Determine and apply the initial switch configuration

Assignment Help Computer Networking
Reference no: EM131967023

Perform the following steps:

According to the Lab Layout Reference Diagram, determine and apply the initial switch configuration on the NYACCESS1 and NYCORE1 switches.

According to the Lab Layout Reference Diagram, determine and apply the initial router configuration on the NYEDGE1 and NYEDGE2 routers.

According to the Lab Layout Reference Diagram, determine and apply the VLANs and Trunk configurations to meet the following requirements:

On NYACCESS:

Create VLAN16 - Named Engineering

Create VLAN17- Named Marketing

Create VLAN18 - Named Sales

Configure Fa0/1 as a member of VLAN16

Create SVI VLAN17withIP Address 192.168.17.10/24

On NYCORE1:

Create VLAN16 - Named Engineering

Create VLAN17- Named Marketing

Create VLAN18 - Named Sales

Create trunk links between NYACCESS1 and NYCORE1 for VLANs 16 - 18

Create a trunk link between NYCORE1 and NYEDGE1 for VLANs 16 - 18

According to the Lab Layout Reference Diagram, determine and apply the configuration necessary to implement inter-VLAN routing with router on a stick on NYEDGE1 for VLANs 16 - 18.

Configure a default route on NYEDGE1 to 192.168.254.2.

Configure a static route on NYEDGE2 for 192.168.16.0/24 to NYEDGE1

Verify all configurations.

From within Practice Labs, copy and paste the final config from each device into a Microsoft® Word document. Please ensure that you have a full "show running config" output visible from any devices modified as part of the lab. Save the file as "Final_Configuration".

Reference no: EM131967023

Questions Cloud

Company equity and the debt-to-value ratio : What is the value of the company’s equity and the debt-to-value ratio? What is the equity value and the debt-to-value ratio if the company's growth rate is 3%
Create a simple python application : Create a Python script that takes two parameters to do the following:-List all files names, size, date created in the given folder.
What theory is best for recovering the price of the suit : Sam bought a new suit. The first time Sam took the suit to the cleaners, it disintegrated through no fault of the cleaners.
What would be the average fixed cost per unit : What would be the average fixed cost per unit at an activity level of 5,200 units? Assume that this level of activity is within the relevant range
Determine and apply the initial switch configuration : According to the Lab Layout Reference Diagram, determine and apply the initial switch configuration on the NYACCESS1 and NYCORE1 switches.
Development of sustainable home with net zero energy : CSM80002 - Environmental Sustainability in Construction - Development of Sustainable Home with Net Zero Energy - Estimate operating energy and carbon emission
Find the friends of x that consider x as their friend : For a given person x, find the friends of x that consider x as their friend as well; For a given person x, find all the Persons that consider x as their friend;
How much depreciation expense should the company recognize : Using the straight-line method, how much depreciation expense should the company recognize on December 31, Year 1
Explain in your own words the processes used by the stuxnet : Explain in your own words the processes used by the Stuxnet attackers to conceal their actions.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is relationship between function and aes block cipher

Use the literature and find some facts about this function. What is the relationship between this function and AES block cipher.

  What are the risks associated with networked machines

How can tools such as Wireshark help you identify problems with security, causes of low bandwidth - carefully outline at least 5 examples of problems faced and describe how you could use Wireshark to determine the cause of these problems?

  Network management in organisations

Identify potential ethical and social issues related to IT administration ethics and discuss ethical and social issues pertaining to IT systems-administration.

  How does ips anomaly detection differ from misuse detection

How does IPS anomaly detection differ from misuse detection?- What is computer forensics?- What is a honey pot?

  Network infrastructure vulnerabilities

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

  Convert the given octet to decimal

Convert the following 8-bit binary number to decimal: 10010011

  Explain the genesis of the grashof number gr what does it

1. explain the physical nature of natural convection. how does it differ from forced convection?2. explain the genesis

  Input is control signal to represent four-bit binary number

When k=0, m=n+1, when k=1, m=n+2. Suppose that input for which m>1111 will never happen. The input variable will available from switches.

  Task 1in a public-key system using rsa you intercept the

task 1in a public-key system using rsa you intercept the ciphertext c 13 sent to a user whose public key is e 23 n

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Develop skills in managing data in databases

MN405 - develop skills in managing data in databases and to gain understanding of data model development and implementation

  Describe the open systems interconnection

Describe the Open Systems Interconnection (OSI) protocol model. Identify the advantages and disadvantages of circuit switching and packet switching (X.25, Frame Relay, Asynchronous Transfer Mode, and Transmission Control Protocol/Internet Protocol

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd