Configurations of the network devices

Assignment Help Computer Network Security
Reference no: EM131092284

Submit your assignment on-line using the course web page. No other form of submission will be accepted.

You are required to submit:

  • PAP.pkt
  • CHAP_no_good.pkt
  • CHAP.pkt
  • IPv6_route.pkt
  • Task4.pkt
  • IPv4_ACL.pkt
  • IPv6_ACL.pkt
  • Answer.txt

 

We will

  • test run the Packet Tracer files;
  • check configurations of the network devices;

You must

  • use Packet Tracer 6.0.1 posted on the course web site. If you use other versions of Packet Tracer and we cannot run your file, you will get zero mark for the file. No resubmission is allowed.
  • save and submit Packet Tracer files using .pkt format. Other formats including .pkz format will be ignored and you will get zero mark for the file. No re-submission is allowed.
  • Do not set passwords to any file. Password protected files will be ignored and you will get zero mark for the file. No re-submission is allowed.
  • put all your answers other than the Packet tracer files in answer.txt.
  • use spaces for formatting. Do not use tabs. Do not attach images.
  • save and store answer.txt in pure text format. No PDF, HTML, Word files, Open Office files, RTF etc. and no compression or archiving such as zip, rar or tar.
  • submit 8 files. Do not compress or archive the 8 files using zip, tar or other utilities. Compressed or archived submission will be ignored and you will get zero mark for the assignment. No re-submission is allowed.

There are five tasks in this assignment. 

Task 1 

Question 1 

If you cannot remember the enable password of a Cisco Router or a Cisco Switch created by the command “enable password USQ”, and there is no written record of it anywhere, is it possible for you to find out what the forgotten password is? If possible, outline the way to do so. You do not have to provide the Cisco router commands.

Question 2 

Explain the use of the following three commands:

1. R(config)# enable password CSC3427

2. R(config)# enable secrete CSC3427

3. R(config)# enable service password-encryption

Question 3 

USQCargo is an air cargo company based in Wonderland. It has scheduled delivery to 23 destinations worldwide. USQCargo has to monitor

  • The where-about of all cargo in real time; the information will come from the delivery centres in each destination and in Wonderland.
  • Local weather in each destination; the information will come from the local weather bureaus every hour.
  • Local traffic conditions in each destination; the information will come from the local city traffic control centres every 15 minutes.

Select and justify in less than 100 words, your choice of WAN connection - leased line or Frame Relay, between The USQCargo headquarter in Wonderland and

a) the delivery centres in each destination;

b) the weather bureaus in each destination;

c) the city traffic control centres

Question 4 

In less than 100 words, explain the major differences between

a) Circuit switching

b) Packet switching with switched virtual circuit

c) Packet switching with permanent virtual circuit

Question 5

Your company is using Cisco routers and switches.

If you are asked to use WAN link to link your company’s network to the network of another company with limited information available to you, which type of WAN encapsulation, HDLC or PPP would you use? Justify your answer in less than 50 words.

Question 6 

When setting up ACL

a) What is the three Ps rule?

b) Where an extended ACL should be placed for best result?

Task 2 

Both question 1 and question 2 refer to the topology show below:

1328_Untitled.png

Question 1 

Implement the given topology using Packet Tracer. Make sure that PC 192.168.1.1 can ping PC 192.168.2.1. Then implement PAP authentication for the serial PPP link between router Peter and router Paul. Name the file PAP.pkt.

1472_Untitled.png

Question 2 (10 marks)

a) Implement the given topology using Packet Tracer. Make sure that PC 192.168.1.1 can ping PC 192.168.2.1. Then implement CHAP authentication for the serial PPP link between router Peter and router Paul. Name the file CHAP_no_good.pkt.

1624_Untitled.png

In less than 50 words, explain why PC 192.168.1.1 cannot ping 192.168.2.1 after implementing CHAP authentication for the serial link.

b) Make changes in CHAP_no_good.pkt so that the PCs can now ping each other and the routers are using CHAP authentication. You may need to turn off and on the serial link before the configuration changes are effective. Save the file as CHAP.pkt. 

Task 3 

2214_Untitled.png

  • Implement the topology using Packet Tracer:
  • Assign VLAN and IPv6 global address to all PCs.
  • Routing prefix for all PCs is 2400:DB00:2200::/64.
  • Configure the router f0/0 as the interface for subnet 1 and f0/1 as interface for subnet
  • Enable RIPng in Router1.
  • Make sure that when the router fast ethernet interfaces are turned off, PC1 and PC3 cannot ping PC2 and PC4; and when the interface are turn on, all PCs can ping each other.

You may need to use the command line help facility (?) in Packet Tracer. Name the Packet Tracer file as IPv6_route.pkt.

Task 4 

Task 4 refers to the following topology:

214_Untitled.png

In the topology:

  • All IPV4 networks used in the topology are class C networks.
  • All IPV6 networks are using /64.
  • PC1, PC2, PC3, PC7, PC8, PC9 can ping each other.
  • PC4, PC5, PC6, PC10, PC11, PC12 can ping each other.
  • R1 and R2 have IPV4 and IPV6 dual stack enabled.

Question 1 

Implement the topology using Packet Tracer. Name the file Task4.pkt.

Question 2 

Can PC1 ping PC4? Explain why.

Question3 

Explain why NAT is not necessary in IPV6.

Task 5 

Question 1(5marks)

1010_Untitled.png

Implement the topology using Packet Tracer. Add extended, named, ACL such that:

  • PC1 can ping PC2, PC3 but not PC4
  • PC2 can ping PC1, PC4 but not PC3
  • PC3 can ping PC4, PC1 but not PC2
  • PC4 can ping PC3, PC2 but not PC1

Name the file IPv4_ACL.pkt.

Question2 

2410_Untitled.png

Implement the topology using Packet Tracer. Add ACL such that:

 

  • PC1 can ping PC2, PC3 but not PC4
  • PC2 can ping PC1, PC4 but not PC3
  • PC3 can ping PC4, PC1 but not PC2
  • PC4 can ping PC3, PC2 but not PC1

 

You have to find the commands and syntax for applying ACL in IPV6. Name the file IPv6_ACL.pkt.

Reference no: EM131092284

Questions Cloud

Calculate a simple aggregate price index : Construct the index of average weekly earnings of Australian male employees for the period 1990-1998, using the data in the following table. Use 1990 as the base year - Calculate a simple aggregate price index and an average of relative price index..
What is conflict coltan : Could conflict minerals be excluded from the global supply chain without hurting the noncombatant citizens of the DRC?
Probability that at least thirteen pay in cash : David's gasoline station offers 4 cents off per gallon if the customer pays in cash and does not use a credit card. Past evidence indicates that 55% of all customers pay in cash. During a one-hour period twenty-six customers buy gasoline at this s..
What is the z-score for an income : The mean of a normally distributed group of weekly incomes of a large group of executives is $1,324 and the standard deviation is $91. What is the z-score for an income of $1,562?
Configurations of the network devices : use Packet Tracer 6.0.1 posted on the course web site. If you use other versions of Packet Tracer and we cannot run your file, you will get zero mark for the file. No resubmission is allowed.
Determining the percent of the distribution : e light bulb has an average service life of 768 hours, with a standard deviation of 45 hours. If the service life of these light bulbs approximates a normal distribution, about what percent of the distribution will be between 617 hours and 917 hou..
Summarizing the information presented in context : Recap your ideas by summarizing the information presented in context of your chosen scenario. from information in file below. All that is required is a conclusion.
Cartwright manufacturing are awarded efficiency ratings : The employees of Cartwright Manufacturing are awarded efficiency ratings. The distribution of the ratings approximates a normal distribution. The mean is 406, the standard deviation 64. What is the area under the normal curve between 406 and 492?
Describe the unique features of e-commerce technology : What is the purpose of a continuous improvement program? What role does HRM play in assisting continuing improvements?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe how you would design a logistics network

Describe how you would design a logistics network consisting of only one warehouse. In the discussion, include the steps you need to take in order to design the optimal network. What information and data is needed to make this determination? What str..

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Greatest it security concern facing businesses today

Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  Examine how system balanced security and usability

Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Formulate the network security plan to be implemented

Review the work you have done and formulate the Network Security Plan to be implemented across the network footprint. What is being done to secure the network at different levels of the OSI model and the organizational structure.

  What is the purpose of the work breakdown structure

What is the purpose of the work breakdown structure

  Discuss the current it cybersecurity policy

Current policy: Discuss the current (as per the case study) IT cybersecurity policy of DaimlerChrysler

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  Star topology network

Explain the main advantages and disadvantages of a STAR topology network. In your own words, described the functional differences between a bridge and a gateway. Give an example of each.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd