This presentation proposes a two-phase implementation of VPN network for SME organizations, including logical and physical designs, IP addressing scheme, security features and policies, and VPN service implementation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Introduction Communication is very vital in any business Communication over the internet has become to much insecure thus the introduction of VPN technology VPN has enabled lots of companies to maintain reliable, fast, and secure communication when communicating via internet. Other advantages of VPN are improved internet security, extended geographic connectivity, cost savings and scalability [1].
Scope of the proposed VPN network This proposal have two phases of the implementation of VPN network for SME organizations Phase 1: client to site VPN technology Phase 2: Site to Site VPN technology
Two Linksys LRT224 Routers VPN server Firewall Dedicated ISP Requirements
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Logical Design Remote User Internet Service Provider RouterRouterVPN server Melbourne Site VPN TUNNEL client to site logical Design Remote User Internet Service Provider RouterRouterVPN server Melbourne Site VPN TUNNEL
Cont.. VPN serverRouterRouterVPN ServerInternet Melbourne Site Sydney Site VPN TUNNEL site to site Logical Design VPN serverRouterRouterVPN ServerInternet Melbourne Site Sydney Site VPN TUNNEL
Physical Design VPN serverRouterRouterVPN Server Internet Melbourne Site Sydney Site VPN TUNNEL Remote User VPN serverRouterRouterVPN Server Internet Melbourne Site Sydney Site VPN TUNNEL Remote User
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Managed VPN technology topology for SME Provided man-power Have a high-speed network connectivity Manageable Realiable Scalable Easy to maintain [2]
IP addressing scheme HostnameInternal IP address/24 External IP address Default Gateway Maximum Number of hosts Melbourne192.168.1.110.10.10.20110.10.10.200254 Sydney192.168.2.110.10.10.20210.10.10.200254
Security features and policies Security polices in a VPN network allows IP to pass between two or more interfaces A policy-based VPN requires an IPsec type of security policy Another feature which is utilized in this is a firewall which is in form of a software installed in the VPN server
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
VPN service implementation An SME business needs to utilize a phased approach as indicated in the six steps Assessment Design Testing Implementation Training Project management [3]
References [1]D. L. Clark, "IT manager's guide to virtual private networks,"Virtual Private Networks,vol. 2, no. 1, pp. 334-378, 2009. [2]D. R. Kosiur, "Building and managing virtual private networks," Virtual Private Networks,vol. III, no. 2, pp. 67-90, 2011 [3]M. S. J. D. &. Y. M. Pegrum, "U.S. Patent No. 6,516,417.,"Virtual Private Networks,vol. 3, no. 1, pp. 45-67, 2010. [4]I. Pepelnjak and J. Guichard, "MPLS and VPN architectures by Ivan Pepelnjak,"Virtual Networks,vol. II, no. 3, pp. 47-59, 2015. [5] A. Elahi and M. Elahi, "Data, network, and Internet communications technology,"Virtual Networks,vol. III, no. 2, pp. 45-78, 2996. [6]D. Bigger, CompTIA Network+ 2014 : VPN Topologies, Oxford: New Hampshire, 2014.