Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment Details and Submission Guidelines Unit Code BN305 Unit Title Virtual Private Networks Assessment Type Individual Assessment Title Secure Network Design and Implementation Purpose of the...

1 answer below »
Assessment Details and Submission Guidelines
    
    Unit Code
    
    BN305
    
    Unit Title
    
    Virtual Private Networks
    
    Assessment Type
    Individual
    
    Assessment Title
    Secure Network Design and Implementation
    
    Purpose of
    the
    This assignment assesses the following Unit Learning Outcomes; students should be
    
    assessment
    (with
    able to demonstrate their achievements in them.
    
    ULO Mapping)
    Describe architectural VPN design for small, medium and large businesses and
    
    
    
    
    
    
    
    
    corporations
    
    
    
    Report on the health of the existing VPN architecture, solution, data, application,
    
    
    
    
    and technology
    
    
    
    Discuss the appropriate security design and solutions for varieties of organisations
    
    
    
    Report on the cu
ent and future state of the management of VPN infrastructure
    
    
    
    
    and its technologies
    
    
    
    Interpret a roadmap process to transform the VPN architecture to support long-
    
    
    
    
    term organisations’ goals
    
    
    
    Implement a process to support the administration and the management of VPN
    
    
    
    
    
    
    
    
    
    
    
    
    Weight
    
    15%
    
    
    
    
    
    
    
    Total Marks
    
    40
    
    
    
    
    
    
    
    
    Word limit
    
    See the instructions.
    
    Due Date
    
    Sunday 11:55pm i.e. 22th of September 2019
    
    Submission
    
    All work must be submitted on Moodle by the due date along with a completed
    
    Guidelines
    
    
    Assignment Cover Page.
    
    
    
    The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font
    
    
    
    
    and 2 cm margins on all four sides of your page with appropriate section headings.
    
    
    
    Reference sources must be cited in the text of the report, and listed appropriately
    
    
    
    
    at the end in a reference list using IEEE referencing style.
    
    
    
    Script based on your implementation must be submitted to moodle
    
    Extension
    
    If an extension of time to submit work is required, a Special Consideration
    
    
    
    
    Application must be submitted directly to the School's Administration Officer, in
    
    
    
    
    Melbourne on Level 6 or in Sydney on Level 7. You must submit this application
    
    
    
    
    three working days prior to the due date of the assignment. Further information is
    
    
    
    
    available at:
    
    
    
    
    http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
    
    
    
    
    guidelines/specialconsiderationdeferment
    
    
    
    
    
    
    
    Academic
    
    Academic Misconduct is a serious offence. Depending on the seriousness of the case,
    
    Misconduct
    
    
    penalties can vary from a written warning or zero marks to exclusion from the course
    
    
    
    
    or rescinding the degree. Students should make themselves familiar with the full
    
    
    
    
    policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-
    
    
    
    
    
    
    
    
    
    
    
    
    
    publications/policies-procedures-and-guidelines/Plagiarism-Academic-
    
    
    
    
    
    Misconduct-Policy-Procedure. For further information, please refer to the Academic
    
    
    
    
    
    
    
    
    
    
    Integrity Section in your Unit Description.
    
Prepared by: ABM Russel    Moderated by: Noor-U-Zaman    August, 2019
Assignment Description
Tasks:
There are two parts to this assignment, i.e. part A and part B.
1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section. (35 marks)
2. Presentation. (5 marks)
Note:
Only one report for part A and one presentation slide for part B per group should be submitted.
Part A description: (35 marks)
National Cyber Security Services Inc. is a fictitious company in Australia and cu
ently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling.
1. Design a network for National Cyber Security Services Inc.
2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main
anch in Brisbane.
3. You need to select the IP address of your network at main
anch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other
anches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection.
Report must include:
Introduction
Scopes and Limitations
Requirements (Network parts and VPN service parts) Solution Design
o Logical Design o Physical Design
o Network Topologies o IP addressing
o Security features and Policies
Prepared by: ABM Russel    Moderated by: Noor-U-Zaman    August, 2019
o Redundancy and Failover plans
o VPN service Deployment and implementation
Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and
anch to
anch connectivity.
Part B description: (5 marks)
Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students’ presentation.
Marking criteria:
    Section to be included in the
    
    
    
    
    
    Marks
    
    
    Description
    
    
    
    
    
    report and demonstration
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Co
ectly identifying, appropriateness, discussion The
    
    5
    
    Identification and Analysis and
    document should include all necessary headings and contents
    
    
    description
    
    to depict a VPN services and network design as per the
    
    
    
    
    example provided
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Description and justification
    
    
    
    
    Design
    
    This section should include proper headings and contents to
    
    
    
    
    propose a solution for a VPN network. Wireless LAN solution
    15
    
    Explanation/justification
    
    
    
    
    needs to be included. The design of this scenario should be
    
    
    
    
    
    
    
    
    
    unique and not overlapping with other group
    
    
    
    
    
    
    
    
    
    
    
    
    Implementation
    
    Implementation of the network solution should include VPN
    12
    
    
    
    and based on the specified design
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Presentation
    
    Presentation slides should be well organised and presentation
    5
    
    
    
    should be delivered well.
    
    
    
    
    References
    
    References should follow IEEE Style
    
    
    3
    
    
    
    
    
    
    
    
    
    
    Total
    
    
    
    
    
    
    40
    
    
    
    
    
    
    
    
    
    
    Marking Ru
ic
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Grade Mark
    HD 32-40
    
    D 28-31
    CR 24-27
    P 20-23
    Fail <20
    
    
    
    Excellent
    
    Very Good
    Good
    Satisfactory
    Unsatisfactory
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Identification and
    Highly valid and
    Valid and
    Generally valid and
    Valid but no
    Not valid and
    
    Analysis and
    appropriate
    
    appropriate
    appropriate
    appropriate
    not appropriate
    
    description /5
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
Prepared by: ABM Russel    Moderated by: Noor-U-Zaman    August, 2019
    
    
    Components
    Components
    
    
    
    
    All elements are
    
    present and
    Most
    
    
    Explanation
    
    present with
    
    
    
    
    
    present and well
    
    mostly well
    components
    Lacks structure.
    
    justification /15
    integrated.
    good cohesion
    integrated
    present
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Components
    Components
    
    
    
    Implementation
    All elements are
    present with
    present and
    Most
    Didn’t
    
    
    present and well
    good
    mostly
    components
    
    
    /12
    
    
    
    
    implement.
    
    
    implemented.
    implemented
    implemented
    implemented
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Presentation
    Presentation
    Presentation slides
    
    
    
    Presentation /5
    slides were very
    
    
    Presentation was
    Did not present.
    
    
    good and well
    slides were good
    were organised
    given.
    
    
    
    
    well presented.
    and presented.
    
    
    
    
    presented.
    
    
    
    
    
    
    
    
    
    
    
    
    
    Clear styles with
    Clea
    Generally good
    Unclea
    Lacks
    
    Reference style /3
    excellent source
    referencing
    
    referencing/styl
    consistency with
    
    
    
    
    referencing/sty le
    
    
    
    
    of references.
    style
    
    e
    many e
ors
    
    
    
    
    
    
    
    
Prepared by: ABM Russel    Moderated by: Noor-U-Zaman    August, 2019
Answered Same Day Sep 16, 2021

Solution

Amit answered on Sep 22 2021
137 Votes
Title of the assignment: Assignment no. – (Secure Network Design and Implementation)
Student’s name:
Student ID:
Professor’s name:
Course title: BN 305 (Virtual Private Networks)
Date: 9/22/2019
Table of Contents
1.    Introduction    3
2.    Limitations and scope of proposed network design    3
3.    Networking requirements    4
4.    Physical design for NCSSI    4
5.    Logical design for NCSSI    5
6.    IP addressing scheme for NCSSI    7
7.    Policies for security implementation at NCSSI    7
8.    Recovery and redundancy plan for failure condition    8
9.    VPN implementation in logical design of NCSSI    9
10.    Conclusion    9
11.    References:    10
1. Introduction
The new network implementation for NCSSI (National Cyber Security Services Inc.) for connecting Sydney and Melbourne
anches with Brisbane based head office requires logical as well as physical design. The VPN implementation is also required for connecting these offices. The remote accessing of network is also required by NCSSI. This new network implementation also makes requirement analysis of hardware devices and IP allocation. The selection of networking topology and development of security policies is also required from the new network design of NCSSI. The failure plan and VPN implementation also maintains their scope in presented network design of NCSSSI. With helps of this security policy implementation, the user maintaining unauthorized remote access to new network of NCSSI can be prevented and all possible attacks to cyber security network can easily be avoided. The recovery plan will help in maintaining the backbone of proposed network.
2. Limitations and scope of proposed network design
The implementation of this new VPN based network design for NCSSI maintains its scope and certain limitations. The scope is mainly related to connection of all three
anches with each other. These connections are developed with help of WAN implementation. The redundancies of existing network of NCSSI also help in defining the scope for new network. The scope of this new network design for NCSSI can be understood with these functional requirements:
1. Requirement of VPN implementation in all three
anches.
2. Remote access to specific users from both
anch offices to main office resources.
3. IP implementation plan.
4. Failure recovery plan for new network of NCSSI.
5. Security policy development for new network of NCSSI and its implementation.
The limitations of this new network design for NCSSI can be understood with points:
1. The new VPN implementation to NCSSI will require migration from existing network which can cause server failure issues.
2. The policies for remote access can cause security issues.
3. Networking requirements
The implementation of new network to NCSSI makes requirements of new hardware devices. The mainly used hardware devices in new network of NCSSI are:
1. Firewall implementation: The new network of NCSSI will provide connectivity in three
anches and also makes remote access. Thus, firewall will provide security.
2. Wireless and wired routers: The implementation of new network to NCSSI makes requirement of data routes. Thus, both wireless and wired routers are required for all three
anches.
3. Switch: The gateway o
anch offices of NCSSI is developed with help of switches, thus,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here