Review the existing network design documentation

Assignment Help Computer Network Security
Reference no: EM132789304

ICTNWK506 Configure, Verify and Troubleshoot WAN Links and IP Services in a Medium Enterprise Network

Assessment Task

Activity 1: Prepare a set of guidelines explaining how to prepare for an ICT job according to work health and safety (WHS) codes, regulations and standards. Include reference to the relevant legislation, regulations, codes and standards.

Activity 2: Arrange access to the site as per organizational requirements.

Draft an email to the IT manager (your assessor) and seeking permission and arrange access to the network site. Email should request permission to access the site in a specific date and time, according to the policies and procedures.

Activity 3: Review the existing network design documentation (‘scenario and background information' provided above) to ensure that it is current and complete. Document any changes required.

Activity 4:Select and document network elements required to be installed to meet technical requirements.

Activity 5: Send email to contact vendors and service suppliers to obtain the specifications and determine the availability of the identified components.
Also, give a follow-up call to your vendor/ supplier (your assessor) to confirm your inquiry. Write summary of discussion.

Activity 6: Develop plans, with prioritised tasks and contingency arrangements, forinstallation ofcomponents with minimum disruption to client.

Describe your plans to minimise to disruptions.

Activity 7: Discuss with your manager (your assessor) and obtain approval for the plans including security and timing. Provide evidence of your approval.

Write an email to the IT Manager/ CIO (assessor) seeking approval of the installation plan including security and timing.
Reply email from IT Manager/ CIO (assessor) advising approval of the plan.

Part B

For each question in Part B, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Submit all documents, as listed in the evidence checklist (below) to your assessor by the due date.
Attach screenshots and/or provide written explanation.

Activity 1: Determine different methods for connecting to a wide area network (WAN).
Discuss it with your manager (your assessor) and write discussion summary.

Activity 2: Configure and verify a basic serial WAN configuration

Activity 3: Configure and verify at least two WAN protocols.

Activity 4: Determine and explain virtual private network (VPN) technology and document the VPN technology you implemented.

Activity 5: Configure and verify a site-to-site VPN. Document the steps taken for:
o Configure IPsec VPN settings on R1 and R3
o Verify site-to-site IPsec VPN configuration
o Test IPsec VPN operation

Activity 6: Determine asymmetric digital subscriber line (ADSL) technology.

Discuss it with your manager (your assessor) and write discussion summary.

Activity 7: Configure and verify an ADSL connection. This can be achieved on any supported router in given topology (R3 is proposed router).

Part C
For each question in Part C, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Activity 1: Determine the operation and benefits of using dynamic host configuration protocol (DHCP) and discuss it with your manager (your assessor). Write your discussion summary.

Activity 2: Configure and verify DHCP operation on a supported router (R3 is proposed router).

Activity 3: Implement static and dynamic addressing services for hosts in a local area network (LAN) environment
Document the hosts static and dynamic addressing services you used.
o Screen Shot of any interface's IP configuration could be the evidence for static addressing services.
o Screen Shot of, dynamically assigned IP, to client could be the evidence for dynamic addressing services. (Such as PC-C getting dynamic IP from DHCP on R3)

Activity 4: Determine the basic operation of network address translation (NAT)
Document which operation of NAT you performed and discuss it with your assessor(This could be demonstrated with ADSL or IPSec configurations).

Activity 5: Configure NAT for given network requirements. As above, provide evidence using screen shot for configured NAT.

Activity 6: Implement and verify NAT in a medium sized enterprise branch office network.
Provide evidence as screenshot and/or descriptions of how you have done it.

Activity 7: Discuss the basic operation and configuration of internet protocol version 6 (IPv6) with your manager and write summary of discussion.

Part D
For each question in Part D, you must take a screenshot and/or provide a written explanation as evidence of completion. You must also keep records of any issues or problems that arise, for use in troubleshooting in Part E.

Activity 1: Determine the purpose and types of access control lists (ACLs) and discuss it with your manager (your assessor). Write summary of discussion.

Activity 2: Configure and apply ACLs based on network filtering requirements

Activity 3: Configure and apply ACLs to provide secure access to the router

Part E
Activity 1: Troubleshoot WAN implementation issues identified in Part A - D

Activity 2: Rectify WAN problems

Document the steps taken to troubleshoot and rectify WAN issues

Activity 3: Write issues identified and solutions implemented to rectify these issues.

Part F

Activity 1: Write a reflection journal outlining what you have learnt while doing all the above activities.

Attachment:- Verify and Troubleshoot WAN Links.rar

Reference no: EM132789304

Questions Cloud

What is the depreciation charge for marian company : Inclusive of inflation, the actual amount expected to be received on disposal was estimated at P900,000. What is the depreciation charge for 2013?
Define goodwill and explain the extent : Define goodwill and explain the extent to which it should be recognized in the financial statements of a business
Revolutionizing industry supply chain model : Read the Crocs: Revolutionizing an Industry's Supply Chain Model for Competitive Advantage case study in your course text.
Are there tools to help identify the given gaps in care : Are there tools to help identify these gaps in care? If you could develop a screening tool to address a barrier to healthcare, what would it look like?
Review the existing network design documentation : Prepare a set of guidelines explaining how to prepare for an ICT job according to work health and safety (WHS) codes, regulations and standards
Identify types of technologies : Q1 Identify 3 types of technologies that a manager may encounter when carrying out his/her P.L.O.C. functions.
Determine the cash flows and the npv : Determine the cash flows, the NPV, the IRR and the MIRR. Terminal value per acre $ 3000. Closing costs per acre $ 100.Price per acre $ 3400
How much can she contribute to her own RRSP : Mark's wife Gina looks after their young child and earned $42,000 in 2019 while working part-time. How much can she contribute to her own RRSP in 2020
Linking the balanced scorecard to strategy by norton : The Changing Role of Top Management: Beyond Structure to Processes by Sumantra Ghoshal and Christopher A. Bartlett

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are new types of messages added compared to snmpv-one

What are the new types of messages added compared to SNMPv1? Regarding table expansion, what is the difference between createAndGo and createAndWait RowStatus?

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  Research the elements of a multilayered security plan

You need to research the elements of a multilayered security plan and to create a detailed outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure

  Does the receiver already have the private key

Does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender?

  Analyze design process for defining a customized security

Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.

  What is the real vulnerability associated with open network

CSIS 343- Although the thought of a wireless network attack can be terrifying, what is the real vulnerability associated with an open wireless network? Are users of an open wireless network really that vulnerable to a nefarious attack?

  Explain how the council should protect critical assets

Your role is Security Manager at Ruskin City Council. Your job involves the detection, prevention and reaction to potential and actual security violations. The Head of Security has asked you produce a report, using the AAA and CIA models, to expla..

  Develop paper where you address digital forensics tools

Develop a paper where you address three digital forensics tools in the following categories: availability, pricing, platforms supported, technical strengths and weaknesses, etc

  Why not allow zero bytes of padding

Why not allow zero bytes of padding? That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  Internet technology- marketing and security

Internet Technology, Marketing, and Security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd