Documentation The network design for the remote users will leverage the virtual private network shown above. A virtual private network allows a desktop computer (s) at outside the corporate network to connect to the corporate network at the office and enables the remote devices to access the office鈥檚 network resources. They thus function as the other PCs physically in the office physically which are directly connected to the network (Chowdhury & Boutaba Wholesale Carlos Dunlap Jersey , 2009). I chose the VPN remote access network over remote access networks such as dial-in remote access and wireless remote access because it provides secure and advanced connections via a non-secure network. It uses encryption to establish the VPN tunnel between the clients in the remote places and the corporate network. There are several basic security measures that Suns technologies will need to employ to ensure that the remote network access is secure. One of the remote access security enhancements for this network is to secure the remote access servers physically. A strong virus protection solution will also need to be applied and maintained to protect the remote access users and the network resources from viruses and malware. The NTFS file system will also be used to protect the data on the system. The remote access servers will be protected from unauthorized access using strong passwords that will also be changed from time to time. As shown above, the traffic between the remote access server and the remote users will be protected using the tunneling method. In this case, all the data being transferred between the two endpoints is fragmented into frames (Simion et al. Wholesale Tyler Eifert Jersey , 2012). The frames passing through the tunnel are then encrypted with additional tunneling layer of encryption and encapsulation that is also utilized to route packets to the right direction. The security of the remote access users will further entail the use of IPSec filters to protect confidential IP traffic. IPSec (or IP Security) secure data by signing and encrypting it before it is transmitted over a public network (Simion et al., 2012). The company should also consider the use of smart cards to enhance their security access strategy further. Users will be protected further by the monitoring of the activity of the remote access server to ensure that any suspicious activities are noticed in time and promptly addressed before they can escalate and cause harm to the network and its resources. It will also be prudent to create and configure remote access policies. These remote access policies are useful in restricting remote connections after they have been authorized. Access will also be controlled via the Dial-in Properties of individual users鈥?accounts that the remote access users use to connect to the corporate network. Another useful technique that will be used in this network to provide more security to the clients is the Remote Authentication Dial-In User Service (RADIUS), which provides authentication Wholesale Geno Atkins Jersey , authorization, as well as accounting for the company鈥檚 remote access infrastructure (Nelson, 2011). I will also propose the use of Microsoft Encrypted Authentication Version 2 (MS-CHAPv2) to provide mutual authentication for the network as well as the dial-up authentication using encrypted passwords. This method is one of the most secure authentication techniques to use in controlling remote access connections to the remote access servers. Case 3.2: Implementing your Remote Access Solution 3.2.1. Purpose The purpose of the remote access policy is to define the rules as well as the requirements for connecting to Suns technologies鈥?network from the host. The rules and requirements are aimed at minimizing the potential exposure to Suns Technologies from damages that may emanate from unauthorized use of the company resources. The policy applies to all Suns technologies鈥?employees Wholesale A.J. Green Jersey , contractors, vendors, and agents having Suns Technologies鈥?owned or personally-owned computers or workstations with which they access the company network. Below are the updated requirements for remote access policies. 3.2.2. Requirements 鈥?Secure remote should be strictly controlled with encryption and strong passphrases. 鈥?Authorized users will have to protect their login and passwords even from their very close friends and relatives. 鈥?When using Suns technologies鈥?owned computer or device to connect to the corporate network remotely Wholesale Andy Dalton Jersey , Authorized Users will have to ensure that the remote host is not connected to another network(s) simultaneously except the personal networks under their complete control. 鈥?The use of external resources to carry out Suns Technologies鈥?business should be approved in advance by the appropriate business unit manager or InfoSec. 鈥?br > 3.2.3. Policy Compliance The Suns Technologies鈥?InfoSec team is responsible for verifying compliance to the remote access policy via various techniques such as periodic walk-throughs, internal and external auditing, inspection Wholesale Michael Jordan Jersey , video monitoring, and business tool reports. 3.2.4. Exceptions Any exception to the policy ought to be approved by the Remote Access Services as well as the Infosec Team in advance. 3.2.5. Non-Compliance Any Suns technologies鈥?staff found to have violated this policy is subject to disciplinary action that can even include termination of employment. Revision History Date of Change Responsible Summary of Change February 2017 Suns Technologies Policy Team Converted to a new format September 2017 Hamilton McGregor Strengthened the policy by limiting the use of company resources to authorized users only; made several changes to include the security of the remote access server.
鈥?br > References Chowdhury, N. M. K. Wholesale Renell Wren Jersey , & Boutaba, R. (2009). Network virtualization: state of the art and research challenges. IEEE