Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You only have use of the 1 3 3 . 4 4 . 0 . 0 / 1 6 network for IPv 4 . Be

You only have use of the 133.44.0.0/16 network for IPv4. Be as conservative as you can for IPv4, while still making sure that each location has enough IPs for their needs. Also configure the network to use IPv6 addresses with the 2001:4BB8:1337::/64 network following industry best practices. Here are the sites and their details: Both North and South Phoenix have separate connections to the Internet, the other routers do not have an Internet connection for security reasons. S Phoenix needs 137 hosts and is directly connected to the North Phoenix, Tucson, and Yuma networks. N Phoenix needs 213 hosts and is directly connected to the South Phoenix, Flagstaff and Prescott networks. Tucson requires 88 hosts and is home to the Call Center, which accounts for 40 of those addresses. Yuma requires 37 hosts. This location has three VLANs: Sales with 17 hosts, R&D with 8 hosts and Marketing with 12 hosts. This site has two 2960 switches connected by EtherChannel. The VLANs are spread across the two switches. Flagstaff needs 27 hosts and one of these is for the Network Administrators workstation. Prescott needs 19 hosts and is the home to our HR department for all these addresses. Configuration Requirements Basics: Use the multiarea OSPF routing protocol. Each device needs an appropriate name (use Cisco 1941 Routers and Cisco 2960 switches). Disable DNS lookup. Each interface needs a description that tells others where it is connected (what is on the other end). Configure Port Address Translation "overload" for the Tucson Call Center. Setup NTP for all network devices. One PC can represent multiple PCs in Packet Tracer, to simplify your design and testing. Other than Yuma, which has specific needs due to VLANs, one 2960 switch can work with as many hosts as needed for the sake of simplicity in your design. (You dont have to chain together 10 switches.)(more on the next page...) Security: Think of Defense In Depth, Secure the Routers/Switches! Make sure that each device has an EXEC password (class), console password (cisco) and VTY password (ironman). Encrypt the plain text passwords. Automatically log out all users after seven minutes of inactivity. Protect the devices against brute force password attacks. Each device needs a legally appropriate message of the day banner. All devices should be set up for connection via SSH, not Telnet. Turn off all unused ports. Access Control Lists: Setup ACLs on Routers so that no other departments can talk to HR, but HR can reach the Internet. Setup an ACL to block FTP traffic with the Internet. Setup an ACL to block Telnet and SSH traffic from anywhere other than the Network Administrators workstation. Secure VTY Ports with a Standard IPv4 ACL to only allow access from the Network Admin's workstation. Remark all ACLs! Documentation should have the following details: Cover Page with team member names Table of Contents Budget (Just do your best to estimate realistic costs, educated guesses based on a Google search are fine.) Logical Topology (IPv4 and IPv6)(Use Draw.io to make a really nice-looking diagram.) IP Chart, showing by device, which interface links to which interface of another device with IP information. Physical Topology showing physical address, floor number, room number, rack number and location on rack for each router and switch. (Im not worried about where all the hosts are located.) Password List (This should be a separate page or pages in the document, so they can be securely stored.) Cleaned up configuration files for each device (Copy/Paste of running configuration files.) A list of IPv4 and IPv6 pings from one PC to all the other networks (one sample PC to represent all the PCs at a site or in a department is fine, as possible), routers and switches, organized by location. (Due to security settings, some of these pings should fail. If a ping fails, add a note as to why, as in which ACL is causing this purposeful behavior.)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Databases Technologies And Applications

Authors: Zongmin Ma

1st Edition

1599041219, 978-1599041216

More Books

Students also viewed these Databases questions