I just need you to mark the assignment as the professor and find any mistakes or anything the professor might lose me marks for. And I need you to fix these mistakes so I don’t lose marks.
Requirements: Simple
I just need you to mark the assignment as the professor and find any mistakes or anything the professor might lose me marks for. And I need you to fix these mistakes so I don’t lose marks.
Requirements: Simple
I just need you to mark the assignment as the professor and find any mistakes or anything the professor might lose me marks in. and i need u to fix these mistakes so i dont lose marks.
Requirements: easy
I just need you to mark the assignment as the professor and find any mistakes or anything the professor might lose me marks in. and i need u to fix these mistakes so i dont lose marks.
Requirements: easy
Hello, for this assignment do not use AI, and please follow the clear instructions concisely. I will attach the outline and assignment template below, fill all the information into the assignment template called “SDN and IBN Assignment Template”, do not make a brand-new document.
“We’re almost done with this paper,” Steve says, looking over a draft of your white paper on software-defined networking.
“I don’t know,” says Bill, another colleague on the team. “While we have Eliza’s attention, I think we should also let her know about intent-based networking (IBN). We could really benefit from the system performing more automated tasks and freeing us up to do other work.”
“Aren’t we already doing that with this SDN architecture?” asks Steve.
“It’s a little different,” Bill says. “They automate different tasks. SDN does more management, while IBN helps with improvements.”
“Got it. Let’s cover both of those bases for Eliza,” says Steve. Then, turning to you, he says, “You’ve done some solid work with this SDN section. Can you draft another piece for IBN architecture?”
Software-defined networking (SDN) and intent-based networking (IBN) offer an ability to revolutionize the modern network architecture. Both of these concepts are relatively new, and your chief technology officer (CTO) has only heard them in passing. In fact, she pawned them off as the new marketing fad dressed up as a new concept. Since you have researched both technologies, you understand this is not a fad. When used in combination with virtualization and cloud computing, you know SDN and IBN could revolutionize how the organization operates, providing for reduced costs, efficiency, better management of the network assets, and security.
However, you need to develop a white paper for the Caduceus CTO to highlight these benefits. Given the CTO has only heard the term in passing, you must describe in this white paper, the SDN and IBN concepts, their benefits, and what it would take for the organization to implement.
In addition to submitting your individual white paper here in Assignment 3, you will also begin to work with your team for the upcoming collaborative projects (Assignments 4 and 5). You should meet your team, brainstorm ideas for your white paper together, and begin planning your upcoming work.
After you introduce yourself to your team and brainstorm ideas for this assignment, refer to the for more details about Caduceus and download the assignment template.
In your white paper, use additional sources of information but also describe the concept in laymans terms. Use visuals where appropriate. Describe how an SDN/IBN architecture would look different than network architectures we have traditionally deployed. Compare and contrast the network architectures and discuss the pros and cons of each.
The paper should include the following sections:
Download the assignment template cover page and complete your white paper.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
Requirements: 3 pages
i may ask for changes based on what i see fit, include screen shots also
Objective:
The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels, and ensure secure communication between these sites.
Scenario: Global Tech Enterprises
Future Tech Enterprises is a multinational corporation with headquarters in New York and
branch offices in Abu Dhabi and London. The company needs to ensure secure
communication between its offices over the internet. Each site has its own local network, and
the organization wants to establish secure Site-to-Site IPsec VPN tunnels between these
locations to protect sensitive data during transmission.
Network Overview:
New York Office:
Network: 10.11.1.0/24
Router: NY-R1
External IP: 203.0.113.1
Abu Dhabi Office:
Network: 10.22.2.0/24
Router: AD-R1
External IP: 198.51.100.1
London Office:
Network: 10.33.3.0/24
Router: LDN-R1
External IP: 192.0.2.1
Your task is to configure and verify Site-to-Site IPsec VPNs between these three offices to
ensure that all communication over the public internet is encrypted and secure.
Part 1: Understanding Site-to-Site IPsec VPNs (20 points)
Conduct your own research and explain the following questions (Make sure to add the necessary citations):
Part 2: Configuring the Site-to-Site IPsec VPNs (50 points)
Network Topology Setup (10 points)
Using network simulation software (e.g., Cisco Packet Tracer) design a network topology that
includes the New York, Abu Dhabi, and London offices.
Include network address assignments, routing configurations (static routing), and firewall settings as
necessary.
Provide a diagram of the network topology showing how each office connects to the other two.
After configuring static routing test your routing configuration by pinging between office networks. Include screenshots showing successful pings.
IPsec VPN Configuration (30 points)
Configure the IPsec VPN on the routers at each office (NY-R1, AD-R1, LDN-R1). Ensure the
configurations include:
Verification (10 points)
Verify that the IPsec VPN tunnels are established successfully between all three offices. Provide
output from relevant verification commands (e.g., show crypto isakmp sa, show crypto ipsec
sa).
Demonstrate secure communication between the offices by pinging between devices on
different networks (e.g., from a device in the New York office to a device in the London office)
and observing encrypted traffic. Make sure to add screenshots in the report
Part 3: Testing and Troubleshooting (20 points)
_Testing the VPN Tunnels _(10 points)
Test the VPN tunnels by initiating traffic that matches the ACLs defined in the configuration,
ensuring that communication between New York, Abu Dhabi, and London is secure.
Provide evidence (screenshots or command outputs) showing successful data transmission over
the VPNs.
Part 4: Reflection and Documentation (10 points)
Write a reflection on what you learned during this assignment. Highlight any challenges you
faced, particularly in managing multiple VPN tunnels, and how you overcame them.
** Add references and also sign the Academic Integrity Disclaimer in the report template.
Submission
Each student must submit 2 files in the given order:
> 2000 words
Requirements: n/a
see rubric plz
Requirements: see rurbic plz
To complete this assignment, you will need the following document: powerpoint The project incorporates one milestone, which was submitted in Module Five. (attached below)
Requirements: see rubric plz
SANDBOX
username: mohmand.hussaini@snhu.edu
password: Revolution2026$
Requirements: see rubric plz
see rubric plz Reading below
Requirements: see rubric plz
I have attached the assignment instruction read it in the PDF and tell me if u could do it the best way possible if yes tell me so that I could explain in details more
Requirements: 2000