Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

IT Networking Assignment -

Major Lab Scenario -

Assessment Requirements:

  • Subnet an address space with given requirements.
  • Assign appropriate addresses to interfaces and document them in the address table.
  • Build the network according to the user requirements.
  • Erase the startup configuration and reload a router to the default state.
  • Assign the appropriate device names through the CLI.
  • Configure enable passwords on all routers, and set them all to "class".
  • Configure PCs with IP addresses, subnet masks, and default gateways.
  • Configure static routing on all routers, wherer applicable and verify static routing operation.
  • Configure switches and routers, including security requirements.
  • Create appropriate VLANs on switches and enable trunking of those VLANs.
  • Configure Inter-VLAN routing. Configure integrated DHCP, FTP Web, Email services.
  • Test and verify full connectivity for the scenario.

Scenario: In this Assessment you are to install a routing and switching solution to a small business marketing firm Jones & Partners. The firm has has two marketing partners lawyers and two accounting support staff. For this reason it was anticipated to create two VLANs - one for the partners and one for the support staff. More VLAN could be added in the future as the business grows. Management of the network switches is local a the moment, but in anticipation of remote access, a management VLAN, number 99, has been created.

As a contracted network installer and administrator, your task is to to install, configure and test the network, and network router and switches, using inter-VLAN routing to connected the support VLAN to marketing VLAN. Traffic control between the VLANs will be implemented using Access Control Lists and will be subject to specification to be defined at a later stage, together with DHCP for each VLAN. As a contracted network consultant you are to network the employees of Jones & Partners. At this stage each marketing partner and accounting support person occupy separate office cubicles within the same office space. Despite this the group of two support staff and group of two marketing partners are on separate VLANs.

Implement the first stage of the network by linking partners together and support staff together but with each group in a different VLAN. Allow the two groups to be linked, but restrictions will apply to FTP serives for the Accounting PCs using Access Control Lists on the router.

All PCs will have DHCP allocated IP addresses. There are two DHCP servers, one for each VLAN. One will also be a DNS server. A third server will integrate Web, Email, FTP, and NTP services. All servers have static IP addresses. Switches wilhave port security enables on all access interfaces.

You are required to recreate the network topology as shown, using live equipment or simulation software such as Packet Tracer 6.3 or 7.x with the following specifications:

Required Resources for Live Equipment or simulation software as appropriate

  • 1 Router (eg, 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
  • 2 Switches (Cisco 2950 or 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
  • 4 PCs
  • Console cable to configure the Cisco IOS devices via the console ports
  • Ethernet and Serial cables as shown in the topology

Task 1: Prepare to install enterprise switches

1.1 Describe how you would prepare for given work according to relevant legislation, work health and safety (WHS) regulation, codes and standards.

Write how you would arrange arrange site access according to required procedure, and how you would consult appropriate personnel to ensure task is coordinated effectively with others involved at the worksite.

1.2 Sketch & Annotate the chosen network topology from technical requirements.

1.3 Determine the internet protocol (IP) addressing scheme for the network topology.

1.4 Evaluate network management, capacity and security requirements, with specific reference to current and future requirements.

1.5 Select the router and switches with appropriate features according to technical requirements.

1.6 By researching equipment vendors identify specific router and switch products, their pricing, specifications and availability for the project.

1.8 Describe how would you project manage the installation of the components for the project with reference to task priority, security and contingency measures for minimal disruption to the client.

1.9 Describe how you would implement security on the network, both internally within devices, between devices and externally if the router is connected to an ISP or other router. Provide an exhaustive list of availaible strategies for the securing the network design. How would you monitor internal and external activity for security breaches?

Task 2: Pre-configuration

From the diagram schematic supplied below , configure the following items on all the routers and switches:

  • Hostnames on the router R1, and switches S1, S2
  • Configure enable and vty passwords on the router and switches.
  • Disable DNS lookup
  • Interface IP addresses, subnet masks, and no shutdown commands on R1, S1, S2
  • IP addresses and subnet masks on PCs, including the default gateway IP address.

Task 3: Configure VLANs on router R1

Configure the hostname on R1 to R1.

On Router R1, configure Fa0/1 interface to trunk for VLAN 99, VLAN 10 and VLAN 20 with 802. 1Q encapsulation to S1.

VLAN 99 = 172.16.99.0/24

VLAN 10 = 172.16.10.0/24

VLAN 20 = 172.16.20.0/24

Task 4: Basic Switch Configuration

Configure the hostname on switch S1 to S1.

Configure the hostname on switch S2 to S2.

Configure switch S1 with the VLAN 99 IP address of 172.16.99.2/24.

Configure switch S2 with the VLAN 99 IP address of 172.16.99.3/24.

Configure both switches with the default gateway address of 172.16.99.1.

Task 5: Configure VTP

Configure switch S1 as the VTP server and switch S2 as the VTP client.

Configure both switch S1 and switch S2 as part of VTP domain Group1.

Create VLAN 10 with the name Accounting.

Create VLAN 20 with the name Marketing.

Create VLAN 99 with the name Management.

Task 6: Configure VLANs on switches

Configure the following on switch S1:

Configure the interface Fa0/4 on VLAN 10.

Configure the interface Fa0/5 on VLAN 20.

Verify all other interfaces are in VLAN 1.

Configure the following on switch S2

Configure the interface Fa0/4 on VLAN 10.

Configure the interface Fa0/5 on VLAN 20.

Verify all other interfaces are in VLAN 1.

Task 7: Configure VLAN Trunking

Configure trunking between switch S1 and switch S2 with 802.1Q encapsulation using port Fa0/2 on both switches.

Configure trunking between switch S1 and switch S2 with 802.1Q encapsulation using port Fa0/3 on both switches. This loop will be resolved with Spanning Tree Protocol.

Configure switch S1 for trunking between switch S1 and router R1 with 802.1 Q encapsulation using port Fa0/1.

Task 8: Configure Spanning Tree

Configure switch S1 to be the root bridge.

Task 9: Verify Connectivity

Save the configuration and verify interVLAN routing with the hosts attached. Also, the router and the two switches should be able to ping each other on their VLAN 99 interfaces.

Task 10: Install and run Network Management Software (SNMP)

Install or configure simple network management protocol (SNMP) agent software, on each switch, to collect network traffic data for the management information base (MIB) from that segment of the network and relay it to the management console.

Install and configure SNMP management console software on a computer designated to be the network manager's main console, to collect network traffic data from the switch acting as agents.

Task 11: Switch port manual configuration

Manually configure all access ports of the switch for speed and full or half-duplex operation.

Task 12: Switch security

Manually configure all access ports of the switch for security.

Task 13: Install and configure Web, FTP, Email, NTP, DHCP, DNS, TFTP services

Install and configure integrated network services.

Task 14: Install and run remote access services

Install and configure remote access services to the router and switches by configure Telnet access to these devices.

Task 15: Install a Switch IOS upgrade from a TFTP server

Delete the IOS from S1 flash memory and reload it from the TFTP server.

Task 16: Test and Troubelshoot the completed network for full operation

Connectivity should be assured. Security breaches tested. Access Control operational. Web servers, FTP server and Email serves accessible and operational.DNS and DHCP fully operational.

Task 17: Test and configure VoIP services

Connect and configure VoIP services for each user in the project scenario.

Task 18 Completion

Tabulate test results and complete all user & test reports.

Complete report and notify client of network status.

Clean up and restore worksite to client's satisfaction.

Secure sign-off from appropriate person.

Attachment:- Assignment Files.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93128020

Have any Question?


Related Questions in Computer Network & Security

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As