Create usernames and passwords on corporate router

Assignment Help Computer Network Security
Reference no: EM131482760

Assignment: LAN Design Project Packet Tracer

Scenario:

You have been tasked with designing your new corporate network since they found out you have studied IP addressing, Cisco networking, and routing. Below is a screen shot of the topology for your network:

1245_Topology for your network.jpg

You are responsible for the following tasks: Design and Implement IPv4 addressing plan

Includes putting addresses on all PCs, switches, and routers Design and Implement basic configurations for Switch 1 and Switch 2 Hostnames, Management IP address for VLAN 1, enable secret password, line console password and Message of the Day Warning banner. Put proper default gateway address on Switch 1 and Switch 2.

Design and Implement basic configurations on all 3 routers:

Hostnames, IP addresses on proper interfaces, enable secret password, line console password and Message of the Day Warning banner.

Design and Implement SSH on switches

Create proper addressing on VLAN 1, usernames & passwords on Switch 1 and Switch 2 Design and Implement SSH on all 3 routers.

Create usernames & passwords on Corporate Router, ISP router and Branch office router

Design and Implement static routing on all 3 routers so that all networks are reachable.

Create proper static routes on routers to reach all other networks.

Details on Addressing:

You have been given the following major IP address:

NOTE: You will each have your own different major IP address that you need to subnet. In other words, everyone will have a slightly different problem!

You need to subnet that into 4 separate networks.

Network 1 subnet - Corporate LAN

Network 2 subnet - Connection between Corp Router G0/0 to ISP G0/0

Network 3 subnet - Connection between ISP Router G0/1 to Branch office Router G0/1 Network 4 subnet - Branch Office LAN

Put proper addressing on Corporate Router interfaces G0/0 and G0/1 Put proper addressing on ISP router G0/0 and G0/1

Put proper addressing on Branch Office Router G0/0 and G0/1

Turn on all interfaces on all 3 routers by issuing the no shutdown command for each interface

Put VLAN 1 ip address on Switch 1 - Should be address in Network 1 Corporate LAN subnet

Put VLAN 1 ip address on Switch 2 - should be address in Network 4 Branch office LAN subnet.

Put proper addressing, subnet mask and default gateway on PCs and Server in Corporate LAN. They should use addresses in Network 1 subnet.

Put proper addressing, subnet mask and default gateway on PCs in Branch Office LAN. They should use addresses from Network 4 subnet.
Configure static routing on all 3 routers.

Corporate router will need a route to Branch office LAN and connection between ISP and Branch router.

ISP router will need a route to Corporate LAN and Branch office LAN

Branch router will need a route to Corporate LAN and connection between ISP and Corp router.

TESTING & VALIDATION

Every device should be able to successfully ping every other device.

Routers should have complete routing tables - that is, they should "see" all 4 networks. I should be able to ssh into the switches.

COMMON DEVICE CONFIGURATION PARAMETERS -

enable secret command on all routers and switches should be cisco
line console password on all routers and switches should be class
ssh username admin        ssh password cisco123
message of the day banner   Warning! Stay out unless specifically authorized!

Put in address design. Have instructor check before implanting in Packet Tracer IP Subnetting Address Design: Fill out information for your four subnets

Subnet Number

Subnet Number

Subnet Address

First Usable Host Address

Last Usable Host Address

Broadcast Address

0

 

 

 

 

1

 

 

 

 

2

 

 

 

 

3

 

 

 

 

Fill out table with proper addresses. Have instructor check before implementing in Packet Tracer.

Device

Interface

IP Address

Subnet Mask

Corporate Router

G0/0

 

 

 

G0/1

 

 

ISP Router

G0/0

 

 

 

G0/1

 

 

Branch Office Router

G0/0

 

 

 

G0/1

 

 

Fill out table with proper addresses. Have instructor check before implementing in Packet Tracer.

Device

Interface

IP Address

Subnet Mask

Default Gateway

PC-0

NIC

 

 

 

PC-3

NIC

 

 

 

Server 0

NIC

 

 

 

S1

VLAN 1

 

 

 

PC-1

NIC

 

 

 

PC-2

NIC

 

 

 

S2

VLAN 1

 

 

 

Reference no: EM131482760

Questions Cloud

Bob bought hunting equipment : Bob bought hunting equipment for $4,800. He borrowed money from his credit union for the purchase, obtaining a loan with a 10% annual interest rate.
Why would plentiful resources like these be a curse : Having abundant resources such as oil or diamonds would seem to be a benefit to an economy, yet some people have considered it a curse.
Analyze a particular company''s accounting profile : This assignment requires you to thoroughly analyze a particular company's accounting profile. It will also require you to prepare pro forma financial statements
Are these different growth rates really so important : The "Rule of 72" permits you to quickly determine how fast an economy can double by dividing 72 by the growth rate. For example, if the growth rate is 1%.
Create usernames and passwords on corporate router : Create usernames & passwords on Corporate Router, ISP router and Branch office router. Create proper static routes on routers to reach all other networks.
Almost all humans have 23 pairs of which of the following : When researchers try to estimate the heritability of a human behavior, what are the main kinds of individuals they consider?
Differentiate between a straight line ppf and the ppf : Explain the important difference between a straight line PPF and the PPF that is concave (bowed out) to the origin.
Compute the opportunity cost for arizona of oranges : The table on the next page shows the potential output combinations of oranges and jars of prickly pear jelly (from the flower of the prickly pear cactus).
Discuss the production possibilities : Complete the following based on the figure below where three different production possibilities curves are shown.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd