Create usernames and passwords on corporate router

Assignment Help Computer Network Security
Reference no: EM131482760

Assignment: LAN Design Project Packet Tracer

Scenario:

You have been tasked with designing your new corporate network since they found out you have studied IP addressing, Cisco networking, and routing. Below is a screen shot of the topology for your network:

1245_Topology for your network.jpg

You are responsible for the following tasks: Design and Implement IPv4 addressing plan

Includes putting addresses on all PCs, switches, and routers Design and Implement basic configurations for Switch 1 and Switch 2 Hostnames, Management IP address for VLAN 1, enable secret password, line console password and Message of the Day Warning banner. Put proper default gateway address on Switch 1 and Switch 2.

Design and Implement basic configurations on all 3 routers:

Hostnames, IP addresses on proper interfaces, enable secret password, line console password and Message of the Day Warning banner.

Design and Implement SSH on switches

Create proper addressing on VLAN 1, usernames & passwords on Switch 1 and Switch 2 Design and Implement SSH on all 3 routers.

Create usernames & passwords on Corporate Router, ISP router and Branch office router

Design and Implement static routing on all 3 routers so that all networks are reachable.

Create proper static routes on routers to reach all other networks.

Details on Addressing:

You have been given the following major IP address:

NOTE: You will each have your own different major IP address that you need to subnet. In other words, everyone will have a slightly different problem!

You need to subnet that into 4 separate networks.

Network 1 subnet - Corporate LAN

Network 2 subnet - Connection between Corp Router G0/0 to ISP G0/0

Network 3 subnet - Connection between ISP Router G0/1 to Branch office Router G0/1 Network 4 subnet - Branch Office LAN

Put proper addressing on Corporate Router interfaces G0/0 and G0/1 Put proper addressing on ISP router G0/0 and G0/1

Put proper addressing on Branch Office Router G0/0 and G0/1

Turn on all interfaces on all 3 routers by issuing the no shutdown command for each interface

Put VLAN 1 ip address on Switch 1 - Should be address in Network 1 Corporate LAN subnet

Put VLAN 1 ip address on Switch 2 - should be address in Network 4 Branch office LAN subnet.

Put proper addressing, subnet mask and default gateway on PCs and Server in Corporate LAN. They should use addresses in Network 1 subnet.

Put proper addressing, subnet mask and default gateway on PCs in Branch Office LAN. They should use addresses from Network 4 subnet.
Configure static routing on all 3 routers.

Corporate router will need a route to Branch office LAN and connection between ISP and Branch router.

ISP router will need a route to Corporate LAN and Branch office LAN

Branch router will need a route to Corporate LAN and connection between ISP and Corp router.

TESTING & VALIDATION

Every device should be able to successfully ping every other device.

Routers should have complete routing tables - that is, they should "see" all 4 networks. I should be able to ssh into the switches.

COMMON DEVICE CONFIGURATION PARAMETERS -

enable secret command on all routers and switches should be cisco
line console password on all routers and switches should be class
ssh username admin        ssh password cisco123
message of the day banner   Warning! Stay out unless specifically authorized!

Put in address design. Have instructor check before implanting in Packet Tracer IP Subnetting Address Design: Fill out information for your four subnets

Subnet Number

Subnet Number

Subnet Address

First Usable Host Address

Last Usable Host Address

Broadcast Address

0

 

 

 

 

1

 

 

 

 

2

 

 

 

 

3

 

 

 

 

Fill out table with proper addresses. Have instructor check before implementing in Packet Tracer.

Device

Interface

IP Address

Subnet Mask

Corporate Router

G0/0

 

 

 

G0/1

 

 

ISP Router

G0/0

 

 

 

G0/1

 

 

Branch Office Router

G0/0

 

 

 

G0/1

 

 

Fill out table with proper addresses. Have instructor check before implementing in Packet Tracer.

Device

Interface

IP Address

Subnet Mask

Default Gateway

PC-0

NIC

 

 

 

PC-3

NIC

 

 

 

Server 0

NIC

 

 

 

S1

VLAN 1

 

 

 

PC-1

NIC

 

 

 

PC-2

NIC

 

 

 

S2

VLAN 1

 

 

 

Reference no: EM131482760

Questions Cloud

Bob bought hunting equipment : Bob bought hunting equipment for $4,800. He borrowed money from his credit union for the purchase, obtaining a loan with a 10% annual interest rate.
Why would plentiful resources like these be a curse : Having abundant resources such as oil or diamonds would seem to be a benefit to an economy, yet some people have considered it a curse.
Analyze a particular company''s accounting profile : This assignment requires you to thoroughly analyze a particular company's accounting profile. It will also require you to prepare pro forma financial statements
Are these different growth rates really so important : The "Rule of 72" permits you to quickly determine how fast an economy can double by dividing 72 by the growth rate. For example, if the growth rate is 1%.
Create usernames and passwords on corporate router : Create usernames & passwords on Corporate Router, ISP router and Branch office router. Create proper static routes on routers to reach all other networks.
Almost all humans have 23 pairs of which of the following : When researchers try to estimate the heritability of a human behavior, what are the main kinds of individuals they consider?
Differentiate between a straight line ppf and the ppf : Explain the important difference between a straight line PPF and the PPF that is concave (bowed out) to the origin.
Compute the opportunity cost for arizona of oranges : The table on the next page shows the potential output combinations of oranges and jars of prickly pear jelly (from the flower of the prickly pear cactus).
Discuss the production possibilities : Complete the following based on the figure below where three different production possibilities curves are shown.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Provide data security technologies

Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Why people participate in bug bounties

What are the core components of a PKI - Explain the problems with key management.

  How would use address the troublesome trend

How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend?

  Examine three cable maintenance tools

Examine three (3) cable maintenance tools that you would consider essential for a network team. Of the three (3) tools that you have examined, determine the one (1) that you believe is the most versatile. Provide one (1) scenario that demonstrates..

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  How would you train hhf employees to recognize malware

If HHF had a widespread infection of a new variant of the Blaster worm, how might you disinfect HHF?

  What happens to spaces and punctuation in a caesar cipher

What kind of attack does the use of a nonce prevent - what kind of key authority is used to prevent the man-in-the-middle attack when using public key encryption?

  What is net neutrality and why is it so important

What is Net Neutrality and why is it so important for organizations today?

  Provide network layout showing all components of rps network

Provide a network layout (network diagram) showing all the components of RPS network including both firewalls, the email and web servers, the DMZ, and all the internal hosts

  Explain role of access controls in implementing a security

Explain the role of access controls in implementing a security policy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd