Virtual Private Network Implementation for Avita's Corporate Network
Verified
Added on 2024/04/26
|11
|617
|156
AI Summary
This report discusses the implementation of a Virtual Private Network (VPN) for Avita's Corporate Network. It covers IP infrastructure requirements, security mechanisms, encryption techniques, threats, and a conclusion on the successful deployment of VPN.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Virtual Private Network
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction IP Infrastructure Requirements Network Diagram Security Mechanism Threats to VPN Encryption Techniques used Conclusion References Table of Content
Virtualprivatenetworkprovidessecure connection to the users TherearedifferenttypesofVPNthatare connected with a local area network These networks secure the network services that are accessed online Internet services are provided to users by using Internet Service Provider (ISP) Introduction
Local area network connection BYOD policy is needed for the employees Servers like mail server, web server, DNS server have to be used Securitymechanismsshouldbeusedto protect the VPN Network resources of headquarters should beaccessedbybranchofficeemployees also IP Infrastructure requirements
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Fourrouterswhichareconnectedvia tunnelling over ISP internet are located on the different places. Routers connected are of series 3725. Main branch and Headquarters are able to accessthedatapacketwhichare transmitted through the network. Home users and mobile users are not able to access the data packet from others which are transmitted on this network. Network Diagram
Theseareusedtoensurethatthe information of users will be protected. These safeguard information from security vulnerabilities of a network IPSecandSSLsecuritymechanismsare used for the company It will determine security standard for the network users. Thisprovidebetteraccessibilitytothe network users Security Mechanisms
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
VPN is responsible to provide better internet connectivity and flexibility to all users which are far distant form each other. Various threats which can be generated through VPN are: 1.Denial of Services 2.Intrusion Threats to Virtual Private Network
Various encryption techniques are used in thisnetworktomaintainthesecurity feature in transmitting the confidential data through this network. Encryption techniques used are 1.AES(Advanced Encryption Standard) 2.MD5(Message Digest Hashing) Encryption Techniques used
Thispresentationhadsuccessfully discussed all the implementation of security protocols. InthisnetworkVPNissuccessfully implemented for Avita’s Corporate network. Security policy like IP sec and SSL security are discussed. Variousencryptiontechniqueswhichhave beenusedinthisnetworkarebriefly discussedin this report. Conclusion
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser