Nt1310 Unit 3 Assignment 1

Improved Essays
Ilab 5 jerry Metcalf
Keller Graduate School of Management
Professor: Gregory Gleghorn
6/4/2017

VPN Connection
The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely. The user will need to also have a VPN token in order for them to authenticate in to the VPN service. Once they have the token and can provide their credential they can then connect to the network remotely.
…show more content…
To setup the VPN client you will need a Cisco ASA router that support the Cisco any connect client. The Cisco ASA router will be enabled and configured to accept per user base VPN connection and will allow the user access with the correct authenticated login credentials. The Cisco any connect client will allow a secure SSL connection to the security appliance for remote users. If the user does not have a client install then it will redirect then to the web address in order for them to install the client for connection. The components that are needed are listed below.
• Cisco 5500 Series ASA that runs software version 8.0(2)
• Cisco AnyConnect SSL VPN Client version for Windows 2.0.0343
• PC which runs Microsoft ‘Windows 10, Windows 7, Windows 2000 Professional SP4 with Microsoft Installer version

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Scott and Mia, I am not sure which one of your can help me, but in reconciling our account I have discovered a few issues and have some questions. The swiped amount on the reports provided for the GL reconciliation do not always match the swiped amount. I understand that a vendor can undercharge a charge and swipe a card multiple times, but I did not think they could process cards for more than the total payment amount. For example, in tying out our invoice for 2/28-3/6/2018 I found that the swiped amount ties to our invoice/what was paid out via our account, but the swiped amount is for a different amount than what was issued. In six of the seven instances where the swiped amount was different than the issued amount, the swiped amount…

    • 281 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Nt1330 Unit 3 Assignment 1

    • 1374 Words
    • 6 Pages

    INTRODUCTION Midland Insulation Products (MIP) is a Carlow based manufacturing company who specialized in the manufacturing and distribution of insulation products that are employed for building. MIP has implemented Information Systems that handle Manufacturing, Warehousing & Distributions, Finances, Electronic Data Interchange (EDI), Marketing & Sales, Payroll, Customer Relation Management (CRM) & Human Resources (HR). All MIP servers are hosted, on premise and located in one of the two data centres. The CEO of MIP believes that data centres are too expensive to run and would like to work for cloud because cloud offers the best long term solution for hosting MIP servers and applications.…

    • 1374 Words
    • 6 Pages
    Brilliant Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Specify which users can connect to your intranet through Remote Access, Set up a remote access server, Create a customized remote access connection or service profile. Use tokens, smart cards, certificates, or SMS solutions. 8. Secure the Wireless Network: Aside from using an SSID that can’t be easily associated with the company, also be sure to use the strongest encryption type you can, IE: WPA2. Also, set up a guest network so you can prevent visitors to even connect to your internal network. 9.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    What is a VPN? It stands for virtual private network. Its main purpose is to secure the connections between the host and the server. It fulfills that purpose by using tunneling protocols, encryption, data encapsulation and certified connections to protect the identity of the host.…

    • 1050 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    For each office size, the team prepared network, voice, systems, and security architecture design, together with various hardware, software and configuration details. We discussed the responsibilities for each stakeholder and we created an extensive list of activities together with primary and secondary…

    • 574 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    VPN Security Risk Paper

    • 560 Words
    • 3 Pages

    Inevitably there is a security risk in accessing any database on the internet. The internet houses a variety of malware. Engineers attempt to discover security risks users experience and mitigate them. VPN connections can enable users and organizations dealing with confidential information the ability to avoid having their data observed or stolen. VPNs are not perfect, they do however, provide an avenue allowing the ability to transfer data more securely.…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Password Security Threats

    • 2482 Words
    • 10 Pages

    It will make sure that all of the data that is sent o received while connected is encrypted and secure. Employees would have the option of connecting to the VPN from any places that offers access to the internet. Since the VPN is connected to a remote data center, users will have access to data even if they are not physically on the same local area network (LAN). Password…

    • 2482 Words
    • 10 Pages
    Superior Essays
  • Decent Essays

    Network Design Paper

    • 1236 Words
    • 5 Pages

    All staff-accessed computers will be on the Administrative network. The computers in the instructional computer labs and classrooms that will be used for classes should be on the Instructional network. The wifi and the computers in the student lobby should be in the Public network. * The whole building will share one Internet access connection (T-1 link from Telekom).…

    • 1236 Words
    • 5 Pages
    Decent Essays