Create access lists to restrict traffic between departments

Assignment Help Computer Networking
Reference no: EM13881006

Prior to implementing any design we need to first write-up our proposed network design on paper. With that in mind, we begin by performing a network discovery. Once we have identified all the network devices and the needs of the organization, we can document the TCP/IP information that is needed for our design. In this exercise you will determine the subnet information for each department and assign IP addresses for the network devices.

You have been assigned as a networking tech for a new client, AAA Fabricating. The network is configured with a Class C network and the current allocation of IP addresses has been depleted. You have been tasked to reconfigure the network with a Class B address and assign a subnet to each of the 10 departments and the three routers.

Your network audit consists of the following information:

AAA Fabrication consists of 10 departments spread across three buildings.

Each building is connected using three Cisco 2800 Series routers. The three routers are located in the MIS wiring closet in Building 2.
Each department has its own Cisco 2950 switch.

There are at least two workstations in each department.

The company plans to use a class B address range starting at 172.16.0.0.

Each department must be assigned a subnet. Subnets should be designed to allow for the maximum number of hosts on each department subnet using classful subnetting.

The company also wants the three routers to communicate on the minimum quantity of IP addresses using three subnets.

Part 2

Create a logical Network Diagram

795_Logical Network Diagram.png

Logical Network topology represents a high level overview of the signal topology of the network. Every LAN has two different topologies, or the way that the devices on a network are arranged and how they communicate with each other.

The physical topology represents the way that the workstations are connected to the network through the actual cables that transmit data; the physical structure of the network.

The logical topology is the way that the signals or the data passes through the network from one device to the next without regard to the physical interconnection of the devices.

Logical topologies represent the network protocols that direct how the data moves across a network. The Ethernet protocol is a common logical bus topology protocol.

A logical topology is not necessarily the same as its physical topology.

Using the information from the IP addressing exercise create a logical network diagram showing how the current network is interconnected.

Part 3

Create access lists to restrict traffic between departments.

You have been tasked to create the following access list.

The HR and Payroll departments both reside in the same building. The company has devised a new benefits system. The HR department is the only department that should access the Payroll subnet. All hosts on the network should be able to access the HR department.

Reference no: EM13881006

Questions Cloud

Stream of pavements : A stream of pavements over a 5 year period have a present worth of $100,000. Payments in years 1, 4 and 5 are $15,000, $30,000, and $35,000. The value in years 2 and 3 must be determined. Year 3 is twice year 2. What are the values of year 2 and year..
How well does either trend fit the data : Using the years 1975 to 2006 (and denoting the time variable by the integers 1 to 32 for simplicity), estimate the linear time trend of housing prices. Use the same data to estimate an exponential trend. How well does either trend fit the data?
Which of following forbids sex discrimination regarding pay : Which of the following forbids sex discrimination regarding pay? Which type of intellectual property protects books, movies, and artwork
Leased office space under a three year operating lease : 1.On January 1, 2013, Winn Heat Transfer leased office space under a three year operating lease agreement.
Create access lists to restrict traffic between departments : Create access lists to restrict traffic between departments. The HR and Payroll departments both reside in the same building. The company has devised a new benefits system.
Standard deviation of the return on the market portfolio : Suppose the CAPM is true and you observe the following: Beta(i)=2. In a regression of Er(i) on Er(m), the R squared= 0.8 and the idiosyncratic variance of asset (i) is 25%. What is the standard deviation of the return on the market portfolio?
Builders constructed the warehouse at a cost : Builders constructed the warehouse at a cost of $2.5 million.
What is the current total value : Beach & Company reported net income of $40 million for last year. Depreciation expense totaled $18 million and capital expenditures came to $8 million. Free cash flow is expected to grow at a rate of 5% for the foreseeable future. What is the current..
Compute multiple-regression equation estimating : Compute a multiple-regression equation estimating a typical home's sales price based on the various improvements.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd