Configure static and default routing

Assignment Help Computer Networking
Reference no: EM132410842

Task 1: cable the Network

Step 1: Cable a network that is similar to the one shown in the Topology Diagram.

Task 2: Perform Basic Configurations on Routers and Switches

Step 1: Configure all routers and switches according to the following guidelines:
• Configure the hostnames as per the Topology Diagram.
• Disable Domain Name Server (DNS) lookup.
• Encrypt the privileged EXEC mode using password class.
• Configure password cisco for console and all virtual terminal lines.
Step 2. Configure and activate interfaces of all routers for full connectivity with the addresses shown in the Address Table.
Step 3: Verify IP addressing and interfaces and test connectivity between the routers.

Task 3: Configure B_SW1 with VLANs and trunk ports as the below VLAN Table:

VLAN Table

VLAN Number

VLAN Name

Address

Gateway                              Port

5

Sales

N/A

N/A                                    VLAN 5 GO/1

15

Accounts

N/A

N/A                                      VLAN 15 G0/1

231

Management

172.20.20.162

172.20.20.161                     Trunk 00124

• Create and name the VLANs.
Assign switch ports as access ports in the VLANs as indicated in the above VLAN Table • configure the appropriate ports that link the switches with the routers as functioning trunl ports (as shown in the Topology Diagram). Set the Management VLAN as native, and allow traffic only from known VLANs on trunks.
• Address VLAN 231 with an address as indicated in the Addressing Table. The managet interfaces of the switch should be configured to be reachable remotely.

Task 4: Configure static and default routing
• Manually configure default routes on Homer to the Internet. All devices on the interns LANs and VLANs should be able to reach the Internet.

Task 5: Configure RIPv2 Routing
Configure RIPv2 to route between all internal networks. The requirements are as follows:
• Configure HOMER and BART routers to provide routing between all internal hosts.
• RIPv2 updates should only be sent on the links between the routers running RIPv2 routing updates from being sent out of any of the LAN interfaces or VLAN sub-Inter are routed with RIPv2.
• Default static route should be redistributed into the RIPv2 routing domain so all in networks are fully connected.Task 6: Configure and Activate DHCP

BART will act as a DHCP server and provide addresses to the sales and Accounts VLANs attached to B_Sw.

• Exclude the first five usable host addresses are reserved for static assignment from each pool.  Configure a single host on VLAN 10 to receive an IP Address from the Sales Pool.

Task 7:
Configure static and dynamic NAT/PAT
Configure NAT to translate internal private addresses into public addresses for the Internet
Step 1: Configure static NAT to the Server (as shown in the Topology Diagram):
• Translate the internal address of the server to the public address 201.56.50.14.
• Configure the correct interfaces to perform this NAT translation.
Step 2: Configure dynamic NAT with overloading.
• Use the addresses remaining in the public address subnet of 201.56.50.8129.
• Configure all other Internal hosts so that they can have their addresses translated.
Step 3: Configure ISP with appropriate static route so that all internal addresses can access the Internet.

Task 8: Configure Access Control Lists (do not applied to interfaces or vty line)
You will configure One ACLs to limit device access. The ACL requirements are. Student
1. Restrict access to the vty lines on BART router:
• Allow only the VLAN 10 Host to telnet to the BART router.
• No other Internet hosts (including Internet hosts not visible in the topology) should be able to telnet to the BART router.
2. Allow the Sales Host (VLAN 10) full access to the College Server while blocking all other traffic.

Task 9: Clean Up
This is the end of the exam.
Please indicate to your Teacher you have completed the assessment.
After that, save the configurations of all switches and routers, forward a copy of your completed Packet Tracer file to the Teacher via email or USB stick.

Attachment:- topology diagram.rar

Verified Expert

Computer network and communications system has found its way in most of business operations.This is as a result of increased demand in service delivery.Information Technology offers solutions to enhance service delivery.In this task we designed and configured some of the IT services which are on demand by the world market.Some of this services include DHCP, Connectivity, Security through access-lists and IP addressing.

Reference no: EM132410842

Questions Cloud

Firm to be able to price discriminate : What conditions must exist for a firm to be able to price discriminate? Include examples within healthcare and references.
Benefit the company in the long-term : What course of action will benefit the company in the long-term - eliminating all perks, retaining all perks, or eliminating some perks while keeping others?
Negative results in your own interpersonal relationships : discuss three specific examples of times when your choice of language led to positive or negative results in your own interpersonal relationships.
Address the price-quantity and equilibrium : A freeze in Florida damages the orange crop. Oranges grown in Florida are used to produce orange juice that is sold nationally. Explain the impact of the freeze
Configure static and default routing : Cable a network that is similar to the one shown in the Topology Diagram - Configure all routers and switches according to the guidelines
Common ways for researchers to become public intellectuals : Op-eds are one of the most common ways for researchers to become public intellectuals. you will be writing an op-ed for a publication of your choice.
Differing social groups and interpersonal relationships : Did the costumes help you understand conflicts, differing social groups, and interpersonal relationships? If so, how?
Demand for ultra-extra-virgin olive oil : Demand for ultra-extra-virgin olive oil is given by P = 140 - 0.1Q. With the unfortunate demise of the Unico family business, this industry is now supplied
African authors-to craft authentically african literature : In a thesis-driven, highly analytical essay, critique Ngugi's assertion that African authors-to craft "authentically" African literature.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the eight steps in network troubleshooting model

Explain the importance of using an appropriately qualified and experienced technician. Explain the eight steps in network troubleshooting model that you must follow to solve the problem for RGI?

  Describe fundamental aspects of cloud computing

Encourage students to conduct independent investigation into networking related topics from books, the Internet and through practical investigation

  Considering changing cell phone plan

considering changing her cell phone plan

  Wireless application protocol

Discuss why the sensitive information should not be sent over the Wireless Application Protocol. Kindly elaborate on more than four hundred words.

  Implement the network design approved by the tender process

You have been given the final design approved by the tender process and hired to implement that design. In this submission you should take the design given.

  Solution to the particular security issue

MN502 - Overview of Network Security - Analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of

  Planning an application server migration

The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the "Wild Frontier" under the "Foghorn Leghorn" domain and make sure production needs are met at all the satellite locati..

  Management of internetworking infrastructure

MN503 - Overview of Internetworking - Network design with configuration - configure networking devices for a given business case study and understand limitation

  Define a computer virus

Anti-virus software is used to keep your computer free from viruses. Define a computer virus.

  Demonstration of network security tools

MN502 - Overview of Network Security - Melbourne Institute of technology - Demonstration of network security tools - Discuss the business requirement for JKL in

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Write the assessment for riordan manufacturing using service

Write the assessment for Riordan Manufacturing using the service request SR-rm-009 Internet Security in the WAN found in the Virtual Organizations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd