Review the existing network design documentation

Assignment Help Computer Network Security
Reference no: EM132789304

ICTNWK506 Configure, Verify and Troubleshoot WAN Links and IP Services in a Medium Enterprise Network

Assessment Task

Activity 1: Prepare a set of guidelines explaining how to prepare for an ICT job according to work health and safety (WHS) codes, regulations and standards. Include reference to the relevant legislation, regulations, codes and standards.

Activity 2: Arrange access to the site as per organizational requirements.

Draft an email to the IT manager (your assessor) and seeking permission and arrange access to the network site. Email should request permission to access the site in a specific date and time, according to the policies and procedures.

Activity 3: Review the existing network design documentation (‘scenario and background information' provided above) to ensure that it is current and complete. Document any changes required.

Activity 4:Select and document network elements required to be installed to meet technical requirements.

Activity 5: Send email to contact vendors and service suppliers to obtain the specifications and determine the availability of the identified components.
Also, give a follow-up call to your vendor/ supplier (your assessor) to confirm your inquiry. Write summary of discussion.

Activity 6: Develop plans, with prioritised tasks and contingency arrangements, forinstallation ofcomponents with minimum disruption to client.

Describe your plans to minimise to disruptions.

Activity 7: Discuss with your manager (your assessor) and obtain approval for the plans including security and timing. Provide evidence of your approval.

Write an email to the IT Manager/ CIO (assessor) seeking approval of the installation plan including security and timing.
Reply email from IT Manager/ CIO (assessor) advising approval of the plan.

Part B

For each question in Part B, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Submit all documents, as listed in the evidence checklist (below) to your assessor by the due date.
Attach screenshots and/or provide written explanation.

Activity 1: Determine different methods for connecting to a wide area network (WAN).
Discuss it with your manager (your assessor) and write discussion summary.

Activity 2: Configure and verify a basic serial WAN configuration

Activity 3: Configure and verify at least two WAN protocols.

Activity 4: Determine and explain virtual private network (VPN) technology and document the VPN technology you implemented.

Activity 5: Configure and verify a site-to-site VPN. Document the steps taken for:
o Configure IPsec VPN settings on R1 and R3
o Verify site-to-site IPsec VPN configuration
o Test IPsec VPN operation

Activity 6: Determine asymmetric digital subscriber line (ADSL) technology.

Discuss it with your manager (your assessor) and write discussion summary.

Activity 7: Configure and verify an ADSL connection. This can be achieved on any supported router in given topology (R3 is proposed router).

Part C
For each question in Part C, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Activity 1: Determine the operation and benefits of using dynamic host configuration protocol (DHCP) and discuss it with your manager (your assessor). Write your discussion summary.

Activity 2: Configure and verify DHCP operation on a supported router (R3 is proposed router).

Activity 3: Implement static and dynamic addressing services for hosts in a local area network (LAN) environment
Document the hosts static and dynamic addressing services you used.
o Screen Shot of any interface's IP configuration could be the evidence for static addressing services.
o Screen Shot of, dynamically assigned IP, to client could be the evidence for dynamic addressing services. (Such as PC-C getting dynamic IP from DHCP on R3)

Activity 4: Determine the basic operation of network address translation (NAT)
Document which operation of NAT you performed and discuss it with your assessor(This could be demonstrated with ADSL or IPSec configurations).

Activity 5: Configure NAT for given network requirements. As above, provide evidence using screen shot for configured NAT.

Activity 6: Implement and verify NAT in a medium sized enterprise branch office network.
Provide evidence as screenshot and/or descriptions of how you have done it.

Activity 7: Discuss the basic operation and configuration of internet protocol version 6 (IPv6) with your manager and write summary of discussion.

Part D
For each question in Part D, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Activity 1: Determine the purpose and types of access control lists (ACLs) and discuss it with your manager (your assessor). Write summary of discussion.

Activity 2: Configure and apply ACLs based on network filtering requirements

Activity 3: Configure and apply ACLs to provide secure access to the router

Part E
Activity 1: Troubleshoot WAN implementation issues identified in Part A - D

Activity 2: Rectify WAN problems

Document the steps taken to troubleshoot and rectify WAN issues

Activity 3: Write issues identified and solutions implemented to rectify these issues.

Part F

Activity 1: Write a reflection journal outlining what you have learnt while doing all the above activities.

Attachment:- Verify and Troubleshoot WAN Links.rar

Reference no: EM132789304

Questions Cloud

What is the depreciation charge for marian company : Inclusive of inflation, the actual amount expected to be received on disposal was estimated at P900,000. What is the depreciation charge for 2013?
Define goodwill and explain the extent : Define goodwill and explain the extent to which it should be recognized in the financial statements of a business
Revolutionizing industry supply chain model : Read the Crocs: Revolutionizing an Industry's Supply Chain Model for Competitive Advantage case study in your course text.
Are there tools to help identify the given gaps in care : Are there tools to help identify these gaps in care? If you could develop a screening tool to address a barrier to healthcare, what would it look like?
Review the existing network design documentation : Prepare a set of guidelines explaining how to prepare for an ICT job according to work health and safety (WHS) codes, regulations and standards
Identify types of technologies : Q1 Identify 3 types of technologies that a manager may encounter when carrying out his/her P.L.O.C. functions.
Determine the cash flows and the npv : Determine the cash flows, the NPV, the IRR and the MIRR. Terminal value per acre $ 3000. Closing costs per acre $ 100.Price per acre $ 3400
How much can she contribute to her own RRSP : Mark's wife Gina looks after their young child and earned $42,000 in 2019 while working part-time. How much can she contribute to her own RRSP in 2020
Linking the balanced scorecard to strategy by norton : The Changing Role of Top Management: Beyond Structure to Processes by Sumantra Ghoshal and Christopher A. Bartlett

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd