Problem 1you have four web servers that are serving static

Assignment Help Computer Networking
Reference no: EM13380228

Problem 1:

  • You have four web servers that are serving static web pages. You want to prevent them from communicating with each other, but allow them to communicate with the gateway
  • You have a fifth webserver that is serving a web application and therefore it requires access to the database server. This webserver and the database server should ONLY be able to communicate with each other and the gateway
  • All of these servers are on the same subnet and connected to the same switch
Design a solution to this problem using private VLANs.
You must submit a synopsis of the solution, a diagram and the commands that you would use.

Problem 2:

Write an Access List that drops packets that match the following:

  • Destination address equal to class D or broadcast
  • Contains a connection-oriented protocol
  • Destination address equal to 0.0.0.0 or with 0s in the network part

Assume the interface we are applying this access list to has an IP 172.16.20.1/22

Reference no: EM13380228

Questions Cloud

Write an introspective capstone paper expressing your views : write an introspective capstone paper expressing your views aboutinformation use in todays society. this will be
Deadlock a- given the sequence of resource requests below : deadlock a- given the sequence of resource requests below draw the resource allocation graph and answer the following
A- please answeronly two ofnbsp the following questions : a- please answeronly two ofnbsp the following questions that are related to the file
In a table forma compare between segmentation and virtual : in a table forma compare between segmentation and virtual memory organizations in terms of the memory structure
Problem 1you have four web servers that are serving static : problem 1you have four web servers that are serving static web pages. you want to prevent them from communicating with
1 this question relates to section 2 genetic algorithma : 1. this question relates to section 2 genetic algorithma heredna -gt channel assigned to a wireless linkindividual -gt
Question 1a write an assembly code segment that calls the : question 1a write an assembly code segment that calls the subroutinenew functionif bits 5 and 6 of portd equal 1.b
Xumuc is has the wan links in place to the new locations in : xumuc is has the wan links in place to the new locations in the houston region. xumuc currently has 2 other regions san
You should choose examples from your own experience or find : you should choose examples from your own experience or find appropriate cases on the web that you can discuss. credit

Reviews

Write a Review

Computer Networking Questions & Answers

  Case study - networks and switching

Prepare a report - Discussion of your subnetting approach, your calculations for each subnet, why particular subnet masks were chosen and how you allocated the subnets to individual networks - TNE10006/TNE60006 - Networks and Switching

  Question 1i give explanation for network securityii give

question 1i. give explanation for network securityii. give explanation security mechanismiii. what do you comprehend by

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  What are the major business objectives and processes

What are the major business objectives and processes (operations) that the hotel company carries out and list the information systems that are used to support their portal and describe how they are related to the overall business objectives and pro..

  Expanding the network connected to a single hub

Suppose computers on your home network are connected to a single hub (a), but now you need to expand the network.

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  Discuss some of the malicious things thomas can do

Suppose Ali and Jim are sending packets to each other over a computer network.

  Domain name system (dns.dynamic host configuration protocol

On the Internet, the entity that looks up a domain name and retrieves information about it is the:Select one: A. Domain Name System (DNS) B. Dynamic Host Configuration Protocol (DHCP) C. Internet Corporation for Assigned Names and Numbers (ICAAN) ..

  Computing higher data rate than atm line

Suppose that you have trained your dog to carry box of three data storage tapes. For what range of distances does dog have higher data rate than 155 Mbps ATM line ?

  In her paper developing an effective metrics program

in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.

  The analog to digital converter

The Analog to Digital converter has V(t) as its input, and it outputs a binary word B(t) with a fixed length of k bits, which is its best approximation to V(t). Suppose that V(t) can vary continuously between zero and 5 volts

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd