Assessment Details and Submission Guidelines
Unit Code
BN305
Unit Title
Virtual Private Networks
Assessment Type
Individual
Assessment Title
Secure Network Design and Implementation
Purpose of
the
This assignment assesses the following Unit Learning Outcomes; students should be
assessment
(with
able to demonstrate their achievements in them.
ULO Mapping)
Describe architectural VPN design for small, medium and large businesses and
corporations
Report on the health of the existing VPN architecture, solution, data, application,
and technology
Discuss the appropriate security design and solutions for varieties of organisations
Report on the cu
ent and future state of the management of VPN infrastructure
and its technologies
Interpret a roadmap process to transform the VPN architecture to support long-
term organisations’ goals
Implement a process to support the administration and the management of VPN
Weight
15%
Total Marks
40
Word limit
See the instructions.
Due Date
Sunday 11:55pm i.e. 22th of September 2019
Submission
All work must be submitted on Moodle by the due date along with a completed
Guidelines
Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font
and 2 cm margins on all four sides of your page with appropriate section headings.
Reference sources must be cited in the text of the report, and listed appropriately
at the end in a reference list using IEEE referencing style.
Script based on your implementation must be submitted to moodle
Extension
If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer, in
Melbourne on Level 6 or in Sydney on Level 7. You must submit this application
three working days prior to the due date of the assignment. Further information is
available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-
guidelines/specialconsiderationdeferment
Academic
Academic Misconduct is a serious offence. Depending on the seriousness of the case,
Misconduct
penalties can vary from a written warning or zero marks to exclusion from the course
or rescinding the degree. Students should make themselves familiar with the full
policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-Academic-
Misconduct-Policy-Procedure. For further information, please refer to the Academic
Integrity Section in your Unit Description.
Prepared by: ABM Russel Moderated by: Noor-U-Zaman August, 2019
Assignment Description
Tasks:
There are two parts to this assignment, i.e. part A and part B.
1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section. (35 marks)
2. Presentation. (5 marks)
Note:
Only one report for part A and one presentation slide for part B per group should be submitted.
Part A description: (35 marks)
National Cyber Security Services Inc. is a fictitious company in Australia and cu
ently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling.
1. Design a network for National Cyber Security Services Inc.
2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main
anch in Brisbane.
3. You need to select the IP address of your network at main
anch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other
anches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection.
Report must include:
Introduction
Scopes and Limitations
Requirements (Network parts and VPN service parts) Solution Design
o Logical Design o Physical Design
o Network Topologies o IP addressing
o Security features and Policies
Prepared by: ABM Russel Moderated by: Noor-U-Zaman August, 2019
o Redundancy and Failover plans
o VPN service Deployment and implementation
Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and
anch to
anch connectivity.
Part B description: (5 marks)
Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students’ presentation.
Marking criteria:
Section to be included in the
Marks
Description
report and demonstration
Co
ectly identifying, appropriateness, discussion The
5
Identification and Analysis and
document should include all necessary headings and contents
description
to depict a VPN services and network design as per the
example provided
Description and justification
Design
This section should include proper headings and contents to
propose a solution for a VPN network. Wireless LAN solution
15
Explanation/justification
needs to be included. The design of this scenario should be
unique and not overlapping with other group
Implementation
Implementation of the network solution should include VPN
12
and based on the specified design
Presentation
Presentation slides should be well organised and presentation
5
should be delivered well.
References
References should follow IEEE Style
3
Total
40
Marking Ru
ic
Grade Mark
HD 32-40
D 28-31
CR 24-27
P 20-23
Fail <20
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Identification and
Highly valid and
Valid and
Generally valid and
Valid but no
Not valid and
Analysis and
appropriate
appropriate
appropriate
appropriate
not appropriate
description /5
Prepared by: ABM Russel Moderated by: Noor-U-Zaman August, 2019
Components
Components
All elements are
present and
Most
Explanation
present with
present and well
mostly well
components
Lacks structure.
justification /15
integrated.
good cohesion
integrated
present
Components
Components
Implementation
All elements are
present with
present and
Most
Didn’t
present and well
good
mostly
components
/12
implement.
implemented.
implemented
implemented
implemented
Presentation
Presentation
Presentation slides
Presentation /5
slides were very
Presentation was
Did not present.
good and well
slides were good
were organised
given.
well presented.
and presented.
presented.
Clear styles with
Clea
Generally good
Unclea
Lacks
Reference style /3
excellent source
referencing
referencing/styl
consistency with
referencing/sty le
of references.
style
e
many e
ors
Prepared by: ABM Russel Moderated by: Noor-U-Zaman August, 2019