Design of the single most secure network

Apply the various concepts you have learned throughout this course to the design of the single most secure network possible, capable of supporting three IT services: e-mail, file transfer (centralized), and VPN.
After you have fully designed your network, you will need to provide three data flow diagrams explaining how your designed network handles three different transactions:

Sample Solution