Specify the vlan assignment

Assignment Help Computer Network Security
Reference no: EM13915750

Suppose the image below is your company's network diagram after a merger and you have recently added access controls to your network. The CSO would like to:

  • Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol.
  • Set up all of the accountants on a separate VLAN.
  • Create a VPN connection to allow accountants to access the accounting database from their home.

Write a two to three (2-3) page paper in which you:

1. Re-create the diagram provided in the assignment summary using VLSM, through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. (The starting address is 172.16.0.0.) Note: The graphically depicted solution is not included in the required page length. 

2. Specify the commands that you would use to set up the routers to use EIGRP.

3. Outline the requirements to set up a VLAN and VPN access for the accountants.

4. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to eliminate loops. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe and implement Virtual Local Area Networks (VLANs) on a computing network.
  • Compare and contrast dynamic routing, distance vector routing, and link-state routing protocols.
  • Use technology and information resources to research issues in Internetworking.
  • Write clearly and concisely about basic internetworking using proper writing mechanics and technical style conventions.

Reference no: EM13915750

Questions Cloud

Contrast effects various health policies : Evaluate the effect that public health has on the delivery of healthcare. Compare and contrast the effects that various health policies and regulations have made on healthcare systems. Analyze the correlation between the performance of health systems..
What is the probability that the sum of the two integers : What is the probability that the sum of the two integers will equal 9
What is the standard deviation of xbar : Sample 100 invoices. What is the standard deviation of xbar?
Transportation costs were an additional : A company purchased $3,800 worth of merchandise. Transportation costs were an additional $330. The company later returned $260 worth of merchandise and paid the invoice within the 2% cash discount period. The total amount paid for this merchandise is..
Specify the vlan assignment : Specify the commands that you would use to set up the routers to use EIGRP. Outline the requirements to set up a VLAN and VPN access for the accountants. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to elimin..
Renaissance as a cultural movement : We defined the Renaissance as a cultural movement that produced artistic transformation and Who painted a tribute to the greatest figures of classical antiquity?
How can consumers protect themselves against identity theft : How can consumers protect themselves against identity theft? What are the Webby Awards, and what criteria do the judges use to evaluate Web sites?
Auto spa company was started on january : Auto Spa Company was started on January 1, 2013, when the owners invested $120,000 cash in the business.
Audit partner with your firm : Thomas Jefferson, an audit partner with your firm, has selected you to prepare a memo regarding the acceptance of ABC as an audit client. The audit will, if accepted, occur during the firm's slow season when there is excess employee capacity

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer crime events in history

Research the Internet for two significant computer crime events in history. Gather details on the impacts of these crimes and identify the victims, identify details on how the researched crimes developed throughout time.

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Explain the security mechanisms available for a database

Explain the security mechanisms available for a database and how the data will be protected. List the SQL commands you will use to create your database tables. Note: Be sure that each table has at least ten records that you create so you will be ab..

  Mitigate risk by using information security systems policies

Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Mobile computing has dramatically changed how information

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  How do these standards reflect a changed environment

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  How modify network''s dns zones or records

modify your network's DNS zones or records

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd