Cisco Networking Configuration Project Part 1
Summary
I. Site Springfield site device and STP configurations challenges and implementation
II. Bibliography
xACME summary
The trade school in the Springfield region has developed and implemented a WAN link to integrate with all sites as follows: Worchester, Boston, Sacramento and Los Angeles, for better communication purposes. The expansion of their networks has come with some difficulties in communicating from one region to the other, due to their IP address scheme, leading configured networks are not functioning as they should. However, xACME wants to upgrade and exchange their network infrastructure to became more efficient and more productive for all users.
Springfield site device and
…show more content…
Vlans are also capable of isolating and warning others of infected routers, letting the administrator of the IT team to carefully take action into the scene before it infects its users.
Site technology and solutions
I choose the devices needed for the new implementation: Cisco Catalyst 6500 router and 2800 series four switches will be utilized. Here is the cost of effective access switches that are capable of VLAN, DTP, DHCP, RSTP, PoE, and furthermore, price can range from $1,400-$3,500 dollars each. These switches offer integrated security including network control and quality service, they also offer redundancy to provide and deliver intelligent services for a networking edge. Therefore, they include flexibility in the routing series as increased port density which could induce a rapid growth in networks without any additional cost at any time. However, the more capacity a device may have the more beneficial it will be to the administrator user, when setting up any secure measures throughout the configuration process of vlans and networks. The network accessibility will be ensured throughout the provision of redundancy of routers throughout the xACME network on each site or trade school. Although, optic fiber cables will be used to connect all layer 2 and 3 switches and servers, spanning tree protocol will be set on switched to address to eliminate any bridging loops from entering into any
The entire building will share one internet access connection, which is a T-1 link from Verizon. A T1 link is one of the most common Internet access connections used by small businesses. T-1 Link is very fast, consistent and protected. It runs with a bandwidth speeds of 1.5Mb (WordPress.com). That speed is enough to achieve and complete essential business functions. Security is definitely a must and big concern that has to be taken into consideration when design networks, whether it is a business or a home network. Building a network in a university, we have to protect students and employee’s data as well as any intellectual property that college has on the servers and computers. Additional, there are other considerations for each lab, classroom, office, and the library including the capability to print and
* Assist in planning new software installation for security and any new routers and switches
Identify hardware and software needed to secure your choice of networks against all electronic threats.
Rob Pettigrew is the manager of technical systems and help desk center of Wyoming Medical Center in Casper, Wyoming. Protecting networks are getting harder as there are different types of devices being used by companies. An example of this is Wyoming Medical Center has four different classifications of PCs, PCs in the hallways for the staff to use, PCs at the nursing stations, PCs in offices, and PCs on that move between patient rooms. Pettigrew deployed Novell ZenWorks to 850 of the medical centers 900 PCs to ensure each one has the right software. With having multiple applications, medical software systems, and the different machine types, and restrictions make it difficult for Pettigrew to ensure proper protection for the network. Another concern is the
Task 2 Problem is network Security .In the company network, I designed the external network and internal network security, In Internal we will use the cisco Layer 3 switch can be divided into different vlan, the departments to separate vlan. For example, accounting department vlan can only account department staff to access the accounting department server files other
To overcome the problems mentioned above we can use the concept of authentication servers. These authentication servers are used to define the VLAN membership with the help of the user id rather than the older methods where MAC addresses or IP addresses are used. This greatly enhances the integration levels with the network operating system and provides more flexibility. The most valued advantage of the authentication servers is that the VLAN which the user uses can be carried anywhere without any respect to the workstation or
It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless.
The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.
The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.
When designing a WAN, numerous factors must be considered. Organizations attempting to connect multiple factories or offices and remote personnel must take into account a number of variables that will impact overall costs and network functionality. When designing and implementing wide area networks (WANs) that integrate voice, video,
Main Building – will require 7 computer stations with the most recent version of Operating System to ensure compatibility and networking capabilities between each stations and the ability to communicate between the two locations. They will require three servers, one for web hosting, one for database management and one for emergency failure of any one server. These stations should be networked to communicate with one another for proper data connection especially in the event of any one computer station crashing. Each work station will need to be linked to each server for web hosting and data backup. The cabling used for inside the main building should be 100Base TX cat 5 UTP, for Wi-Fi and WLAN with guest access that is highly secure and reliable, we recommend a device that is capable of supporting up to 15 different users with 450 Mbps. There needs to be 4 printer services in this building. Printer 1 should have
VLANs or Virtual Local Area Networks are logical local area networks that extend beyond the traditional LAN architecture. Because a VLAN is a logical entity, creating and configuring a VLAN is done completely in software. The advantages to using this type of LAN include but are not limited to the ability to conserve the network resources, to bridge geographical drawbacks, and to better manage the movement of personnel and equipment. To understand the need for VLANs you must first understand the Local Area Network (LAN). The definition of a LAN started as a group of computers that were connected in the same area, but today’s LAN is defined as a single broadcast domain. This is explained easily by looking at a large organization where each department would be on a separate LAN found behind a router or switch. With today’s expanding networks it has become important for these
Cisco Systems, a Global leading company that manufactures and markets Internet Protocol (IP) equipment, uses routers to send digital and voice data over the Internet. Founded in 1984 by three former Stanford University Students, Cisco first found early success by targeting Government agencies, Universities, and the Aerospace industry. In 1998, Cisco began targeting big businesses and other agencies. Cisco did their Initial Public Offering (IPO) in 1990. However, disagreement between founding partners led to two of the founding members parting ways with the company. In 1994, Cisco suffered another major setback: “Cisco’s
The three main switches at this site do not have VLAN databases making it difficult for switches to store VLAN data, ID and name. Therefore, there will be a configuration of VLAN database. Also, any students can bring their device and connect to one of the switch ports on the switches and get access to the network to prevent that, port security will be implemented on the switches.
WLAN (Wireless Local Area network) and its components: The task of developing a WLAN on commercial front possesses a greater challenge. Developing initial design, purchasing and installing components, managing and providing maintenance to the systems are the main basic parts of the WLAN. When we use WLAN on a commercial front then we may face the security and privacy concerns. The total area of that particular commercial area should be accessible. This is only possible with installing huge number of access points. The various components of the WLAN are