CIS230_3
.docx
keyboard_arrow_up
School
ECPI University, Greensboro *
*We aren’t endorsed by this school
Course
230
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
6
Uploaded by corada5995
Task Summary Required Actions v Create Standard Access List 5 v/ Permit Network 192.168.1.0 0.0.0.255 v/ Permit Network 192.168.2.0 0.0.0.255 v/ Permit Network 192.168.3.0 0.0.0.255 v Apply Access List 5to VTY lines 0-4 Hide Details Apply to VTY 0 for inbound traffic [+ Apply to VTY 1 for inbound traffic [+ Apply to VTY 2 for inbound traffic [+ ] Apply to VTY 3 for inbound traffic [+] Apply to VTY 4 for inbound traffic v Save your changes in the startup-config file Hide Details Save the permit192.168.1.0 0.0.0.255 statement k3 save the permit192.168.2.0 0.0.0.255 statement k3 save the permit192.168.3.0 0.0.0.255 statement [+] Apply access list 5 to VTY lines 0-4 Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 5. Add a permit statement for each network to the access list. a. Type access-list 5 permit 192.168.1.0 0.0.0.255 and then press Enter. b. Type access-list 5 permit 192.168.2.0 0.0.0.255 and then press Enter. c. Type access-list 5 permit 192.168.3.0 0.0.0.255 and then press Enter. 3. Apply the access list to VTY lines 0-4. Filter incoming traffic. a. Type line vty 0 4 and then press Enter. b. Type access-class 5 in and then press Enter. c. Press Ctrl + Z. 4. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter.
Task Summary Required Actions v/ Add permit any to Access List 11 Hide Details kd Add the permit any statement E3 Make the statement the last in the list v Save your changes in the startup-config file Hide Details Save the permit statement k3 save the statement as the last in the list Explanation Complete this lab as follows: 1. Enter the configuration mode for the Fiji router: a. From the exhibit, select the Fiji router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, add a permit any statement to Access List 11 to allow all traffic other than the restricted traffic. a. Type access-list 11 permit any and press Enter. b. Press Ctrl + Z. 3. Save your changes in the startup-config file. a. Type copy run start and then press Enter. b. Press Enter to begin building the configuration. c. Press Enter. Task Summary Required Actions v/ Create Standard Access List 25 v Deny Host 199.68.111.199 v Deny Host 202.177.9.1 v Deny Host 211.55.67.11 V' Permit all other hosts Hide Details Add the permit any statement k3 Make the statement last in the list v Apply Access List 25 to the s0/0/0 interface
Complete this lab as follows: 1. Enter the configuration mode for the router: a. From the exhibit, select the router. b. From the terminal, press Enter. c. Type enable and then press Enter. d. Type config term and then press Enter. 2. From the terminal, create a standard numbered access list using number 25. Add statements to the access list to block traffic to the required hosts. a. Type access-list 25 deny host 199.68.111.199 and press Enter. b. Type access-list 25 deny host 202.177.9.1 and press Enter. c. Type access-list 25 deny host 211.55.67.11 and press Enter. 3. From the terminal, add a statement to allow all other traffic from all other hosts, by typing access-list 25 permit any and pressing Enter. 4. From the terminal, apply Access List 25 to the Serial0/0/0 interface to filter incoming traffic. a. Type int s0/0/0 and press Enter. b. Type ip access-group 25 in and press Enter. c. Type Ctrl + Z. Which of the following should be configured on the router to filter traffic at the router level? SSH = Access control list Telnet Anti-spoofing rules You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with the username admin01 and the password P@ssWOrd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Use encrypted Type 7 passwords. = Move the router to a secure server room. Change the default administrative username and password. Use a Telnet client to access the router configuration.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Cloud Computing:
arrow_forward
Design your own network
Requirements:
1 Routers Configured with basic configuration
1 Switches Configured with Vlan10, within this switch 5 PC is connected (172.168.20.0/28)
1 Switches Configured with Vlan200, within this switch 2 PC is connected (192.168.50.0/29)
PC from VLAN 10 should be able to Connect to PC in VLAN 200 and vice versa
Both Router and Switch should have these properties.
Name R1[Your Initial], S1[Your Initial], S2[Your Initial]
Banner [Put your name]
Passwords use this as a password to all CPENET2EXAM
You can decide for other Ip addresses and VLAN Needed
All configurations should be documented
arrow_forward
More administrator knowledge is required for configuration, verification, and
troubleshooting when we are using the Dynamic Routing
True
False
Static routes Disadvantages is consuming less bandwidth than dynamic routing
protocols. No CPU cycle is used to calculate and communicate routes
True
False
Static routes are advertised through the network, which increases security
True
False
arrow_forward
One of the following is consider an advantage of static routing.
No intervention is required to maintain changing route information
Configuration of static route is error-free
O The path a static route uses to send data is known
Static routes scale well as the network grows
arrow_forward
assume that T = a
arrow_forward
Figure 1: Traffic Engineering with Open Flow
Figure 1 reveals a network where the traffic flowing from the first host which is attached to
router u to the server which is attached to router z needs to be routed along the path u.v.w.z while
the traffic flowing from the second host attached to router x router to the server which is attached
to router z needs to be routed along the path x.w.y.z. Please describe the local flow table of each
of the switches uvxw.y,z (in terms of match and action rules) to enable the routing of the two
traffic flows according to the constraints described above. The following IP addresses will be
used for the two hosts and the server.
• The first host belongs to the subnetwork 10.1.0.0/16. It is attached to router U and has
an IP address of 10.1.0.1
•
The second host belongs to subnetwork 10.5.0.0/16. It is attached to router X and has an
IP address of 10.5.0.1
match
IP Src = 10.3.*.*
IP Dst = 10.2.*.*
The server belongs to the subnetwork 10.11.0.0/16. It is…
arrow_forward
sWin an international IT solutions company, is launching 11 new branches in a new country where they currently have no existing branches. The sWin CIO has asked that each subnet should host at least 2000 devices.
sWin has obtained a network address of 10.11.0.0/17.This address needs to be subnetted further and the CIO has decided that the internal subnet mask will be /21
The company’s subnet plan allows for:
Router Pool: 2 router interfaces for each subnet – the last 2 IP addresses from each subnet.
Managed Network Device Pool: The first 64 IP addresses are reserved for switches and other network devices
Server Pool: The first 64 IP addresses following the Managed Network Device Pool are reserved for servers.
Workstation Static Pool: The first 16 IP addresses following the Server Pool are reserved for Workstations that require static IP addresses.
Workstation DHCP Pool: The remaining IP addresses are reserved for automatic IP configuration.
You have been asked to use subnet 10 for…
arrow_forward
Task 2: Access Control Lists
You will need to work out which interface on which router this needs to be applied to. Each ACL must work and be seen to work.
Stop any IP address from 10.0.0.128 to 10.0.0.191 from pinging 123.123.123.123 - yet allow all other addresses
Creating an ACL that meets the above 'selected' criteria
Proving that a change of IP address, other than those allocated to the PC's also demonstrates the operation of the ACL. Also prove that you are still able to ping to 99.0.0.2 irrespective of device IP address
arrow_forward
Task 1: Subnetting a Class A Address: The network ID of the Class A address is 37.0.0.0. You need to subnet this network into for subnets using the shorthand method
arrow_forward
Computer Science
Scenario A
Company ABC needs to build a simple network in new branch office with the following characteristics:
2 workstations
1 switch
1 server
IP address 192.168.1.1 until 192.168.1.3
Draw a network design for this network using all information in Scenario A above. All the devices must be labeled and assign the suitable IP address for the respective device. (You are NOT required to use packet tracer)
The email communication is done via three protocols in general. Explain in detail the THREE (3) protocols.
arrow_forward
Cisco Router
A Network with id: 192.168.0.0 and subnet mask 255.255.0.0 is given to you to split it in such a way that the following classrooms are given adequate number of IPs based on their needs. Each classroom will occupy its own subnet. The following information for each subnet must be included: Subnet ID CIDR Subnet Mask First IP usable in the subnet Last IP usable in the subnet Broadcast IP Address for the subnet
Classroom1: 8 PCsClassroom2: 400PC and 4 PrinterClassroom 3: 2 PCsClassroom4: 62 PCs and a ServerClassroom5: 24PCs
arrow_forward
One of the Dynamic Routing Advantages is Router resources are used (CPU
cycles, memory, and link bandwidth)
O True
False
There are some of Disadvantages of Dynamic Routing one of them Protocols
automatically react to the topology changes
True
O False
arrow_forward
11. Are these system specifications consistent? "The router
can send packets to the edge system only if it supports the
new address space. For the router to support the new ad-
dress space it is necessary that the latest software release
be installed. The router can send packets to the edge sys-
tem if the latest software release is installed. The router
does not support the new address space."
arrow_forward
Subnets used:
For the LAN addresses, you must use the classful network space 192.168.13.0. Use the VLSM design guidelines to subnet that classful network between R1, R2, and R3 based on the following requirements:
R1 needs to support 29 hosts
R2 needs to support 56 hosts
R3 needs to support 11 hosts
arrow_forward
Q1: Based on the information in the graphic shown, design a network addressing
scheme that will supply the minimum number of hosts per subnet, and allow
enough extra subnets and hosts for 70% growth in all areas without using VLSM.
Circle each subnet on the graphic and answer the questions below.
Ft. Worth
1000 Hosts
Address class
Custom subnet mask
Router
S 0/0/1
F 0/0
RE
Router
D
Minimum number of subnets needed
Extra subnets required for 70% growth +
(Round up to the next whole number)
Total number of subnets needed =
IP address 112.0.0.0
S 0/0/0 S 0/0/1/
F0/0
$ 0/0/0
$0/0/1
Number of host addresses in the largest subnet group
Number of addresses needed for 70% growth in the largest subnet +
(Round up to the next whole number)
Total number of address needed for the largest subnet =
Start with the first subnet and arrange your
F0/1
sub-networks from the largest group to the smallest :
Subnet 1: IP address range for Dallas
Subnet 2: IP address range for Ft. Worth
Subnet 3: IP address…
arrow_forward
19. ARP is used for:
O packet path determination
O finding of a mapping IPV6 → MAC address
O finding of a mapping IPV4 → MAC address
O finding of a mapping IPV4 → TCP address
arrow_forward
CSMA/CA(carrier sense multiple access/collision avoidance) is the mechanism for random access control for wireless LAN (IEE 802.11) instead of CSMA/CD(carrier sense multiple access/collision detect) , give 3 reasons why CSMA/CD is not used by IEE 802.11
arrow_forward
77.
arrow_forward
Computer Science
Reference Network Diagram
Use the reference network diagram below to answer the following questions.
Private Network
Public Internet
Firewall Y
Switch
Router
Firewall X
Gaming Website
www.game.com
Web Server Email Server VPN Server
Semi-Private Network
(Consider the reference network diagram above)
Assuming the private network is created using private IP addressing, which of these could be valid network addresses for the private network?
Select all which apply.
O 172.25.25.0/24
O 100.10.1.0/16
O 192.168.0.128/25
O 160.10.0.0/24
(Consider the reference network diagram above)
Suppose Host-C just got connected to the private network. How can Host-C be assigned an IP address to become a part of the private network?
Select all which apply.
O The host cannot obtain an IP address after the network is set up and is operational.
O The IP address of the host can be assigned as a static configuration.
O A DNS server can assign a dynamic IP address for the host.
O A DHCP server…
arrow_forward
Task 1: Subnetting a Class B Address: The network ID of the Class B address is 139.45.0.0. You need to subnet this network into eight subnets using the shorthand method
arrow_forward
TRUE/FALSE
6. A work group VLAN may be constructed only if the individuals' workstations are physically located on the same floor in a building.
7. Subnetting allows a network to be divided into smaller units by using the network default masks.
8. Masking process to create/identify subnets is not necessary if classless addressing is used.
9. IPv4 provides 32 bits of addressing but IPv6 provides 128 bits of addressing.
10. Network management is a set of functions to control, plan, allocate, deploy, coordinate, and monitor network resources.
arrow_forward
A=32, B=33, C=34, D=35
x1, y1, z1 are the interfaces for the router gateway, while x2, x3, y2, y3, z2, z3 are for the router interface
Find the Routing Table R1, R2, and R3 using the following table!
Destination
Next Hop
Interface
With the Routing Table that you have specified in point a, which path will PC1B take when communicating with PC2B and PC3B
In theory there is a routing table for Network Address 0.0.0.0 with a Subnet Mask of 0.0.0.0, explain the function of this routing table?
Does the image network require routing at point c? Why?
arrow_forward
Lab – Routing
Objective
Learn and practice routing using Node and Express.
Specification
Create a web server that
Accepts and processes request messages submitted from browser, and
Generates and sends response messages back to browser for display.
Your web server must be able to handle
URL with hostname and port
Request message URL: 0.0.1:3000
Response message: “SUCCESS!”
URL with hostname, port and path echo
Request message URL: 0.0.1:3000/echo
Response message: “SUCCESS! echo”
URL with hostname, port, path foxtrot and route parameter value kilo
Request message URL: 0.0.1:3000/foxtrot/kilo
Response message: “SUCCESS! Received kilo via foxtrot” where the value kilo must be retrieved via the route parameter
Invalid/unexpected URL
Request message URL: 0.0.1:3000/<any other value>
Response message: “FAILED! Fix your URL.”
Hostname 127.0.0.1 can be replaced by localhost.
Port number 3000 can be replaced by any other port number that is from 1024 (2^11)…
arrow_forward
Availability is the capacity of network to take change in size and load.
A) True
B) False
arrow_forward
Question 3
: An educational institution has an access network
whose operating parameters are as follows:
▪ access link to originating servers' rate: 15.4 Mbps
RTT from institutional router to server: 2 sec
▪
▪
▪
.
3.1.
You are requested to provide the performance of the institutional access
network in terms of
• LAN utilization
*
•
Web object size: 100K bits
Average request rate from browsers to origin servers: 150/sec
average data rate to browsers: 45.0 Mbps
Institutional access network speed: 1Gbps.
Note: Assume that the requests from the web client to the originating web servers are of the
order of 2GB of data on average.
3.2.
Access link utilization
End-to-end delay from the access network to the origin servers.
Assuming that the institution would like to install a web cache in its access
network with a cache hit rate is 0.65, you are asked to recompute the new
performance of the access network in terms of:
3.2.1.
3.2.2.
3.2.3.
LAN utilization
Access link utilization
End-to-end…
arrow_forward
Use this figure as a reference, if the values are A, B, C and D (3rd octet) with the following conditions:• Value A = 37• Value B = 38• Value C = 39• Value D = 40X1, y1, z1 are the interfaces for the router gateway, while x2, x3, y2, y3, z2, z3 are for the router interface
a. Find the Routing Table R1, R2, and R3 using the following table!
Destination
Next hop
Interface
arrow_forward
Assignment 5:
Both TCP and UDP are widely used IP transfer layer protocols. For applications requiring reliable transfers, TCP is generally preferred, while applications that value throughput more than reliability are best served using UDP. Most TCP/IP stacks provide both protocols, so the application can use whichever transfer protocol is more appropriate, even changing from one to the other as desired. Rather than rely solely on TCP, the network system developer might want to investigate the trade-offs related to use of UDP. Based upon the analysis list out why Some TCP/IP Applications Use UDP?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- Cloud Computing:arrow_forwardDesign your own network Requirements: 1 Routers Configured with basic configuration 1 Switches Configured with Vlan10, within this switch 5 PC is connected (172.168.20.0/28) 1 Switches Configured with Vlan200, within this switch 2 PC is connected (192.168.50.0/29) PC from VLAN 10 should be able to Connect to PC in VLAN 200 and vice versa Both Router and Switch should have these properties. Name R1[Your Initial], S1[Your Initial], S2[Your Initial] Banner [Put your name] Passwords use this as a password to all CPENET2EXAM You can decide for other Ip addresses and VLAN Needed All configurations should be documentedarrow_forwardMore administrator knowledge is required for configuration, verification, and troubleshooting when we are using the Dynamic Routing True False Static routes Disadvantages is consuming less bandwidth than dynamic routing protocols. No CPU cycle is used to calculate and communicate routes True False Static routes are advertised through the network, which increases security True Falsearrow_forward
- One of the following is consider an advantage of static routing. No intervention is required to maintain changing route information Configuration of static route is error-free O The path a static route uses to send data is known Static routes scale well as the network growsarrow_forwardassume that T = aarrow_forwardFigure 1: Traffic Engineering with Open Flow Figure 1 reveals a network where the traffic flowing from the first host which is attached to router u to the server which is attached to router z needs to be routed along the path u.v.w.z while the traffic flowing from the second host attached to router x router to the server which is attached to router z needs to be routed along the path x.w.y.z. Please describe the local flow table of each of the switches uvxw.y,z (in terms of match and action rules) to enable the routing of the two traffic flows according to the constraints described above. The following IP addresses will be used for the two hosts and the server. • The first host belongs to the subnetwork 10.1.0.0/16. It is attached to router U and has an IP address of 10.1.0.1 • The second host belongs to subnetwork 10.5.0.0/16. It is attached to router X and has an IP address of 10.5.0.1 match IP Src = 10.3.*.* IP Dst = 10.2.*.* The server belongs to the subnetwork 10.11.0.0/16. It is…arrow_forward
- sWin an international IT solutions company, is launching 11 new branches in a new country where they currently have no existing branches. The sWin CIO has asked that each subnet should host at least 2000 devices. sWin has obtained a network address of 10.11.0.0/17.This address needs to be subnetted further and the CIO has decided that the internal subnet mask will be /21 The company’s subnet plan allows for: Router Pool: 2 router interfaces for each subnet – the last 2 IP addresses from each subnet. Managed Network Device Pool: The first 64 IP addresses are reserved for switches and other network devices Server Pool: The first 64 IP addresses following the Managed Network Device Pool are reserved for servers. Workstation Static Pool: The first 16 IP addresses following the Server Pool are reserved for Workstations that require static IP addresses. Workstation DHCP Pool: The remaining IP addresses are reserved for automatic IP configuration. You have been asked to use subnet 10 for…arrow_forwardTask 2: Access Control Lists You will need to work out which interface on which router this needs to be applied to. Each ACL must work and be seen to work. Stop any IP address from 10.0.0.128 to 10.0.0.191 from pinging 123.123.123.123 - yet allow all other addresses Creating an ACL that meets the above 'selected' criteria Proving that a change of IP address, other than those allocated to the PC's also demonstrates the operation of the ACL. Also prove that you are still able to ping to 99.0.0.2 irrespective of device IP addressarrow_forwardTask 1: Subnetting a Class A Address: The network ID of the Class A address is 37.0.0.0. You need to subnet this network into for subnets using the shorthand methodarrow_forward
- Computer Science Scenario A Company ABC needs to build a simple network in new branch office with the following characteristics: 2 workstations 1 switch 1 server IP address 192.168.1.1 until 192.168.1.3 Draw a network design for this network using all information in Scenario A above. All the devices must be labeled and assign the suitable IP address for the respective device. (You are NOT required to use packet tracer) The email communication is done via three protocols in general. Explain in detail the THREE (3) protocols.arrow_forwardCisco Router A Network with id: 192.168.0.0 and subnet mask 255.255.0.0 is given to you to split it in such a way that the following classrooms are given adequate number of IPs based on their needs. Each classroom will occupy its own subnet. The following information for each subnet must be included: Subnet ID CIDR Subnet Mask First IP usable in the subnet Last IP usable in the subnet Broadcast IP Address for the subnet Classroom1: 8 PCsClassroom2: 400PC and 4 PrinterClassroom 3: 2 PCsClassroom4: 62 PCs and a ServerClassroom5: 24PCsarrow_forwardOne of the Dynamic Routing Advantages is Router resources are used (CPU cycles, memory, and link bandwidth) O True False There are some of Disadvantages of Dynamic Routing one of them Protocols automatically react to the topology changes True O Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education