Cybersecurity Price negotiable

Task 1 1000 to 1400 words

You are required to write a report for T1 Electros Chief Information Officer, the report should contain the following sections:

    Explain in your own words what a VPN is and in general terms how they work.

    Research the various VPN technologies that could be used to secure a site-to-site connection. Compare and contrast these VPN technologies looking at speed, ease of configuration and security. Hint: PPTP, L2TP and IPSec are the main types to focus on.

    VPNs make use of symmetric and asymmetric encryption for critical phases of their operation. Explain using clear, concise and technically accurate descriptions the difference between symmetric and asymmetric encryption. Explain which phase of the VPN establishment uses symmetric encryption and which phase use asymmetric encryption and crucially why VPNs operate this way. Ensure that you provide an example of each form of encryption, these should be the same as the encryption algorithms you used in your Site-to-Site VPN in task 2.

Task 2

Implement an IPSec Site-to-Site VPN between the main site edge router and the server farm edge router. Company policy dictates that this network requirement should be designed, implemented and tested in an advanced network simulation application before it is rolled out on the live network. You should use the prototype you configured in assignment 1 of WAN Protocols and Cybersecurity as the starting point for the new prototype.

Make use of Cisco Packet Tracer, in order to demonstrate how the new network structure will work. A physical topology of the network has been provided below. The additional IP addressing for the Site-to-Site VPN is completely your responsibility.

Add a section to your report that uses commented screenshots to describe the configuration and testing of the Site-to-Site VPN. – 400 to 600 words.

Requirements:

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of the Site-to-Site VPN. Again, this will require good research skills and some experimentation using Packet Tracer to configure successfully.

You can leave a response, or trackback from your own site.