Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ).

The branches need to be interconnected to the Headquarter; you have been assigned a design for this work. The assignment needs you to implement the following network design as per instructions and guidelines provided below. You need to put attention to the details of the requirement, marks will be deducted for any missing component or item. This is an individual assignment, therefore, this must be your own work. Please refer to the following Network Diagram (Figure 1), which reflects ail the connectivity details, customers per site as well as both IPV4 and IPV6 Address blocks that you need to use for IP subnetting and IP Addressing.

2112_Figure.png

You will be assessed on the following skills:

- Configuration of initial IOS device settings
- Design and calculation of IPv4 and IPV6 addressing
- Configuration of IOS device interfaces including IPv4 and IPv6 addressing when appropriate
- Addressing of network hosts with IPv4 and IPv6 addresses Enhancing device security, including configuration of the secure transport protocol for remote device configuration
- Configuration of a switch management interface

Requirements by devices:

HQ-R1, BR1-R1 and BR2-R1 routers:
- Configuration of initial router settings
- Interface configuration as well as IPv4 and IPv6 addressing
- Device security enhancement or "device hardening"
- Secure transport for remote configuration connections as covered in the labs.
- Backup all of the configuration file to a TFTP server
- IPV4 and IPV6 routing with Default & Static routes

All the switches Switch:
- Enabling basic remote management by Telnet

PC and Server hosts:
- IPv4 full addressing
- IPv6 addressing
Network Connectivity:
- Test and confirm end-to-end connectivity

Step 1:

Design an 113v4 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV4 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Also calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

b. In HQ, assign first available IP address to the router interface as gateway and the last available address to the TFTP Server.

c. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

d. Assign the second to the last address (the second highest) in this subnet to the VLAN 1 interface of the Switches.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 2:

Design an IPv6 addressing scheme and complete the Addressing Table based on the following requirements.

a. Subnet the IPV6 network to provide 190 hosts addresses for HQ, 55 hosts for BR1 and 26 hosts for BR2 while wasting the fewest addresses. Please show your calculation works in a separate page.

b. Calculate two subnets in order to provide the IP address of exact requirements of the WAN Links. Please show your calculation works in a separate page.

c. In HQ, assign first available IPV6 address to the router interface as gateway.

d. On BR1 and BR2, assign the first network host address in the respective subnet to the G0/0 interface of the routers.

e. Configure addresses on the hosts using any of the remaining addresses in their respective subnets.

Step 3: Configure and Backup the Routers

a. Configure HQ-R1, BR1-RI and BR2-R1 routers with all initial configurations that you have learned in the course so far:
Configure the router hostnames

Protect device configurations from unauthorized access with the encrypted password. Secure all of the ways to access the router using methods covered in the course and labs.

Newly-entered passwords must have a minimum length of 10 characters.

Prevent all passwords from being viewed in clear text in device configuration files.

Configure the router to only accept in-band management connections over the protocol that is more secure than Telnet, as was done in the labs. Use the value 1024 for encryption key strength.

Configure user authentication for in-band management connections.

b. Configure the Gigabit Ethernet interfaces using the lPv4 addressing values you calculated and the IPv6 values provided in the addressing table.

- Reconfigure the link local addresses as was practiced in the labs. The IPv6 link-local Interface ID should match the IPv6 unicast Interface ID as is practiced in the labs.

Label and document the interfaces in the configuration file.

- Complete the configuration of the TFTP server using the IPv4 addressing values from Step 1 and the values in the addressing table.

- Backup the running configuration of all routers to the TFTP Server. Use the default file name. Backup will be done after completion of the LAB.

Step 4: Configure the Switches

a. Configure all the switches for remote management.

b. Configure IPV4 Addresses and Default-Gateway to all switches

c. Test remote access to all the switches

Step 5: Configure and Verify Host Addressing [is MARKS]

a. Configure necessary static and default routes in order to make end-to-end connectivity.

b. Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.

c. Use the router interface link-local addresses as the IPv6 default gateways on the hosts.

d. All hosts should be able to ping each other over IPv4 and IPV6.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92059838
  • Price:- $75

Priced at Now at $75, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As