Perform basic router configurations

Assignment Help Computer Networking
Reference no: EM131820526

Topology Diagram

2213_Topology Diagram.jpg

Task 1: Prepare the Network

Step 1: Create a network that is similar to the one in the topology diagram and paste a screenshot here.
Note: This lab was developed and tested using 1841 routers.

Task 2: Perform Basic Router Configurations
Configure the RA, RB, RC routers and switches according to the following guidelines: Step 1: Configure the router hostname to match the topology diagram.

Step 2: Configure IP addresses and masks on all devices.
Issue command: do show ip int brief on each router and paste the output here to show that you have configured the router names and all router interfaces.

Task 3: Perform Basic Routing Configurations

Enable OSPF area 0 with a process ID of 1 on all routers for all networks.

Step 1: Write down command to enable OSPF routing for each router

Step 2: Write down command to allow commands that allow OSPF routing to advertise the connected networks for each router

Step 2: Implement the OSPF commands on packet tracer and paste the routing table of each router here

Step 3: Verify the network connectivity by pinging PCs on different networks (paste screenshots here to show the network is connected)

Task 4: Configuring a Standard ACL

Standard ACLs can filter traffic based on source IP address only. A typical best practice is to configure a standard ACL as close to the destination as possible. In this task, you are configuring a standard ACL. The ACL is designed to block traffic from NET-A to access NET-B.

Answer the following questions and complete all required commands

Which router should we create the access-control list?

Step 1: Create the ACL on the router.

In global configuration mode, create a standard named ACL called A_TO_B_DENY.
R(config)#ip access-list standard A_TO_B_DENY
In standard ACL configuration mode, add a statement that denies any packets with a source address of NET-A and prints a message to the console for each matched packet.
R(config-std-nacl)#deny NET-A-IP WILD-CARD
Permit all other traffic.
R(config-std-nacl)#permit any

Step 2: Apply the ACL.

Which interface should we apply the ACL and for which direction?

Apply the ACL A_TO_B_DENY
R(config)#interface int_name
R(config-if)#ip access-group A_TO_B_DENY direction (IN/OUT)
R(config-if)#end R#copy run start

Step 3: Test the ACL.
Before testing the ACL, make sure that the console of the router is visible. This will allow you to see the access list log messages when the packet is denied.

Test the ACL by pinging any PC in NET-B from NET-A. Since the ACL is designed to block traffic with source addresses from NET-A network, the ping should fail.

Verified Expert

This Assignment was to understand how basic Networking works which included the understanding of Basic configurations of Router, Switches and other devices. It also include the configuration of OSPF and Access control List. Here, we have to configure and verify all above mentioned protocols. I have created the Simulation of the Network using Packet tracer Tool as well as provided all required Screenshot and commands for the configurations in the Word file. There are two main files one is Final Report.docx and Final Topology.pkt. I have also attached supporting files which are IP addressing Scheme.xlsx andTopology.png .

Reference no: EM131820526

Questions Cloud

Evaluate a company ability to pay long-term debt : Briefly describe the ratios that can be used to evaluate a company's ability to pay long-term debt.
What are common red flags in financial statement analysis : What are some common red flags in financial statement analysis? What is reported in the discontinued operations section of the income statement?
Analyze the types of bonds the chosen company issues : Analyze the types of bonds the chosen company issues, and make a recommendation to the investor as to which type of bond would provide the most value.
What is the approximate probability that the total weight : If 100 passengers will board a flight, what is the approximate probability that the total weight of their baggage will exceed the limit?
Perform basic router configurations : Create a network that is similar to the one in the topology diagram and paste a screenshot here - Perform Basic Router Configurations
How much is the expected total variable cost on the august : If production and sales are budgeted to increase to 150 chairs in August, how much is the expected total variable cost on the August budget
Previous exercise would the sampling distribution : a. For which of the sample sizes given in the previous exercise would the sampling distribution of p / be approximately normal if p = .65?
Calculate franks net capital gain or net capital loss : On 30 June 2015, Frank disposed of the following assets: Calculate Frank's net capital gain or net capital loss for the income year ending 30 June 2015.
Unmarried couples more likely to be interracial : The article "Unmarried Couples More Likely to Be Interracial" (San Luis Obispo Tribune, March 13, 2002) reported that 7% of married couples

Reviews

inf1820526

3/5/2018 4:31:34 AM

I don't have the time for 8-10 hours, I need it by 10 pm Sydney time. I paid you the amount you quoted so in return I want the solution on time. I just have 5 hours and I want it by that time or early. There is no point of me getting the solution after 10 pm because after that I cant submit it to college as online submission link will be closed so please I want it before 10 pm Sydney time. Just use the latest version of packet tracer so that later it does not create any problem and they have asked for screenshots so it should work.

len1820526

1/18/2018 4:14:29 AM

Take a screenshot to show the ACL is working (15 marks) Total Number of Pages in this Question Paper (including this page): 2 Pages READING TIME: 10 Minutes WRITING TIME: 50 minutes ALLOWABLE MATERIALS: 1. Student’s notes 2. PCs 3. Internet access (Dictionary / Calculator / x Pages of hand written A4 sheets / Text Books & Notes) ITNE2003 Install, configure, operate, and troubleshoot medium-size network

len1820526

1/18/2018 4:13:46 AM

dead line is 18 10:00pm sydney time. i dont want it on time without any excuse 1. Write your Student ID in the box provided above. 2. Use the reading time to study the question paper but do not begin writing until instructed. 3. Candidates may seek clarifications with invigilators/examiners during the reading time only. 4. Candidates are not allowed to leave the examination room within the first 30 minutes of the exam, or within the last 30 minutes of the exam. 5. Students should attempt ALL questions unless otherwise stated. 6. Write all your answers in the Answer Booklet provided only. If you need additional booklet your invigilator would provide when asked for.

Write a Review

Computer Networking Questions & Answers

  Explain the role of client - server

Identify and describe the processes involved in the Windows Client Server environment - Explain the role of client/server in the networking environment.

  Create a method to efficiently utilize the class c address

An organization has an Internet connection and has been assigned the IP address 201.201.201.0/24. The route connecting the corporation to the Internet has been assigned an IP address of 201.201.201.1/24.

  1 identify and discuss at least three major evolutionary

1. identify and discuss at least three major evolutionary steps in digital computingnetworking experienced in major

  How should ellen structure distribution from suppliers

How should Ellen structure distribution from suppliers to the store in Illinois? What annual saving can she expect

  Invoke method to tell air conditioner on or not

Suppose there is a reference variable myAC to object of this class, which has already been created. Using reference variable, invoke method to tell air conditioner object to turn on.

  Retrieve the name resolution policy table rule

Install a virtual instance of Windows Server using VirtualBox (http://www.virtualbox.org). Using PowerShell, retrieve the Name Resolution Policy Table rule that is configured on the server.

  What is the ethernet standard used in such a vlan

Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.

  Conduct literature survey on topic self-healing iot sensors

Objective: This segment of the project (i.e., Part A of ITSU3009) aims to provide the students an opportunity to carry out in-depth study on a specific emerging

  Define the term accident as used in operations management

Accidents may occur in factories, define the term accident as used in operations management,giving the main causes of accidents, and methods used to reduce the chances of such accidents occurring.

  Demonstrate how the icmp redirect attack works

Demonstrate how the ICMP redirect attack works, and describe the observed consequence. To check the routing information in Linux, you can use the command route

  Draw two iterations of peano curve and determine dimension

The Peano curve starts with an initial line segment and is expanded iteratively with a simple rule. For each step in the construction.

  Determine which model ups will work well for the server

You have created shared folders for all your companies departments and assigned the appropriate permissions. Everyone can access the shares as planned.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd