What are the principles of applying acls

Assignment Help Computer Networking
Reference no: EM132371906

Assessment item : Theory and Simulation Exercises

Task

Using Packet tracer implement the following tasks based on the network topology of a small business given below. Smart Univ Ltd has three branches: Albury, Bathurst and Wagga site. Each site has Admin Office to manage the local business. Wagga site has three buildings where has two major departments: Student group and Staff . Its Wagga office controls the connection between the Internet server and Internet Service Provider (ISP). Examine the network requirements and complete the following questions to make the company network service running.

Please use your last 4 digits of your student ID as the first two octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example, if your student ID is 11567890, using the last 4 digits (7890). your main network address will be 78.90.0.0.

Consider the following Topology in the figure below:

327_Fig.jpg

1380_aa.jpg

VLAN Table

VLAN

Name

10

Student group

20

Staff

88

Admin office 2

99

Native

You need to use Packet Tracer to implement the given topology and to complete the following tasks: Part A: Switching and VLANs

1. It is quite important to lock down access and install strong security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features. What will be the best practice to secure your switch?

2. Configure four VLANs as required on the switch and enable Trunking on switch.

3. Configure inter-VLAN routing on Router wagga based on the Addressing Table.

4. Configure static routes on routers to build up full connectivity between each site to ISP and Internet server.

5. Verify connectivity by making sure all the PCs can ping the Internet server and ISP.

6. Explain and analyse the routing process of routers in the case of ping from Student group 1 to the Internet server.

Please save your configured packet tracer file with the name of "PT_your studentlD_partA"

Part B Network Security

7. In order to improve the network performance and security, ACLs is recommended. Please explain what is the ACL ?

8. How can ACLs help with the required tasks?

9. What are the principles of applying ACLs?

10. How to block VLAN 10 to visit ISP? Please write down the ACL statement(s) accordingly

Please save your configured packet tracer file with the name of "PT_your studentlD_partB"

Rationale

This assessment task will assess the following learning outcome/s:

• be able to configure and troubleshoot networks to improve efficiency and security.

• be able to configure, verify and solve a variety of problems involving Virtual Local Area Networks.

In this assessment item, tasks are designed to reinforce the application of configuring routers for inter-VLAN communication and configure static routes to reach destinations outside of your network. Your ability demonstrate your skills at configuring inter-VLAN routing, static and default routes are also included.

Reference no: EM132371906

Questions Cloud

Calculate Schedule Variance : CST 617 - Project Cost & Schedule Control Assignment, Geneva Business School, Lincoln University of Business and Management, UAE. Calculate Schedule Variance
Identify and select a health disparity in your community : MPH5208 Public Health Program Planning and Evaluation-Capella University-USA-Analyze factors that influence public health policy and regulations related.
Interpret and use financial statistics and tools : FNSINC602 - Interpret and Use Financial Statistics & Tools - FNS50217 - Diploma of Accounting - Create a dashboard in Excel or using Tabuleau that showcases
What kind of loan to value does the bank offer : RL-EST 421 Real Estate Finance Fundamentals Assignment - Individual Case Project, University of Missouri-Kansas City, USA. What kind of loan to value bank offer
What are the principles of applying acls : Charles Sturt University-Australia-Explain and analyse the routing process of routers in the case of ping from Student group 1 to the Internet server.
Describe how to design a new product : 49989 - Operations Engineering - University of Technology Sydney - Develop a Design Review checklist consisting of minimum 25 questions distributed evenly over
Prepare a report or critique on an academic paper : Prepare a report or critique on an academic paper related to Enterprise application or designing or implementation challenges
Develop a conference management system : NIT5150 – Advanced Object Oriented Programming - Victoria University - What are the benefits of the system to the targeted organization/users
What type of organization structure would be of most value : Activity 1 - What type of organization structure would be of most value to this firm in its initial efforts to go international

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  What are advantages and disadvantages of networked computers

What are some advantages and disadvantages of networked computers? Explain some similar characterisitcs between a network and the internet.

  Penetration testing on ecommerce website

MN623 Cybersecurity and Analytics - Melbourne institute of technology - Penetration Testing Project for eCommerce Website - Learning Outcome

  Derive the state equations

Derive the state equations A(t+1) and B(t+1) by substituting the input equations for the J and K variables, and draw the state diagram of the circuit.

  Which ip address is used for routing data packet on internet

A router on a home network is assigned an IP address of 128.123.45.67. A computer in the home network is assigned a private IP address of 192.168.10.62.

  Network topology diagram

The report should have a detail explanation of the planning and designing of the network. It is recommended that bullet points are only included whenever

  Explain benefits of providing synchronization tool

Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

  Research and report on network design and management trends

In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network management tools, software defined networking, and wir..

  Explain the main concepts of cloud computing

Explain the main concepts of Cloud Computing and why you think that a move to the Cloud could be good for Regional Gardens;

  Network project management - depth analysis of common issue

analysis of common issues that project managers often face in organisations that lack a culture that supports implementation of project management methodologies.

  Mac destination address in ethernet header-arp payload

Describe the difference between MAC Destination Address in Ethernet header and one found in ARP payload.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd