Configurations of the network devices

Assignment Help Computer Network Security
Reference no: EM131092284

Submit your assignment on-line using the course web page. No other form of submission will be accepted.

You are required to submit:

  • PAP.pkt
  • CHAP_no_good.pkt
  • CHAP.pkt
  • IPv6_route.pkt
  • Task4.pkt
  • IPv4_ACL.pkt
  • IPv6_ACL.pkt
  • Answer.txt

 

We will

  • test run the Packet Tracer files;
  • check configurations of the network devices;

You must

  • use Packet Tracer 6.0.1 posted on the course web site. If you use other versions of Packet Tracer and we cannot run your file, you will get zero mark for the file. No resubmission is allowed.
  • save and submit Packet Tracer files using .pkt format. Other formats including .pkz format will be ignored and you will get zero mark for the file. No re-submission is allowed.
  • Do not set passwords to any file. Password protected files will be ignored and you will get zero mark for the file. No re-submission is allowed.
  • put all your answers other than the Packet tracer files in answer.txt.
  • use spaces for formatting. Do not use tabs. Do not attach images.
  • save and store answer.txt in pure text format. No PDF, HTML, Word files, Open Office files, RTF etc. and no compression or archiving such as zip, rar or tar.
  • submit 8 files. Do not compress or archive the 8 files using zip, tar or other utilities. Compressed or archived submission will be ignored and you will get zero mark for the assignment. No re-submission is allowed.

There are five tasks in this assignment. 

Task 1 

Question 1 

If you cannot remember the enable password of a Cisco Router or a Cisco Switch created by the command “enable password USQ”, and there is no written record of it anywhere, is it possible for you to find out what the forgotten password is? If possible, outline the way to do so. You do not have to provide the Cisco router commands.

Question 2 

Explain the use of the following three commands:

1. R(config)# enable password CSC3427

2. R(config)# enable secrete CSC3427

3. R(config)# enable service password-encryption

Question 3 

USQCargo is an air cargo company based in Wonderland. It has scheduled delivery to 23 destinations worldwide. USQCargo has to monitor

  • The where-about of all cargo in real time; the information will come from the delivery centres in each destination and in Wonderland.
  • Local weather in each destination; the information will come from the local weather bureaus every hour.
  • Local traffic conditions in each destination; the information will come from the local city traffic control centres every 15 minutes.

Select and justify in less than 100 words, your choice of WAN connection - leased line or Frame Relay, between The USQCargo headquarter in Wonderland and

a) the delivery centres in each destination;

b) the weather bureaus in each destination;

c) the city traffic control centres

Question 4 

In less than 100 words, explain the major differences between

a) Circuit switching

b) Packet switching with switched virtual circuit

c) Packet switching with permanent virtual circuit

Question 5

Your company is using Cisco routers and switches.

If you are asked to use WAN link to link your company’s network to the network of another company with limited information available to you, which type of WAN encapsulation, HDLC or PPP would you use? Justify your answer in less than 50 words.

Question 6 

When setting up ACL

a) What is the three Ps rule?

b) Where an extended ACL should be placed for best result?

Task 2 

Both question 1 and question 2 refer to the topology show below:

1328_Untitled.png

Question 1 

Implement the given topology using Packet Tracer. Make sure that PC 192.168.1.1 can ping PC 192.168.2.1. Then implement PAP authentication for the serial PPP link between router Peter and router Paul. Name the file PAP.pkt.

1472_Untitled.png

Question 2 (10 marks)

a) Implement the given topology using Packet Tracer. Make sure that PC 192.168.1.1 can ping PC 192.168.2.1. Then implement CHAP authentication for the serial PPP link between router Peter and router Paul. Name the file CHAP_no_good.pkt.

1624_Untitled.png

In less than 50 words, explain why PC 192.168.1.1 cannot ping 192.168.2.1 after implementing CHAP authentication for the serial link.

b) Make changes in CHAP_no_good.pkt so that the PCs can now ping each other and the routers are using CHAP authentication. You may need to turn off and on the serial link before the configuration changes are effective. Save the file as CHAP.pkt. 

Task 3 

2214_Untitled.png

  • Implement the topology using Packet Tracer:
  • Assign VLAN and IPv6 global address to all PCs.
  • Routing prefix for all PCs is 2400:DB00:2200::/64.
  • Configure the router f0/0 as the interface for subnet 1 and f0/1 as interface for subnet
  • Enable RIPng in Router1.
  • Make sure that when the router fast ethernet interfaces are turned off, PC1 and PC3 cannot ping PC2 and PC4; and when the interface are turn on, all PCs can ping each other.

You may need to use the command line help facility (?) in Packet Tracer. Name the Packet Tracer file as IPv6_route.pkt.

Task 4 

Task 4 refers to the following topology:

214_Untitled.png

In the topology:

  • All IPV4 networks used in the topology are class C networks.
  • All IPV6 networks are using /64.
  • PC1, PC2, PC3, PC7, PC8, PC9 can ping each other.
  • PC4, PC5, PC6, PC10, PC11, PC12 can ping each other.
  • R1 and R2 have IPV4 and IPV6 dual stack enabled.

Question 1 

Implement the topology using Packet Tracer. Name the file Task4.pkt.

Question 2 

Can PC1 ping PC4? Explain why.

Question3 

Explain why NAT is not necessary in IPV6.

Task 5 

Question 1(5marks)

1010_Untitled.png

Implement the topology using Packet Tracer. Add extended, named, ACL such that:

  • PC1 can ping PC2, PC3 but not PC4
  • PC2 can ping PC1, PC4 but not PC3
  • PC3 can ping PC4, PC1 but not PC2
  • PC4 can ping PC3, PC2 but not PC1

Name the file IPv4_ACL.pkt.

Question2 

2410_Untitled.png

Implement the topology using Packet Tracer. Add ACL such that:

 

  • PC1 can ping PC2, PC3 but not PC4
  • PC2 can ping PC1, PC4 but not PC3
  • PC3 can ping PC4, PC1 but not PC2
  • PC4 can ping PC3, PC2 but not PC1

 

You have to find the commands and syntax for applying ACL in IPV6. Name the file IPv6_ACL.pkt.

Reference no: EM131092284

Questions Cloud

Calculate a simple aggregate price index : Construct the index of average weekly earnings of Australian male employees for the period 1990-1998, using the data in the following table. Use 1990 as the base year - Calculate a simple aggregate price index and an average of relative price index..
What is conflict coltan : Could conflict minerals be excluded from the global supply chain without hurting the noncombatant citizens of the DRC?
Probability that at least thirteen pay in cash : David's gasoline station offers 4 cents off per gallon if the customer pays in cash and does not use a credit card. Past evidence indicates that 55% of all customers pay in cash. During a one-hour period twenty-six customers buy gasoline at this s..
What is the z-score for an income : The mean of a normally distributed group of weekly incomes of a large group of executives is $1,324 and the standard deviation is $91. What is the z-score for an income of $1,562?
Configurations of the network devices : use Packet Tracer 6.0.1 posted on the course web site. If you use other versions of Packet Tracer and we cannot run your file, you will get zero mark for the file. No resubmission is allowed.
Determining the percent of the distribution : e light bulb has an average service life of 768 hours, with a standard deviation of 45 hours. If the service life of these light bulbs approximates a normal distribution, about what percent of the distribution will be between 617 hours and 917 hou..
Summarizing the information presented in context : Recap your ideas by summarizing the information presented in context of your chosen scenario. from information in file below. All that is required is a conclusion.
Cartwright manufacturing are awarded efficiency ratings : The employees of Cartwright Manufacturing are awarded efficiency ratings. The distribution of the ratings approximates a normal distribution. The mean is 406, the standard deviation 64. What is the area under the normal curve between 406 and 492?
Describe the unique features of e-commerce technology : What is the purpose of a continuous improvement program? What role does HRM play in assisting continuing improvements?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd