Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You only have use of the 1 3 3 . 4 4 . 0 . 0 / 1 6 network for IPv 4 . Be
You only have use of the network for IPv Be as conservative as you can for IPv while still making sure that each location has enough IPs for their needs. Also configure the network to use IPv addresses with the :BB::: network following industry best practices. Here are the sites and their details: Both North and South Phoenix have separate connections to the Internet, the other routers do not have an Internet connection for security reasons. S Phoenix needs hosts and is directly connected to the North Phoenix, Tucson, and Yuma networks. N Phoenix needs hosts and is directly connected to the South Phoenix, Flagstaff and Prescott networks. Tucson requires hosts and is home to the Call Center, which accounts for of those addresses. Yuma requires hosts. This location has three VLANs: Sales with hosts, R&D with hosts and Marketing with hosts. This site has two switches connected by EtherChannel. The VLANs are spread across the two switches. Flagstaff needs hosts and one of these is for the Network Administrators workstation. Prescott needs hosts and is the home to our HR department for all these addresses. Configuration Requirements Basics: Use the multiarea OSPF routing protocol. Each device needs an appropriate name use Cisco Routers and Cisco switches Disable DNS lookup. Each interface needs a description that tells others where it is connected what is on the other end Configure Port Address Translation "overload" for the Tucson Call Center. Setup NTP for all network devices. One PC can represent multiple PCs in Packet Tracer, to simplify your design and testing. Other than Yuma, which has specific needs due to VLANs, one switch can work with as many hosts as needed for the sake of simplicity in your design. You dont have to chain together switches.more on the next page... Security: Think of Defense In Depth, Secure the RoutersSwitches Make sure that each device has an EXEC password class console password cisco and VTY password ironman Encrypt the plain text passwords. Automatically log out all users after seven minutes of inactivity. Protect the devices against brute force password attacks. Each device needs a legally appropriate message of the day banner. All devices should be set up for connection via SSH not Telnet. Turn off all unused ports. Access Control Lists: Setup ACLs on Routers so that no other departments can talk to HR but HR can reach the Internet. Setup an ACL to block FTP traffic with the Internet. Setup an ACL to block Telnet and SSH traffic from anywhere other than the Network Administrators workstation. Secure VTY Ports with a Standard IPv ACL to only allow access from the Network Admin's workstation. Remark all ACLs! Documentation should have the following details: Cover Page with team member names Table of Contents Budget Just do your best to estimate realistic costs, educated guesses based on a Google search are fine. Logical Topology IPv and IPvUse Draw.io to make a really nicelooking diagram. IP Chart, showing by device, which interface links to which interface of another device with IP information. Physical Topology showing physical address, floor number, room number, rack number and location on rack for each router and switch. Im not worried about where all the hosts are located. Password List This should be a separate page or pages in the document, so they can be securely stored. Cleaned up configuration files for each device CopyPaste of running configuration files. A list of IPv and IPv pings from one PC to all the other networks one sample PC to represent all the PCs at a site or in a department is fine, as possible routers and switches, organized by location. Due to security settings, some of these pings should fail. If a ping fails, add a note as to why, as in which ACL is causing this purposeful behavior.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started