Assessment Details and Submission Guidelines Unit Code BN305 Unit Title Virtual Private Networks Assessment Type Individual Assessment Title Secure Network Design and Implementation Purpose of the...

1 answer below »
how much.?and please i need it before deadline


Assessment Details and Submission Guidelines Unit Code BN305 Unit Title Virtual Private Networks Assessment Type Individual Assessment Title Secure Network Design and Implementation Purpose of the This assignment assesses the following Unit Learning Outcomes; students should be assessment (with able to demonstrate their achievements in them. ULO Mapping) Describe architectural VPN design for small, medium and large businesses and corporations Report on the health of the existing VPN architecture, solution, data, application, and technology Discuss the appropriate security design and solutions for varieties of organisations Report on the current and future state of the management of VPN infrastructure and its technologies Interpret a roadmap process to transform the VPN architecture to support long- term organisations’ goals Implement a process to support the administration and the management of VPN Weight 15% Total Marks 40 Word limit See the instructions. Due Date Sunday 11:55pm i.e. 22th of September 2019 Submission All work must be submitted on Moodle by the due date along with a completed Guidelines Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Script based on your implementation must be submitted to moodle Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/specialconsiderationdeferment Academic Academic Misconduct is a serious offence. Depending on the seriousness of the case, Misconduct penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic- Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: ABM RusselModerated by: Noor-U-ZamanAugust, 2019 Assignment Description Tasks: There are two parts to this assignment, i.e. part A and part B. 1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section. (35 marks) 2. Presentation. (5 marks) Note: Only one report for part A and one presentation slide for part B per group should be submitted. Part A description: (35 marks) National Cyber Security Services Inc. is a fictitious company in Australia and currently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling. 1. Design a network for National Cyber Security Services Inc. 2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main branch in Brisbane. 3. You need to select the IP address of your network at main branch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other branches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection. Report must include: Introduction Scopes and Limitations Requirements (Network parts and VPN service parts) Solution Design o Logical Design o Physical Design o Network Topologies o IP addressing o Security features and Policies Prepared by: ABM RusselModerated by: Noor-U-ZamanAugust, 2019 o Redundancy and Failover plans o VPN service Deployment and implementation Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity. Part B description: (5 marks) Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students’ presentation. Marking criteria: Section to be included in the Marks Description report and demonstration Correctly identifying, appropriateness, discussion The 5 Identification and Analysis and document should include all necessary headings and contents description to depict a VPN services and network design as per the example provided Description and justification Design This section should include proper headings and contents to propose a solution for a VPN network. Wireless LAN solution 15 Explanation/justification needs to be included. The design of this scenario should be unique and not overlapping with other group Implementation Implementation of the network solution should include VPN 12 and based on the specified design Presentation Presentation slides should be well organised and presentation 5 should be delivered well. References References should follow IEEE Style 3 Total 40 Marking Rubric Grade Mark HD 32-40 D 28-31 CR 24-27 P 20-23 Fail <20 excellent very good good satisfactory unsatisfactory identification and highly valid and valid and generally valid and valid but no not valid and analysis and appropriate appropriate appropriate appropriate not appropriate description /5 prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019 components components all elements are present and most explanation/ present with present and well mostly well components lacks structure. justification /15 integrated. good cohesion integrated present components components implementation all elements are present with present and most didn’t present and well good mostly components /12 implement. implemented. implemented implemented implemented presentation presentation presentation slides presentation /5 slides were very presentation was did not present. good and well slides were good were organised given. well presented. and presented. presented. clear styles with clear generally good unclear lacks reference style /3 excellent source referencing/ referencing/styl consistency with referencing/sty le of references. style e many errors prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019 excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" identification="" and="" highly="" valid="" and="" valid="" and="" generally="" valid="" and="" valid="" but="" no="" not="" valid="" and="" analysis="" and="" appropriate="" appropriate="" appropriate="" appropriate="" not="" appropriate="" description="" 5="" prepared="" by:="" abm="" russel="" moderated="" by:="" noor-u-zaman="" august,="" 2019="" components="" components="" all="" elements="" are="" present="" and="" most="" explanation/="" present="" with="" present="" and="" well="" mostly="" well="" components="" lacks="" structure.="" justification="" 15="" integrated.="" good="" cohesion="" integrated="" present="" components="" components="" implementation="" all="" elements="" are="" present="" with="" present="" and="" most="" didn’t="" present="" and="" well="" good="" mostly="" components="" 12="" implement.="" implemented.="" implemented="" implemented="" implemented="" presentation="" presentation="" presentation="" slides="" presentation="" 5="" slides="" were="" very="" presentation="" was="" did="" not="" present.="" good="" and="" well="" slides="" were="" good="" were="" organised="" given.="" well="" presented.="" and="" presented.="" presented.="" clear="" styles="" with="" clear="" generally="" good="" unclear="" lacks="" reference="" style="" 3="" excellent="" source="" referencing/="" referencing/styl="" consistency="" with="" referencing/sty="" le="" of="" references.="" style="" e="" many="" errors="" prepared="" by:="" abm="" russel="" moderated="" by:="" noor-u-zaman="" august,="">
Answered Same DaySep 16, 2021

Answer To: Assessment Details and Submission Guidelines Unit Code BN305 Unit Title Virtual Private Networks...

Amit answered on Sep 22 2021
147 Votes
Title of the assignment: Assignment no. – (Secure Network Design and Implementation)
Student’s name:
Student ID:
Professor’s name:
Course title: BN 305 (Virtual Private Networks)
Date: 9/22/2019
Table of Contents
1.    Introduction    3
2.    Limitations and scope of proposed network design    3
3.    Networking requirements    4
4.    Phy
sical design for NCSSI    4
5.    Logical design for NCSSI    5
6.    IP addressing scheme for NCSSI    7
7.    Policies for security implementation at NCSSI    7
8.    Recovery and redundancy plan for failure condition    8
9.    VPN implementation in logical design of NCSSI    9
10.    Conclusion    9
11.    References:    10
1. Introduction
The new network implementation for NCSSI (National Cyber Security Services Inc.) for connecting Sydney and Melbourne branches with Brisbane based head office requires logical as well as physical design. The VPN implementation is also required for connecting these offices. The remote accessing of network is also required by NCSSI. This new network implementation also makes requirement analysis of hardware devices and IP allocation. The selection of networking topology and development of security policies is also required from the new network design of NCSSI. The failure plan and VPN implementation also maintains their scope in presented network design of NCSSSI. With helps of this security policy implementation, the user maintaining unauthorized remote access to new network of NCSSI can be prevented and all possible attacks to cyber security network can easily be avoided. The recovery plan will help in maintaining the backbone of proposed network.
2. Limitations and scope of proposed network design
The implementation of this new VPN based network design for NCSSI maintains its scope and certain limitations. The scope is mainly related to connection of all three branches with each other. These connections are developed with help of WAN implementation. The redundancies of existing network of NCSSI also help in defining the scope for new network. The scope of this new network design for NCSSI can be understood with these functional requirements:
1. Requirement of VPN implementation in all three branches.
2. Remote access to specific users from both branch offices to main office resources.
3. IP implementation plan.
4. Failure recovery plan for new network of NCSSI.
5. Security policy development for new network of NCSSI and its implementation.
The limitations of this new network design for NCSSI can be understood with points:
1. The new VPN implementation to NCSSI will require migration from existing network which can cause server failure issues.
2. The policies for remote access can cause security issues.
3. Networking requirements
The implementation of new network to NCSSI makes requirements of new hardware devices. The mainly used hardware devices in new network of NCSSI are:
1. Firewall implementation: The new network of NCSSI will provide connectivity in three branches and also makes remote access. Thus, firewall will provide security.
2. Wireless and wired routers: The implementation of new network to NCSSI makes requirement of data routes. Thus, both wireless and wired routers are required for all three branches.
3. Switch: The gateway o branch offices of NCSSI is developed with help of switches, thus,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here