The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
In this lab, you will explore, select, and justify the selection of a virtual private network (VPN) for a
midsize network.
You shall actually identify the hardware and software needed to meet the network security and users
requirements.
The reason for this lab is to allow you to experience the VPN technology selection process, while
working with a limited set of requirements and the current industry offerings.
Basic VPN requirements and assumptions are as follows. Access control to the VPN is based on a user ID and password. 120 simultaneous VPN connections must be supported. User (client) connection speeds range from 3 to 30 megabits. No, or minimal, client software setup is required. No special hardware is required by the client system. Full data encryption for all network traffic is required. Protection against man-in-the-middle
attacks is required. Remote administration (includes reconfiguration) to the VPN is required. Access control and right or permissions are integrated into other services, such as active
directory for Windows configurations. Access (read or write) to network resources, such as file shares (virtual drives), web servers,
database servers, and so forth is required. Assume users will be using a Windows, MAC, and Linux client system released within the
last 3 years. Assume a web browser will be used to access the web servers. Assume the client will have
preinstalled applications that can access file shares and database servers. Assume the host firewall will support your selection. The selected vendor(s) must have an excellent reputation for quality and support. Cloud-based, non-cloud-based, and hybrid solutions are all acceptable. Deliverables Document Authoring Guidelines
Each section will vary in size based on the requirements. Drive yourself to create a useful
document for the direction you have selected. Lab Document Framework Potentially Acceptable VPN Solution: State the general characteristics of one solution that
meets the security and user requirements. Name the vendor(s) and VPN services. It is
generally about 3 sentences. VPN Solution Overview: Outline the technical functionality and customer requirements of
your first choice for a VPN service. This may take the form of a feature chart that is mapped
to the requirements. Include any special conditions, limitations, or exceptions that exist. It is
generally about 2 pages. Network Design Illustration: Using a graphic illustration tool, such as Visio, document the
logical design of your VPN solution. It is generally about 2 pages. Citations and Resources Used in this Report: Tell us where you received external
guidance and ideas. If you have presented original ideas, then give yourself credit and tell us
Step 1 Back to Top
Given the above requirements (see scenario or summary), select one (1) potentially acceptable VPN
solution found through your research (see suggested resources). This is likely to be a combination of
vendor products and services. An example is provided in the textbook and in the URLs below.
Step 2
Back to Top
Outline the technical functionality and customer requirements of your first choice for a VPN service.
Indicate what the VPN can do, with respect to the requirements.
Step 3
Back to Top
Create a graphic illustration of the logical network design. Show how the technical functionality and
customer requirements come together in your selection of a VPN service. Suggested Resources
Back to Top
Security Vendor and Contributor Websites (See the examples below, but be aware that URLs do
change without notice.) https://www.google.com/search?q=vpn solutions for small business https://www.google.com/search?q=HP vpn solutions https://www.google.com/search?q=Cisco vpn solutions https://www.google.com/search?q=IBM vpn solutions https://www.google.com/search?q=verizon vpn solutions Grading Rubric
Back to Top Category Points % Description Structure 2.5 5 Use of applicable and creative layouts Documentation and Formatting 7.5 15 Appropriate citations or referenced sources and formats of
characters or content Lab or Case Analysis 20 40 Accurate and complete delivery of lab tasks Executive, or Management Quality
20
Content 40 Provides an appropriate value to managers in the setting of
the lab's scope Total 100 A quality lab document will meet or exceed all of the
above requirements. 50
Â
In this lab, you will explore, select, and justify the selection of a virtual private network (VPN) for a
midsize network.
You shall actually identify the hardware and software needed to meet the network security and users
requirements.
The reason for this lab is to allow you to experience the VPN technology selection process, while
working with a limited set of requirements and the current industry offerings.
Basic VPN requirements and assumptions are as follows. Access control to the VPN is based on a user ID and password. 120 simultaneous VPN connections must be supported. User (client) connection speeds range from 3 to 30 megabits. No, or minimal, client software setup is required. No special hardware is required by the client system. Full data encryption for all network traffic is required. Protection against man-in-the-middle
attacks is required. Remote administration (includes reconfiguration) to the VPN is required. Access control and right or permissions are integrated into other services, such as active
directory for Windows configurations. Access (read or write) to network resources, such as file shares (virtual drives), web servers,
database servers, and so forth is required. Assume users will be using a Windows, MAC, and Linux client system released within the
last 3 years. Assume a web browser will be used to access the web servers. Assume the client will have
preinstalled applications that can access file shares and database servers. Assume the host firewall will support your selection. The selected vendor(s) must have an excellent reputation for quality and support. Cloud-based, non-cloud-based, and hybrid solutions are all acceptable. Deliverables Document Authoring Guidelines
Each section will vary in size based on the requirements. Drive yourself to create a useful
document for the direction you have selected. Lab Document Framework Potentially Acceptable VPN Solution: State the general characteristics of one solution that
meets the security and user requirements. Name the vendor(s) and VPN services. It is
generally about 3 sentences. VPN Solution Overview: Outline the technical functionality and customer requirements of
your first choice for a VPN service. This may take the form of a feature chart that is mapped
to the requirements. Include any special conditions, limitations, or exceptions that exist. It is
generally about 2 pages. Network Design Illustration: Using a graphic illustration tool, such as Visio, document the
logical design of your VPN solution. It is generally about 2 pages. Citations and Resources Used in this Report: Tell us where you received external
guidance and ideas. If you have presented original ideas, then give yourself credit and tell us
Step 1 Back to Top
Given the above requirements (see scenario or summary), select one (1) potentially acceptable VPN
solution found through your research (see suggested resources). This is likely to be a combination of
vendor products and services. An example is provided in the textbook and in the URLs below.
Step 2
Back to Top
Outline the technical functionality and customer requirements of your first choice for a VPN service.
Indicate what the VPN can do, with respect to the requirements.
Step 3
Back to Top
Create a graphic illustration of the logical network design. Show how the technical functionality and
customer requirements come together in your selection of a VPN service. Suggested Resources
Back to Top
Security Vendor and Contributor Websites (See the examples below, but be aware that URLs do
change without notice.) https://www.google.com/search?q=vpn solutions for small business https://www.google.com/search?q=HP vpn solutions https://www.google.com/search?q=Cisco vpn solutions https://www.google.com/search?q=IBM vpn solutions https://www.google.com/search?q=verizon vpn solutions Grading Rubric
Back to Top Category Points % Description Structure 2.5 5 Use of applicable and creative layouts Documentation and Formatting 7.5 15 Appropriate citations or referenced sources and formats of
characters or content Lab or Case Analysis 20 40 Accurate and complete delivery of lab tasks Executive, or Management Quality
20
Content 40 Provides an appropriate value to managers in the setting of
the lab's scope Total 100 A quality lab document will meet or exceed all of the
above requirements. 50
-----------