Designing A VPN Network For An SME Bank

Components of the VPN Network

In the world of networking today, there are many intruders who access peoples’ network without their knowledge. Small businesses tend not to protect their networks since they believe that they have no information that can be targeted by the intruder. In reality many organizations and companies are losing data and money because of negligence of network security and awareness. On other hand, smart organizations are taking this into consideration by spending a lot in implementing security in their network. It is worth to spend a lot in implementing network security in order to avoid network vulnerabilities in any given network. This is used in developing effective security policies in any given network. Any attack in such organization will be easily identified and protected before it causes any harm to the entire system. Currently, it is necessary for enterprises and organizations to pay superior consideration to security layers in order to protect their networks from attacks [1]. The determination of this report is to design a VPN network for an SME bank organization and study any attack or weakness in such network and implement security features in order to protect the network from threats.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Australib is a bank that operates in Australia. The bank has many branches in Australian cities. Each branch of the bank has its own network. This makes it hard for the management team to control data over all the branches that are located in Australian cities. Bank networks have some loop holes in which intruders can use to tamper with the banks’ data [2]. The objective of this project is to develop a VPN network that will connect all the branches of the bank together over all the Australian cities so that they can be controlled from a single place and share resources within the network.

The following are some of the requirements that the VPN design aims at fulfilling.

  • Connection of all networks in the bank using the VPN technology.
  • All the bank users to access the bank services through google, file server and email.
  • Designing the network so that users at all locations in Australia can access internet but not through VPN technology.
  • Implementation of routers in the network topology to control the flow of packets.
  • Identifying other requirements like IP addresses and routers that will be used in each location without conflictions [3].
  • Another requirement of the network is to identify the IP address that is assigned to the network, that is whether it is static or dynamic, and use of the same encryption method for the tunnel connection among the branches for high security. For information transformation, VPN will use the same authentication method to transfer data between the branches of the bank.

These are the components that will be used in connecting the network.

Most of the hardware components that will be implemented in the system will include the VPN systems. These VPN systems comprise of routers, switches and servers. Other devices are network end devices like computers and printers.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Most of these devices will be encrypted and easy to use. Cisco 1900 routers will be the best to use in this part since they are designed with application features and integrated with cloud based services [4]. These devices also deliver virtualized applications through a wide array of connectivity that is suitable in WAN networks. These devices will also offer high performance of the VPN network that has a speed of up to 25mps.

Hardware components of the network

The software will offer high flexibility that hardware components cannot provide to the network. it will be managed by third part operators thus reducing on the cost of management. They  are expected to w offer high  flexibility  and control of  trafficking in the  network [5]. This is because they  allow traffic to be excavated on address protocols unlike hardware components which have normal tunnel traffic regardless to the nature of the protocol. More so for hardware component to function, they entail information of the VPN host OS that will be implemented in the network. This software is highly secured to protect any corporation from security threats.

Below table shows the estimated price and hardware components for implementation of the network.

Device

Explanation

Seller

Items No

Quantity  Price

Router

48 gigabit

Dell sellers

5

$5000

Switches

48 port switches

Dell sellers

7

$7000

RJ 45/ 11-connectors

Rj-45

1

100pkts

1000

Computers

· Intel core I3

· 4GB RAM

· 500GB hard disk

· 32 inch screen

HP-computers

245

$1000

Cat 5

Ethernet cables

Hp corporation

3 rolls

$200

Wireless access points

Netgear 5GHZ LR

Hp corporation

4

$200

Labor

$2000

Total

$ 16400

The above  diagram displays the anticipated network plan diagram for the network . The diagram is a prototype for two branches that are connected together through ISP [6]. Room for connection of other network from other branches is also catered for. Each branch will have its own server to store information in its area.  The main routers that are located to each branch of the bank will have Public IP addresses so that they can be accessed from outside. All the branches will have wireless network to be used by the minor users within the bank branch. All network in the branch will be linked together through ISP to the external server that are located in google and yahoo server. These servers are located in the cloud and hence they can be accessed from anywhere when one is connected to the internet.  

The above shows the design part of the network. The network from each branch is connected together through star topology as shown above.

The following IP addressing is used in the network.

DNS server, file server and yahoo server configuration

IP address

Subnet mask

Gateway

74.125.224.178

255.255.255.0

74.125.224.1

The following IP address will used at the headquarters 

Virtual private system frameworks are continually developing and winding up more secure through four primary highlights: burrowing, validation, encryption and access controling. These highlights work independently, yet consolidate to convey a more elevated amount of security while in the meantime permitting all clients (counting those from remote areas) to get to the VPN more easy [7].

The network will be provided with external backup servers that will be stored in cloud. These servers will take over as soon as other servers in banks are down [7].

The network will be implemented with the following VPN commands.

Router configuration

Branch-1#show running-config Building configuration

… Current configuration : 1702 bytes

!version 15.1 no service timestamps log datetimemsec no service timestamps debug datetimemsec no service password-encryption !hostname Branch-1 !

ipcef no ipv6 cef !

licenseudipid CISCO1941/K9 sn FTX15240000 license boot module c1900 technology-package securityk9 !

cryptoisakmp policy 1 encraes 192 hash md5 authentication pre-share group 5

! cryptoisakmp key cisco address 60.1.1.1 !

cryptoipsec transform-set TS esp-aes 256 esp-sha-hmac !

crypto map MyMap 10 ipsec-isakmp set peer 60.1.1.1 set transform-set TS match address MyAcl !spanning-tree mode pvst Design & Implementation of.

This command is used to provide security to the network.

Conclusion

VPN is a developing technology that is making its way to the market from unsecured Public telephone connections to advanced business connection in its gateway. The technology is also still developing this is great advantage to this business since it need the technology so that they can grow together. VPN technology will be the best for this network  since I t will provide the highest security  in the network

References

[1] Gupta, A., Kleinberg, J., Kumar, A., Rastogi, R. and Yener, B.. Provisioning a virtual private network: a network design problem for multicommodity flow. In Proceedings of the thirty-third annual ACM symposium on Theory of computing(pp. 389-398). ACM,2011

[2] Chekuri, C., Shepherd, F.B., Oriolo, G. and Scutella, M.G. Hardness of robust network design. Networks: An International Journal, 50(1), pp.50-54, 2009

[3] Chowdhury, N.M.K. and Boutaba, R.. Network virtualization: state of the art and research challenges. IEEE Communications magazine, 47(7), 2009

[4] N.M.K. and Boutaba, R. A survey of network virtualization. Computer Networks, 54(5), pp.862-876, 2013

[5]  Eisenbrand, F. and Grandoni, F., 2005. An improved approximation algorithm for virtual private network design. In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms (pp. 928-932). Society for Industrial and Applied Mathematic, 2014.

[6] Gungor, V.C. and Lambert, F.C.. A survey on communication networks for electric system automation. Computer Networks, 50(7), pp.877-897, 2009

[7]   Qu, W. and Srinivas, S.r. IPSec-based secure wireless virtual private network. In MILCOM 2002. Proceedings (Vol. 2, pp. 1107-1112). IEEE, 2011

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.