Create access lists to restrict traffic between departments

Assignment Help Computer Networking
Reference no: EM13881006

Prior to implementing any design we need to first write-up our proposed network design on paper. With that in mind, we begin by performing a network discovery. Once we have identified all the network devices and the needs of the organization, we can document the TCP/IP information that is needed for our design. In this exercise you will determine the subnet information for each department and assign IP addresses for the network devices.

You have been assigned as a networking tech for a new client, AAA Fabricating. The network is configured with a Class C network and the current allocation of IP addresses has been depleted. You have been tasked to reconfigure the network with a Class B address and assign a subnet to each of the 10 departments and the three routers.

Your network audit consists of the following information:

AAA Fabrication consists of 10 departments spread across three buildings.

Each building is connected using three Cisco 2800 Series routers. The three routers are located in the MIS wiring closet in Building 2.
Each department has its own Cisco 2950 switch.

There are at least two workstations in each department.

The company plans to use a class B address range starting at 172.16.0.0.

Each department must be assigned a subnet. Subnets should be designed to allow for the maximum number of hosts on each department subnet using classful subnetting.

The company also wants the three routers to communicate on the minimum quantity of IP addresses using three subnets.

Part 2

Create a logical Network Diagram

795_Logical Network Diagram.png

Logical Network topology represents a high level overview of the signal topology of the network. Every LAN has two different topologies, or the way that the devices on a network are arranged and how they communicate with each other.

The physical topology represents the way that the workstations are connected to the network through the actual cables that transmit data; the physical structure of the network.

The logical topology is the way that the signals or the data passes through the network from one device to the next without regard to the physical interconnection of the devices.

Logical topologies represent the network protocols that direct how the data moves across a network. The Ethernet protocol is a common logical bus topology protocol.

A logical topology is not necessarily the same as its physical topology.

Using the information from the IP addressing exercise create a logical network diagram showing how the current network is interconnected.

Part 3

Create access lists to restrict traffic between departments.

You have been tasked to create the following access list.

The HR and Payroll departments both reside in the same building. The company has devised a new benefits system. The HR department is the only department that should access the Payroll subnet. All hosts on the network should be able to access the HR department.

Reference no: EM13881006

Questions Cloud

Stream of pavements : A stream of pavements over a 5 year period have a present worth of $100,000. Payments in years 1, 4 and 5 are $15,000, $30,000, and $35,000. The value in years 2 and 3 must be determined. Year 3 is twice year 2. What are the values of year 2 and year..
How well does either trend fit the data : Using the years 1975 to 2006 (and denoting the time variable by the integers 1 to 32 for simplicity), estimate the linear time trend of housing prices. Use the same data to estimate an exponential trend. How well does either trend fit the data?
Which of following forbids sex discrimination regarding pay : Which of the following forbids sex discrimination regarding pay? Which type of intellectual property protects books, movies, and artwork
Leased office space under a three year operating lease : 1.On January 1, 2013, Winn Heat Transfer leased office space under a three year operating lease agreement.
Create access lists to restrict traffic between departments : Create access lists to restrict traffic between departments. The HR and Payroll departments both reside in the same building. The company has devised a new benefits system.
Standard deviation of the return on the market portfolio : Suppose the CAPM is true and you observe the following: Beta(i)=2. In a regression of Er(i) on Er(m), the R squared= 0.8 and the idiosyncratic variance of asset (i) is 25%. What is the standard deviation of the return on the market portfolio?
Builders constructed the warehouse at a cost : Builders constructed the warehouse at a cost of $2.5 million.
What is the current total value : Beach & Company reported net income of $40 million for last year. Depreciation expense totaled $18 million and capital expenditures came to $8 million. Free cash flow is expected to grow at a rate of 5% for the foreseeable future. What is the current..
Compute multiple-regression equation estimating : Compute a multiple-regression equation estimating a typical home's sales price based on the various improvements.

Reviews

Write a Review

Computer Networking Questions & Answers

  Alternatives company consider to increase capacity

Fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

  Two of the characteristics of an ethernet 802.3 network

Two of the characteristics of an Ethernet 802.3 network are a shared bus and CSMA/CD. Explain in detail how a switch interacts with those characteristics.

  What type of information would a network administrator look

the headquarters of abc threads which is a large textile company located in dallas texas has its network administrator

  Creating a product prototype

Creating a Product Prototype-In this article review, you will describe the one thing about prototyping that surprised you the most

  Who is kevin matnick?

Who is Kevin Matnick?

  Describe the purpose of firewalls

Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls.

  Provide all specific details regarding packet information

Describe the need of encapsulation. Elaborately describe the process of encapsulation and creation of packets as a result of encapsulation. Analyze and provide all specific details regarding packet information, like headers or trailers

  Information systems security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Benefits-drawbacks of entering into a mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion:

  Advantages of realtime processing

Advantages of realtime processing

  If you had an enterprise organization

If you had an enterprise organization of 1000 users, and had to set up an intranet web server, which web server would you use? Please explain your answer. (I just need one good paragraph).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd