to support more modern and complex methods of communication through the network for the intended users. To perform the above task, acquiring and implementation of new networking equipment is required. These equipment should then be installed, build as per requirements for configuring a new network which needs to be integrated to existing network. Theresultingnetworkshouldincludebothlayer2asalsolayer3services.The implementation and configuration of the network must involve internet and intranet related services. Security for the network needs to be ensured by maintaining a server farm which is to include Web servers, FTP Servers, Email servers and the several DNS servers. Wireless Local Area Network or WLAN services needs to be set up to support the portable devices that need to be connected to the network[9]. The security mechanism for such network connection also needs to be configured.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4VIRTUAL PRIVATE NETWORK Different types of cabling may be required for different parts of the network. Such cabling and their connectivity with devices needs to be justified as per requirements for correct optimization of the network. Implementing security within the network requires installation of firewalls, core layer switches and as well a wireless access points. Implementing wired LAN connections is important for connecting the workstations in newly set up building [7]. Capability for remote access needs to be ensured using IPsec based Virtual Private Networks or VPNs. Other than that redundancy needs to present for finance section. Limitations Redundancy must be ensured for firewall, routers, switches access points and servers. Redundancy of firewalls is necessary in securing both endpoints of VPN solutions [3]. VPN solutions as good as they are in hiding the network from hackers, also make it difficult for even organizational members to access the company network from public Wi-Fi regions or other areas. Requirements Summary Assumptions Two branches Branch 1 and Branch 2 have recently been set up. Branch 1is to have twice the IP requirements of Branch 2. Networks of both these branches are connected to overall network of the office by integrating the networks into the network of the headquarters through the firewalls. IP addresses are required for the edge router installed in headquarters. Also IPs are required for the interfaces to connect with the branch networks.
9VIRTUAL PRIVATE NETWORK Network Topologies In conducting the physical implementation of the network of the firm AgriDigital, two key physical networking topologies have been used. These are the physical star topology and the physical ring topology [2]. Their use in the network of AgriDigital has been explained below. Physical Star Topology Physical star topology refers to the physical networking topology where direct connections are provided to the individual devices from switches, hubs and access points [6]. In AgriDigital’s network devices like workstations, printers, servers as well as switches and access points are connected with other networking equipment by using this topology. Because of being connected directly, effective network connectivity, ping and bandwidth are experienced by the users. Physical Ring Topology Redundancy is a key aspect of the network of AgriDigital. As a result several redundancy among several components of the network is ensured. These components can include firewalls, routers or even switches. The edge router is responsible for enabling network for the entire firm so a backup is kept in case the current edge router starts showing problems [10]. Both the current and the backup edge router acquires connection from the firewall and provides it to the core layer switches thereby forming a physical ring topology [11]. IP Address Allocation The IP addressing scheme used for allocating IP addresses to the newly set up buildings is conducted through the CIDR or Classless Inter Domain Routing IP addressing scheme. This is preferred over traditional classful IP addressing as CIDR helps in smoother transitions between sub networks. The major IP network used for allocating IPs to the several groups is 192.16.3.0/24. Office subnetwo rk IPs require d IPs allocate d Network AddressesCIDRSubnet Mask Rangeof IPs Broadcast Addresses Headquar ters91126192.168.3.0/25255.255.2 55.128 192.168.3.1 - 192.168.3.1 26 192.168.3.1 27 Branch 16062192.168.3.1 28 /26255.255.2 55.192 192.168.3.1 29- 192.168.3.1 192.168.3.1 91
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10VIRTUAL PRIVATE NETWORK 90 Branch 23162192.168.3.1 92/26255.255.2 55.192 192.168.3.1 93- 192.168.3.2 54 192.168.3.2 55 ER-CS22192.168.3.1 92 /30255.255.2 55.252 192.168.3.1 93- 192.168.3.1 94 192.168.3.1 95 Security Policy and features The security policies and features incorporated in securing the network are the following: Implementing VPN: Virtual Private Networks (VPNs) are essential in the sense they can hide the network from the view of external threats like hackers [1]. VPNs also conduct user account verification. Installing and configuring firewall: For medium sized businesses or small medium enterprises, firewalls are extremely important. The ideal firewall solution can be the physical firewall device which can also perform authentication. WPA2 Encryption for wireless connectivity: This refers to the Wi-Fi Protected access used to generate unique keys for each device that are to connect the network using wireless access [8]. Redundancy and Failover Plan In most sections redundancy is noticed on firewalls. These firewalls are used to secure both endpoints of the VPN tunnels as just having a VPN is not enough to secure the network from cyber- attacks. A backup router is kept to ensure total network outage can be prevented if the edge router fails. Another critical area of redundancy is observed with wireless access points [5]. This is mitigate signal issues in wireless networks. Implementation of VPN services VPNs or Virtual Private networks are implanted among three connections. These are the connection between Branch 1 and HQ, between Branch 2 and HQ and between HQ and the ISP network. In addition to securing the branches through VPN, having a VPN channel between the ISP and the HQ ensures that the web portal being hosted by thee network is also secured for both organizational members and end users.
11VIRTUAL PRIVATE NETWORK
12VIRTUAL PRIVATE NETWORK
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13VIRTUAL PRIVATE NETWORK Conclusion Inconclusiontheabovereportsucceedsinclearlyanalysingthenetworkbased requirements of the company AgriDigital and proceeds to identify also the VPN service parts and discusses about the scope and limitations of the project. This report begins by talking about the project scope after which the limitations of the network is described. Following this the report goes on to provide the summary of requirements related to the network and the VPN services being used. After that the report enters the solution design section where the logical network design and the physical network design is provided and discussed along with diagrams. Then the report speaks about the networking topologies that were used to implement the network and VPN solution. Thereafter the IP address allocation is detailed with relevant IPs of sub networks given in tabular format. After giving the IP address allocation and listing explaining the method the security features and policies get discussed followed by the redundancy and failover plans. Then the report ends after talking about implementation of VPN services for the network infrastructure.
15VIRTUAL PRIVATE NETWORK [11] X. Liu, A. Kyparlis, R. Parikh, A. Lindem, and M. Zhang,A YANG Data Model for the Virtual Router Redundancy Protocol (VRRP)(No. RFC 8347). , 2018.