VPN Network Design for SME - Network and VPN Services
Verified
Added on 2023/04/24
|15
|1437
|299
Presentation
AI Summary
This report discusses the design of a virtual private network for small and medium enterprises, including the scope, limitations, requirements, solution design, network topologies, IP addressing, security features and policies, redundancy and failover plans, and VPN service implementation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
VPN Network Design for SME network and VPN services NAME OF THE STUDENT NAME OF THE UNIVERSITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction A virtual private network is designed for a small and medium enterprise after the analysis of the service requirement and the protocols used for the development of a VPN network solution. An analysis is made on the architecture that should be used for the development of the network and a road map of the process is interpreted in the report for following itandsupporttheadministratorforthemanagementofthe development process of the project.
Scope of the project The scope of designing the VPN network design are as follows: Use of secure authentication mechanism and changing password on regular basis for increasing the security of VPN network Selection of type of VPN depending on the requirement and structure of the organization. Bypassing the filtered and blocked websites and access all the websites and services Increasing the efficiency of bandwidth and network with the implementation of VPN. Reducing the cost of maintenance and communication for communicating with the remote branches
Limitation of the project The limitation for designing the VPN network are as follows: Understandingtheinstallationandconfigurationofthesecurity issuesofthenetworkforensuringsufficientprotectionis implemented for the network Ensuring reliability and performance for the internet based VPN and application of sufficient protection for the organizational resources Compatibility of the different VPN product with the equipment used for the development of the network Selection of the router and the transmission link for eliminating the risk of slower VPN speed and testing it according to the requirement.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Requirements There are different component that are needed for the development of the network solution and there are different elements that are needed forthemanagementofthecomponents.AclientVPNsoftwareis needed for establishment of secure connection with the remote branch. The routers should be selected such that it have support of VPN and firewallsshouldbedeployedsuchthatlegitimateVPNtrafficare allowedtoaccesstheinternalnetworkoftheorganization.AVPN server is needed to be installed in the network for management of the session and management of the incoming data traffic for maintaining access of the network resources. The channels used for communication should be encrypted and the physical access of the VPN server should be restricted for the management of high level security.
Solution Design Logical Design
Solution Design Physical Design
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Network Topologies The network topology of the VPN network infrastructure is developed withtheuseofpublictelecommunicationnetworkandtheWANis extended fromthe core siteto reachthebranchesofthenetwork. Properencryptiontechniqueisappliedandsecurityprocedureis applied for keeping the data private. The implementation of VPN helps inenablingthecompanytosharedistributeddataandapplication withoutmuchexpense.Dedicatedleasedlinesarenotneededfor transmitting the data packets and internet can be used for serving the needs of the users and improve the performance of the organization. There are different network monitoring tools that can be applied for the identification of flow of data packet and the selection of the topology.
Security features and policies Thefollowingarethesecurityimplicationthatcanbeappliedfor increasing the security of the VPN network. The connection of VPN can be strengthened with the deployment of firewall An IDP or IPS system can be deployed for monitoring the attack and increasing the efficiency of the system TheremoteclientshouldbeinstalledwithAntivirussoftwarefor prevention of spread of virus in the network The logging of the user into the server should be managed and auditing functionshouldbeimplementedforrecordingtheunauthorized attempts and reviewing the vulnerability of the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Redundancy and failover plans Theserversshouldbeconnectedviaredundantlinkforthe managementofthenetworkloadsandreducetheriskof unavailability due to failure of link. The data traffic in the network is neededtobemanagedandtheserversshouldhavesupportfor virtualization such that it can be used for serving more number of users [2]. A regular backup of the network should be performed and stored in remote location such that it can be used for restoring the network in case of disaster and no data is lost. A power backup plan should also be created such that the situation of power outrages can be handled and the uptime of the network is increased.
VPN service implementation RemoteaccessVPN–Thisisusedfor connectingaremote user usingmobile or home network to connect with the private network of the organization. The VPN is used for permitting secured, encrypted connectivity between the private network and remote users. Intranet VPN –This type of VPN is created for establishing connection between two fixed location and it can be branch to branch, head office to branch, etc. This protocol is used for joining multiple remote location and work as a single private network. Extranet VPN –It is used for connecting the business partner of the organization for example customer, supplier and allow the user to work with other parties and securely share data in the shared environment. WAN replacement –VPN can be used as an alternative to WAN because the maintenance cost of WAN is much higher specially in case of network dispersed over a larger geographical area. A less cost is required for VPN because the overhead cost for management of WAN is higher and the scalability is higher. The reliability and performance of the network can be improved with the implementation of VPN and creating a tunnel for communication via the internet.
Conclusion It can be concluded that it is essential to identify the scope and limitation of the project for identification of errors and resolving it before deployment of the network framework. The requirement of the organization is needed to be analyzed such that it helps in analyzing the VPN parts and service essential for the development of the project. The network topology that should be followed for the development of the network is needed to be identified and an IP addressing plan is created for the configuration of the network interface of the hardware device essential for the development of the network framework. AN analysis is made on the security requirement of the organization and a securityfeatureandpolicyisappliedtothenetworkforincreasingthe securityofthenetwork.Aredundancyandfailoverplaniscreatedfor increasing the availability of the network and provide service to the users.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Bibliography [1].Aguado,Alejandro,etal."VPNServiceProvisioningviaVirtualRouterDeploymentand Quantum Key Distribution." 2018 Optical Fiber Communications Conference and Exposition (OFC). IEEE, 2018. [2].Aznar,José,etal."CNSMO:ANetworkServicesManager/Orchestratortoolforcloud federated environments." Ad Hoc Networking Workshop (Med-Hoc-Net), 2016 Mediterranean. IEEE, 2016. [3].Baranda, Jorge, et al. "Orchestration of end-to-end network services in the 5G-Crosshaul multi-domain multi-technology transport network." IEEE Communications Magazine 56.7 (2018): 184-191. [4].Baucke, Stephan, et al. "Cloud API support for self-service Virtual Network Function (VNF) deployment." Network Function Virtualization and Software Defined Network (NFV-SDN), 2015 IEEE Conference on. IEEE, 2015.