BN305 - VPN Network Design for SME Networks and VPN Services Report

Verified

Added on  2023/06/04

|15
|1015
|292
Report
AI Summary
This report outlines a VPN network design tailored for Small and Medium Enterprises (SMEs), focusing on VPN services and security considerations. It defines VPNs, explains their functionality, and highlights benefits such as cost reduction and enhanced security. The report details critical functions like data integrity, confidentiality, access control, and authentication, emphasizing the importance of robust security measures. It also discusses tunneling, VPN protocols including PPTP, L2TP, L2F, and IPSec, and various VPN implementation scenarios such as intranet, remote access, extranet, and site-to-site connections. The report acknowledges the disadvantages of using public networks and the need for careful management. Applications of VPNs across different industries like manufacturing, retail, healthcare, and finance are explored, along with a bibliography referencing key sources. Desklib provides access to this report and other valuable study resources.
Document Page
VPN NETWORK DESIGN FOR SME
NETWORK AND VPN SERVICES
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DEFINITION OF VPN
It is a network connection methodology that use the private or the
public network for establishing the connection between the two remote
sites. Encryption is used for securing the communication channel and
for the authentication of the user seeking request to access the
resource of the network from remote destination.
Document Page
HOW THE VPN WORKS?
There are different types of vpn used in different fields such as for
connecting remote branch or to connect remote individual.
A public telecommunication network infrastructure is required for the
development of remote access vpn and securing the organization
network.
A vpn gateway is used by the remote user for identity authentication
and creation of a link that enables the user for reaching the
organizations internal network.
Document Page
BENEFITS OF VPN
The VPN can be used in place of private network for bringing down the
cost and increasing the feasibility of the network.
It increases the security fir transmission of data and access of
information using different vpn service and hiding the activity of the
user.
It can be used for connecting with the blocked sites
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CRITICAL FUNCTIONS
Data Integrity
The data packets flowing in the vpn channel is checked for having any changes.
Confidentiality
The encryption of the channel helps in encapsulation of the data packet and prevent it to be
accessed by the unauthorized users.
Access Control
Is used for the restriction of the user access and block the user from exchanging the traffic
protocols.
Authentication
The user authentication should be verified with the application of RADIUS server
Document Page
VPN SECURITY
The following are the four critical functions that should be ensured for increasing the
security of data such as:
Authentication – It should be ensured that the data is originated for the claimed source
Access Control – The unauthorized users should be restricted for gaining the permission
of the administrator
Confidentiality – The data should be encapsulated such that it can not be viewed by the
unknown users
Data Integrity It should be ensured that the data not gets tampered with the
application of CHAP and RADIUS server for the encryption of the data.
Document Page
WHAT IS TUNNELING?
In this methodology IP packets are encapsulated for the prevention of
snooping with the application of encryption techniques.
There are two different types of end points such as an individual or a
local area network that can connect with the network via a VPN server
or a firewall
Lan to lan tunnels or client to Lan tunnels can be created for the
establishment of a secure connection.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VPN PROTOCOLS
PPTP – it encapsulated the PPP frames contained in the IP datagram.
L2TP – It act as a partner between the PPTP and the Cisco and it is a
combination of the L2TP, L2F and the PPTP protocol. It also provides
support for the IPSec protocol.
L2F – It can support any of the authentication that is supported by the
PPP.
IPSec – It is used for the management of the data confidentiality, key
management and authentication of the user access to the network.
Document Page
IMPLEMENTATION OF VPN
The requirement of an organization and the organizational framework is
essential for the selection of the vpn topology :
Intranet – For within the organization
Remote Access – For the remote users
Extranet – For outside of the organization
Site to site – for connecting two or more branches
Document Page
DISADVANTAGE
The public network is considered as insecure and precautions should be
take for the implementation of the VPN network.
There is or centralized control option for management of the network
performance and maintaining the flow of the data traffic in the
network.
The current existing technology may not be compatible with the
protocols used for the configuration of the VPN service.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
APPLICATION OF VPN
Site to Site VPN
Document Page
APPLICATION OF VPN (CONTD.)
Remote Access VPN
It is used for connecting an individual with the corporate network
A broadband connection is needed for the establishment of the remote
connection.
A long distance communication is used for resource access for different
organization.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]