Virtual Private Networks Assignment | Computer Networks

Added on - 07 Apr 2020

  • 26

    Pages

  • 3745

    Words

  • 76

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 6 of 26 pages
VIRTUAL PRIVATENETWORKS
Table of Contents1.Introduction........................................................................................................................................22.Objectives............................................................................................................................................23.Network planning...............................................................................................................................34.Equipment used..................................................................................................................................35.Security implementations used in the network CCP..........................................................................66.CISCO Certificate Protocol..................................................................................................................67.VPN tunneling and encapsulation......................................................................................................98.SSH and Secure trunks......................................................................................................................109.IPS implementation..........................................................................................................................1110.VPN Diagram.................................................................................................................................1311.Network diagram and explanations.............................................................................................1412.Conclusion.....................................................................................................................................2413.Reference......................................................................................................................................251
1.IntroductionSMSD is major School districts. It will be decided to launch the digital learning initiative. The digitallearning initiative will be helpful for students and teachers. It allows the students and teachers totransform the information. The sixth grade students get the information through the iPad and thetwelfth grade students get the information through the MacBook Air computers. The teachers get theinformation through both iPad and MacBook Air computers. The security problem will be appeared inthe digital learning. It is very complex .To avoid the security problem, SMSD decided to provide firewallauthentication in the digital learning. The process of firewall authentication will be done by the ELA(Enterprise License Agreement) with cisco.it will be provide solution for collaboration also. Three toolswill be used to avoid the collaboration. The tools are Cisco collaboration meeting tool, Cisco WebEx andcisco spark. It reduced the security managing problem and complexity. VPN allows the end users toconnect securely to the remote network via servers run by VPN providers. Since the data is fullyencrypted the data cannot be hacked and misused by man in the middle. The privasy of the users can behidden while using VPN. Censorships can be evaded. Many services may not be available to fewcountries. VPN allows them to access those services too. When using public Wifi hotspot , the devicescan be protected from hackers. P2P downloads can be done very safely.2.ObjectivesSecurity ObjectivesHighly secured and highly available networkHigh quality of video and data transfer between teachers and studentsOptimized network security that provided well secured voice and data applicationsFor better information security traffic isolation should be thereSecured tunneling like GRE with MPLSScalable network to take care of future expansionBusiness ObjectivesA secured network infrastructure that supports voice , video and data traffic2
Good isolation between teachers and studentsGood network connectivity between teachers and studentsCapability to expand the IT infrastructure3.Network planningThe network for Shawnee Mission School District (SMSD) is planned in such a manner that fullsecurity is provided to the network. It is a big network that remains as home to 27,500 students. It has 5high schools, one alternative high school, five middle schools and 33 elementary schools. The district isplanning to launch well maintained digital learning platforms. The district has planned to launch 30,000new devices and that devices has to be linked in a secure network. Secure network in the sense it shouldbe away from the hackers [1]. That is the network has to be designed in a manner that provides securityto the network that help the students to execute the studying tasks painlessly. The district also plannedto use CISCO's licensed Identity Service Engine. The school Network's sample diagram has been designedusing Cisco packet tracer. The sample diagram has 3 routers, two switches and 2 PC clients. The numberof routers, switches and clients can be extended. As this is a macro level project, it is able to provideonly the sample diagram showing minimum number of devices. The security is specified as a importantfeature in the network planning and hence more security layers are attached.4.Equipment usedFirewallIt controls the communication between authenticated user and unauthorized user. It providesthe security for the user’s network. It is one type of network security. It provides the permission foraccessing the network in the secured network [2]. The firewall is implemented as a hardware andsoftware.one could built the firewall as both hardware and software.Basic types of firewall1.Proxys firewall2.packet filters3.Stateful inspection firewall.3
Gate WayThe gate way is used to connect two different protocols for connecting two networks. It is oneof the network nodes. The router is gateway to connect the home network to the internet [3].Types of gateway1.Cloud storage gateway2.API,SOA gateway3.Email security gateway4.VoIP trunk gateway5.Amazon API gateway6.media gatewaySwitchSwitch is a high speed device.it is used to send and receive the data. It is Ethernet based one. Itis more all as similar to router and hub.Types of switch1.LAN switch2.Routers3.Managed switch4.Unmanaged network switches.LANLAN stands for Local Area network. It is one type of computer network.it covers only smallregion [4]. It works based on the Ethernet. One could build LAN for small region, like home, schools etc.Uses of LANi.It is used for share the information among the workers and collaborators.ii.It is used to share software licences.so it saves the cost.iii.It is used to share high cost hardware.Web server4
Webserver is used for delivering the web pages. By installing the server software andconnecting the system to the internet, one could made any computer as a webserver. By retransmit theHTML files in the HTTP connection, one could create the website with the help of webserver [5]. Webserver will be having one or multiple IP Addresses. It will be hosting many domains.Types of webserver1.Nginx Web server2.Light speed web server3.Apache web server4.IIS web serverSome features of webserver1.Server side scripting2.virtual hosting3.Bandwidth throttling4.Support for large files.Benefits of webserver1.Easy to manage the applications2.uptime guarantee3.Hassle-free deployment and installation.4.Round the clock support.RouterRouter is one type of networking device. Router connects many different networks. The pocketsreach the router. The router reads the source and destination IP addresses of the pocket and guides it tothe next router. The traffic directing functions is performed at the internet by router. It transfers thedata packets between the computer networks [6].Types of router1.Virtual router2.Edge router3.wired router5
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document