TASK back to top There are Ten tasks to complete in this assignment. There are 30 marks in total. Using Packet tracer implement the following tasks based on the network topology of a small business...

1 answer below »
attached file below


TASK back to top There are Ten tasks to complete in this assignment. There are 30 marks in total. Using Packet tracer implement the following tasks based on the network topology of a small business given below. Smart Univ Ltd has three branches: Albury, Bathurst and Wagga site. Each site has Admin Office to manage the local business. Wagga site has three buildings where has two major departments: Student group and Staff . Its Wagga office controls the  connection between the Internet server and Internet Service Provider (ISP). Examine the network requirements and complete the following questions to make the company network service running. You must submit your answer file in word or pdf and TWO packet tracer files to EASTS by the due date. Please use your last 4 digits of your student ID as the first two octets of your network address. Keep other bits same as what are shown in the addressing table and the figure below. For example,  MY student ID is 11692721, using the last 4 digits (2721). your main network address will be 27.21.0.0.  Addressing Table   Device Interface IP address Subnet Mask Default Gateway VLAN ISP S1 10.10.10.1 255.255.255.0                    N/A S2 xx.xx.40.1 255.255.255.0 N/A F0/1 209.163.100.1 255.255.255.0 N/A Router Wagga S1 xx.xx.50.1 255.255.255.0 N/A S2 xx.xx.40.2 255.255.255.0 N/A F0/0.10 xx.xx.10.1 255.255.255.0 N/A F0/0.20 xx.xx.20.1 255.255.255.0 N/A F0/0.30 xx.xx.30.1 255.255.255.0 N/A F0/0.99 xx.xx.99.1 255.255.255.0 N/A Router Albury S1 xx.xx.50.2 255.255.255.0 N/A S2 10.10.10.2 255.255.255.0 N/A F0/0 xx.xx. 89.1 255.255.255.0 N/A Student group 1 F0/0 xx.xx.10.11 255.255.255.0 xx. xx. 10.1 10 Staff 1 F0/0 xx.xx.20.11 255.255.255.0 xx. xx. 20.1 20 Admin office 1 F0/0 xx.xx.30.11 255.255.255.0 xx. xx. 10.1 30 Student group 2 F0/0 xx.xx.10.12 255.255.255.0 xx. xx. 10.1 10 Staff 2 F0/0 xx.xx.20.12 255.255.255.0 xx. xx. 20.1 20 Admin office 2 F0/0 xx.xx.30.12 255.255.255.0 xx. xx. 30.1 30 Student group 3 F0/0 xx.xx.10.13 255.255.255.0 xx. xx. 10.1 10 Staff 3 F0/0 xx.xx.20.13 255.255.255.0 xx. xx. 20.1 20 Admin office 3 F0/0 xx.xx.30.13 255.255.255.0 xx. xx. 30.1 30 Admin office 4 F0/0 xx.xx.89.11 255.255.255.0 xx.xx.89.1 89 Server 209.163.100.3 209.163.100.1 Native VLAN 99 You need to use Packet Tracer to implement the given topology and to complete the following tasks:  Part A: Switching and VLANs (20 marks) 1. It is quite important to lock down access and install strong security features on PCs and servers. It is important that your network infrastructure devices, such as switches and routers, are also configured with security features. What is the best practice to prevent mac address flooding attack? ( 3 marks)  2. Port security allows you to restrict a port’s ingress traffic by limiting the MAC addresses that are allowed to send traffic into the port. Please advise your solution to improve the switch 1 port security. (2 marks) 3. Configure four VLANs as required on the switch and enable Trunking on switch. (4 marks) 4. Configure inter-VLAN routing on Router wagga based on the Addressing Table. (3 marks) 5. Configure RIPv2 on each router to build up full connectivity between each site to ISP and Internet server. (3 marks) 6. Verify connectivity by making sure all the PCs can ping the Internet server and ISP (2 marks) (Screen shots required)  7. When a packet arrives on a router interface, the router examines the IPv4 header, identifies the destination IPv4 address, and proceeds through the router lookup process. Please analyse the routing process of routers in the case of ping from Student group 1 to the Internet server. (3 marks) Please save your configured packet tracer file with the name of "PT_11692721_partA" Part B Network Security (10 marks) 8. In order to improve the network performance and security, ACLs is recommended. Please explain what is the ACL? (3 marks)  9. How to block the student group to visit ISP? Please write down the ACL statement(s) accordingly and apply ACL on Router (3 marks) 10. Issue a “show ip access-lists” command on the appropriate device and justify the output based on your understanding. (4 marks) Please save your configured packet tracer file with the name of "PT_11692721_partB"
Answered Same DayAug 29, 2021

Answer To: TASK back to top There are Ten tasks to complete in this assignment. There are 30 marks in total....

Amit answered on Sep 04 2021
144 Votes
64244/64244.docx
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 9/4/2020
Table of Cont
ents
1.    Part -A: Switching and VLANs    3
2.    Answer 1    3
3.    Answer 2    3
4.    Answer 3    4
5.    Answer 4    5
6.    Answer 5    6
7.    Answer 6    8
8.    Answer 7    10
9.    Part - B: Network security    11
10.    Answer 8    11
11.    Answer 9    11
12.    Answer 10    12
1. Part -A: Switching and VLANs
2. Answer 1
The attack which is mainly caused on the implemented network switches through the maintained MAC table structure is called MAC flooding. There are many practices which can be used for prevention of this attack and some are explained below:
· Improving port security: This is one of the best practice which is commonly followed to prevent this attack. The limit to MAC address configuration for connected hosts is set by this technique. A separate and secured MAC address is also maintained by this technique to counter measure this attack.
· Implementing AAA server based authentication: The implemented AAA server makes authentication of all MAC addresses with subsequent filters for prevention of this attack.
· The use of 802.1X suite filters can also prevent this type of attack.
· The implementation of additional filters to all incoming uni-cast packets can also help in prevention of this attack.
3. Answer 2
The port security is very important to the implemented...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here