Network Routing and Switching Protocols Project: Security Design

Verified

Added on  2021/04/17

|7
|926
|55
Project
AI Summary
This project focuses on designing a secure network for ZipTech Manufacturing Ltd., connecting its head office in Christchurch with sales offices in Texas and Washington. The design emphasizes security using site-to-site VPN tunnels and a hub-and-spoke topology. The network employs access control lists to restrict internet access and protect sensitive data. The solution includes a detailed subnet plan, allocating IP addresses for various departments in each location. The project also provides a justification for the chosen design, highlighting the importance of VPNs for secure communication and the use of ACLs for managing internet access and overall network security. The subnet plan includes details of the subnet name, size, allocated size, address, mask, assignable range, and broadcast address for each department in each location.
Document Page
Running head: NETWORK ROUTING AND SWITCHING PROTOCOLS
Network Routing and Switching Protocols
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK ROUTING AND SWITCHING PROTOCOLS
Table of Contents
Network Design...................................................................................................................2
Justification..........................................................................................................................2
Subnet Plan..........................................................................................................................3
Bibliography........................................................................................................................7
Document Page
2
NETWORK ROUTING AND SWITCHING PROTOCOLS
Network Design
Justification
The network is designed for ZipTech Manufacturing Ltd. for connecting its head office
located in Christchurch with two of the sales office located in American states of Texas and
Washington. The main requirement of the organization is to maintain security in the network
such that the network cannot be intruded by any unauthorized users to access the sensitive data
of the organization. The network is designed with the application of VPN tunnels for ensuring
that the security is maintained by the creation of site to site VPN. The router installed in the
network should be configured with VPN settings and hub and spoke topology is selected for
designing the network. The router is configured with access control list such that the users are
staffs can be restricted to use the internet connection at the head office.
Access Control List
Allow Deny
Internet 172.29.68.1 - 172.29.68.14
R&D All 172.29.68.25
Document Page
3
NETWORK ROUTING AND SWITCHING PROTOCOLS
Server
Subnet Plan
Head Office
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
R&D 10 14 172.29.68.
0
/28 255.255.255.2
40
172.29.68.
1 -
172.29.68.
14
172.29.68.
15
Marketi
ng
5 6 172.29.68.
24
/29 255.255.255.2
48
172.29.68.
25 -
172.29.68.
30
172.29.68.
31
Shipping 3 6 172.29.68.
48
/29 255.255.255.2
48
172.29.68.
49 -
172.29.68.
54
172.29.68.
55
Accounts 3 6 172.29.68.
40
/29 255.255.255.2
48
172.29.68.
41 -
172.29.68.
46
172.29.68.
47
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK ROUTING AND SWITCHING PROTOCOLS
Sales 4 6 172.29.68.
32
/29 255.255.255.2
48
172.29.68.
33 -
172.29.68.
38
172.29.68.
39
IT
Support
5 6 172.29.68.
16
/29 255.255.255.2
48
172.29.68.
17 -
172.29.68.
22
172.29.68.
23
Texas
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
R&D 10 14 172.29.64.
0
/28 255.255.255.2
40
172.29.64.
1 -
172.29.64.
14
172.29.64.
15
Marketi
ng
5 6 172.29.64.
24
/29 255.255.255.2
48
172.29.64.
25 -
172.29.64.
30
172.29.64.
31
Shipping 3 6 172.29.64.
48
/29 255.255.255.2
48
172.29.64.
49 -
172.29.64.
172.29.64.
55
Document Page
5
NETWORK ROUTING AND SWITCHING PROTOCOLS
54
Accounts 3 6 172.29.64.
40
/29 255.255.255.2
48
172.29.64.
41 -
172.29.64.
46
172.29.64.
47
Sales 4 6 172.29.64.
32
/29 255.255.255.2
48
172.29.64.
33 -
172.29.64.
38
172.29.64.
39
IT
Support
5 6 172.29.64.
16
/29 255.255.255.2
48
172.29.64.
17 -
172.29.64.
22
172.29.64.
23
Washington
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
R&D 10 14 172.29.62.
0
/28 255.255.255.2
40
172.29.62.
1 -
172.29.62.
14
172.29.62.
15
Marketi
ng
5 6 172.29.62.
24
/29 255.255.255.2
48
172.29.62.
25 -
172.29.62.
Document Page
6
NETWORK ROUTING AND SWITCHING PROTOCOLS
172.29.62.
30
31
Shipping 3 6 172.29.62.
48
/29 255.255.255.2
48
172.29.62.
49 -
172.29.62.
54
172.29.62.
55
Accounts 3 6 172.29.62.
40
/29 255.255.255.2
48
172.29.62.
41 -
172.29.62.
46
172.29.62.
47
Sales 4 6 172.29.62.
32
/29 255.255.255.2
48
172.29.62.
33 -
172.29.62.
38
172.29.62.
39
IT
Support
5 6 172.29.62.
16
/29 255.255.255.2
48
172.29.62.
17 -
172.29.62.
22
172.29.62.
23
Bibliography
Dubey, S., & Tripathi, N. (2015). Detection of Anomalous Behavior for Real Time Wide Area
Network Traffic Using Wireshark.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]