What are the principles of applying acls

Assignment Help Computer Networking
Reference no: EM132371906

Assessment item : Theory and Simulation Exercises

Task

Using Packet tracer implement the following tasks based on the network topology of a small business given below. Smart Univ Ltd has three branches: Albury, Bathurst and Wagga site. Each site has Admin Office to manage the local business. Wagga site has three buildings where has two major departments: Student group and Staff . Its Wagga office controls the connection between the Internet server and Internet Service Provider (ISP). Examine the network requirements and complete the following questions to make the company network service running.

Please use your last 4 digits of your student ID as the first two octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example, if your student ID is 11567890, using the last 4 digits (7890). your main network address will be 78.90.0.0.

Consider the following Topology in the figure below:

327_Fig.jpg

1380_aa.jpg

VLAN Table

VLAN

Name

10

Student group

20

Staff

88

Admin office 2

99

Native

You need to use Packet Tracer to implement the given topology and to complete the following tasks: Part A: Switching and VLANs

1. It is quite important to lock down access and install strong security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features. What will be the best practice to secure your switch?

2. Configure four VLANs as required on the switch and enable Trunking on switch.

3. Configure inter-VLAN routing on Router wagga based on the Addressing Table.

4. Configure static routes on routers to build up full connectivity between each site to ISP and Internet server.

5. Verify connectivity by making sure all the PCs can ping the Internet server and ISP.

6. Explain and analyse the routing process of routers in the case of ping from Student group 1 to the Internet server.

Please save your configured packet tracer file with the name of "PT_your studentlD_partA"

Part B Network Security

7. In order to improve the network performance and security, ACLs is recommended. Please explain what is the ACL ?

8. How can ACLs help with the required tasks?

9. What are the principles of applying ACLs?

10. How to block VLAN 10 to visit ISP? Please write down the ACL statement(s) accordingly

Please save your configured packet tracer file with the name of "PT_your studentlD_partB"

Rationale

This assessment task will assess the following learning outcome/s:

• be able to configure and troubleshoot networks to improve efficiency and security.

• be able to configure, verify and solve a variety of problems involving Virtual Local Area Networks.

In this assessment item, tasks are designed to reinforce the application of configuring routers for inter-VLAN communication and configure static routes to reach destinations outside of your network. Your ability demonstrate your skills at configuring inter-VLAN routing, static and default routes are also included.

Reference no: EM132371906

Questions Cloud

Calculate Schedule Variance : CST 617 - Project Cost & Schedule Control Assignment, Geneva Business School, Lincoln University of Business and Management, UAE. Calculate Schedule Variance
Identify and select a health disparity in your community : MPH5208 Public Health Program Planning and Evaluation-Capella University-USA-Analyze factors that influence public health policy and regulations related.
Interpret and use financial statistics and tools : FNSINC602 - Interpret and Use Financial Statistics & Tools - FNS50217 - Diploma of Accounting - Create a dashboard in Excel or using Tabuleau that showcases
What kind of loan to value does the bank offer : RL-EST 421 Real Estate Finance Fundamentals Assignment - Individual Case Project, University of Missouri-Kansas City, USA. What kind of loan to value bank offer
What are the principles of applying acls : Charles Sturt University-Australia-Explain and analyse the routing process of routers in the case of ping from Student group 1 to the Internet server.
Describe how to design a new product : 49989 - Operations Engineering - University of Technology Sydney - Develop a Design Review checklist consisting of minimum 25 questions distributed evenly over
Prepare a report or critique on an academic paper : Prepare a report or critique on an academic paper related to Enterprise application or designing or implementation challenges
Develop a conference management system : NIT5150 – Advanced Object Oriented Programming - Victoria University - What are the benefits of the system to the targeted organization/users
What type of organization structure would be of most value : Activity 1 - What type of organization structure would be of most value to this firm in its initial efforts to go international

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  The purpose of this project is to provide you with an

the purpose of this project is to provide you with an opportunity to create a document retention policy. you will also

  Discuss and review network planning

Describe how you would design a logistics network consisting of only one warehouse.Discuss and review network planning.

  What is the server ip address

Discuss the difference in your answers to parts f) and g). You need to consider the packets formats in your discussion.

  Explain and reason how tcp congestion control will react

Explain and reason how TCP congestion control will react: for example, describe what transmission rate TCP would give each of the connections.

  Lack of separation of duties

Develop a scenario where fraud could occur within your organization due to a lack of separation of duties, least privilege, and/or job rotation.

  Components that make up a network management system

Write a two-and-a-half-page paper describing the components that make up a network management system

  Which wan solution is similar to replaced frame relay

ITNW 1358- Which WAN solution offers continuous and consistent bandwidth at all times of day and nights? Which WAN solution is similar to and has largely replaced frame relay?

  Find the average length l of the runs

Let H0 be the entropy of the original source, and let HR be the entropy of the run-length source of symbols. Find the ratio HR/H0.

  What is the ip address of your dhcp server

What is the IP address of your DHCP server? Explain the purpose of the router and subnet mask lines in the DHCP offer message.

  Provide a historical timeline of homeland security

Provide a historical timeline of homeland security incidents/events (natural and man-made) along with the call for improved preparedness, response and recovery needs that lead to the creation of NIMs and the NRF documents.

  Compute the throughput for file transfer

Host A wishes to send the large file to Host B. Path from Host A to Host B has three links, of rates R1=10 Mbps, R2=500 kbps, and R3=750 Kbps. (1Kbit=210bit) Suppose no other traffic in network, determine the throughput for file transfer?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd