In the world of networking today, there are many intruders who access peoples’ network without their knowledge. Small businesses tend not to protect their networks since they believe that they have no information that can be targeted by the intruder. In reality many organizations and companies are losing data and money because of negligence of network security and awareness. On other hand, smart organizations are taking this into consideration by spending a lot in implementing security in their network. It is worth to spend a lot in implementing network security in order to avoid network vulnerabilities in any given network. This is used in developing effective security policies in any given network. Any attack in such organization will be easily identified and protected before it causes any harm to the entire system. Currently, it is necessary for enterprises and organizations to pay superior consideration to security layers in order to protect their networks from attacks [1]. The determination of this report is to design a VPN network for an SME bank organization and study any attack or weakness in such network and implement security features in order to protect the network from threats.
Australib is a bank that operates in Australia. The bank has many branches in Australian cities. Each branch of the bank has its own network. This makes it hard for the management team to control data over all the branches that are located in Australian cities. Bank networks have some loop holes in which intruders can use to tamper with the banks’ data [2]. The objective of this project is to develop a VPN network that will connect all the branches of the bank together over all the Australian cities so that they can be controlled from a single place and share resources within the network.
The following are some of the requirements that the VPN design aims at fulfilling.
These are the components that will be used in connecting the network.
Most of the hardware components that will be implemented in the system will include the VPN systems. These VPN systems comprise of routers, switches and servers. Other devices are network end devices like computers and printers.
Most of these devices will be encrypted and easy to use. Cisco 1900 routers will be the best to use in this part since they are designed with application features and integrated with cloud based services [4]. These devices also deliver virtualized applications through a wide array of connectivity that is suitable in WAN networks. These devices will also offer high performance of the VPN network that has a speed of up to 25mps.
The software will offer high flexibility that hardware components cannot provide to the network. it will be managed by third part operators thus reducing on the cost of management. They are expected to w offer high flexibility and control of trafficking in the network [5]. This is because they allow traffic to be excavated on address protocols unlike hardware components which have normal tunnel traffic regardless to the nature of the protocol. More so for hardware component to function, they entail information of the VPN host OS that will be implemented in the network. This software is highly secured to protect any corporation from security threats.
Below table shows the estimated price and hardware components for implementation of the network.
Device |
Explanation |
Seller |
Items No |
Quantity Price |
Router |
48 gigabit |
Dell sellers |
5 |
$5000 |
Switches |
48 port switches |
Dell sellers |
7 |
$7000 |
RJ 45/ 11-connectors |
Rj-45 |
1 |
100pkts |
1000 |
Computers |
· Intel core I3 · 4GB RAM · 500GB hard disk · 32 inch screen |
HP-computers |
245 |
$1000 |
Cat 5 |
Ethernet cables |
Hp corporation |
3 rolls |
$200 |
Wireless access points |
Netgear 5GHZ LR |
Hp corporation |
4 |
$200 |
Labor |
$2000 |
|||
Total |
$ 16400 |
The above diagram displays the anticipated network plan diagram for the network . The diagram is a prototype for two branches that are connected together through ISP [6]. Room for connection of other network from other branches is also catered for. Each branch will have its own server to store information in its area. The main routers that are located to each branch of the bank will have Public IP addresses so that they can be accessed from outside. All the branches will have wireless network to be used by the minor users within the bank branch. All network in the branch will be linked together through ISP to the external server that are located in google and yahoo server. These servers are located in the cloud and hence they can be accessed from anywhere when one is connected to the internet.
The above shows the design part of the network. The network from each branch is connected together through star topology as shown above.
The following IP addressing is used in the network.
DNS server, file server and yahoo server configuration
IP address |
Subnet mask |
Gateway |
||
74.125.224.178 |
255.255.255.0 |
74.125.224.1 |
||
The following IP address will used at the headquarters
Virtual private system frameworks are continually developing and winding up more secure through four primary highlights: burrowing, validation, encryption and access controling. These highlights work independently, yet consolidate to convey a more elevated amount of security while in the meantime permitting all clients (counting those from remote areas) to get to the VPN more easy [7].
The network will be provided with external backup servers that will be stored in cloud. These servers will take over as soon as other servers in banks are down [7].
The network will be implemented with the following VPN commands.
Router configuration
Branch-1#show running-config Building configuration
… Current configuration : 1702 bytes
!version 15.1 no service timestamps log datetimemsec no service timestamps debug datetimemsec no service password-encryption !hostname Branch-1 !
ipcef no ipv6 cef !
licenseudipid CISCO1941/K9 sn FTX15240000 license boot module c1900 technology-package securityk9 !
cryptoisakmp policy 1 encraes 192 hash md5 authentication pre-share group 5
! cryptoisakmp key cisco address 60.1.1.1 !
cryptoipsec transform-set TS esp-aes 256 esp-sha-hmac !
crypto map MyMap 10 ipsec-isakmp set peer 60.1.1.1 set transform-set TS match address MyAcl !spanning-tree mode pvst Design & Implementation of.
This command is used to provide security to the network.
Conclusion
VPN is a developing technology that is making its way to the market from unsecured Public telephone connections to advanced business connection in its gateway. The technology is also still developing this is great advantage to this business since it need the technology so that they can grow together. VPN technology will be the best for this network since I t will provide the highest security in the network
References
[1] Gupta, A., Kleinberg, J., Kumar, A., Rastogi, R. and Yener, B.. Provisioning a virtual private network: a network design problem for multicommodity flow. In Proceedings of the thirty-third annual ACM symposium on Theory of computing(pp. 389-398). ACM,2011
[2] Chekuri, C., Shepherd, F.B., Oriolo, G. and Scutella, M.G. Hardness of robust network design. Networks: An International Journal, 50(1), pp.50-54, 2009
[3] Chowdhury, N.M.K. and Boutaba, R.. Network virtualization: state of the art and research challenges. IEEE Communications magazine, 47(7), 2009
[4] N.M.K. and Boutaba, R. A survey of network virtualization. Computer Networks, 54(5), pp.862-876, 2013
[5] Eisenbrand, F. and Grandoni, F., 2005. An improved approximation algorithm for virtual private network design. In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms (pp. 928-932). Society for Industrial and Applied Mathematic, 2014.
[6] Gungor, V.C. and Lambert, F.C.. A survey on communication networks for electric system automation. Computer Networks, 50(7), pp.877-897, 2009
[7] Qu, W. and Srinivas, S.r. IPSec-based secure wireless virtual private network. In MILCOM 2002. Proceedings (Vol. 2, pp. 1107-1112). IEEE, 2011
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download