A. Analyze the network design. Choose the right system devices for project implementation by using Packet...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
A. Analyze the network design. Choose the right system devices for project implementation by using Packet Tracer. Update the physical topology map based on your ports chosen. B. Apply the right IP settings (static) on all devices. List IP setting table for all IP hosts/devices/servers. Initialized the DNS Server and Web Server (with HTTPs). Domain name: cyt115.local C. Apply switch port security to harden DNS server and Web Server switch access. Test IP connectivity between PCs/Servers and their gateways. D. Make DNS and Web services are available for all PCs. E. Design, deploy and test an ACL filter, so that 1). PC0/1/2/3 are allowed to access DNS and Web services. 2). PCO can PING DNS server and Web server. 3). PC1/2 can SSH login to GW router. 4). All rest type of IP packets from 192.168.X.0/24 network to 172.16.X.0/28 network should be blocked. (X=Group ID) PCO SwitchA PC2 PC3 Fa0/0 PC1 192.168.X.0/24 GO/0/0 ** GW GO/0/1 172.16.X.0/28 DNS Server 200 SwitchB Web Server 100 A. Analyze the network design. Choose the right system devices for project implementation by using Packet Tracer. Update the physical topology map based on your ports chosen. B. Apply the right IP settings (static) on all devices. List IP setting table for all IP hosts/devices/servers. Initialized the DNS Server and Web Server (with HTTPs). Domain name: cyt115.local C. Apply switch port security to harden DNS server and Web Server switch access. Test IP connectivity between PCs/Servers and their gateways. D. Make DNS and Web services are available for all PCs. E. Design, deploy and test an ACL filter, so that 1). PC0/1/2/3 are allowed to access DNS and Web services. 2). PCO can PING DNS server and Web server. 3). PC1/2 can SSH login to GW router. 4). All rest type of IP packets from 192.168.X.0/24 network to 172.16.X.0/28 network should be blocked. (X=Group ID) PCO SwitchA PC2 PC3 Fa0/0 PC1 192.168.X.0/24 GO/0/0 ** GW GO/0/1 172.16.X.0/28 DNS Server 200 SwitchB Web Server 100
Expert Answer:
Answer rating: 100% (QA)
I can provide assistance with the network design as described in the question by providing a general guideline on how to address each point A Analyze the network design Look at the provided network topology to ensure it meets the needs of the scenario Choose appropriate network devices routers switches and ensure that they correctly connect different network segments Ensure redundancy and scalability in the design if required B Apply the right IP settings static on all devices Assign static IP addresses to all devices subnetting the given IP ranges according to the number of hosts required per segment The devices in the 192168X024 network might have IP addresses ranging from 192168X1 to 192168X254 with the gateway GW having an interface in this range as well Similarly devices in the 17216X028 network might have IPs from 17216X1 to 17216X14 since 28 allows for 16 IP addresses in total with 2 reserved for network address and broadcast C Apply switch port security On the switches configure port security to limit the number of MAC addresses that can connect through a port preventing unauthorized access You can also configure additional features like sticky MAC or MAC address whitelisting for stricter control D Make DNS and Web services available for all PCs Ensure DNS and web server IPs are properly configured and reachable from all PCs in the network Implement appropriate routing and switching rules for connectivity between different segments E Design deploy and test ACL filter Configure an Access Control List ACL on the router to meet the specified requirements 1 Permit PC0123 access to DNS and Web services 2 Allow PC0 to ping the DNS server and Web server 3 Permit PC12 to SSH into the gateway router 4 Block all other IP traffic from the 192168X024 network to ... View the full answer
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these computer network questions
-
Pink Rose Co is a constant-growth company that pays out 44 percent of its earnings as dividends and is expected to grow at 2.21 percent. The company has a required return of 7.87 percent. Calculate...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-5. Ivan's grandfather died and left a portfolio of municipal bonds. In 2012, they pay Ivan...
-
Consider the following income statement: Fill in the missing numbers and then calculate the OCF. What is the depreciation tax shield? Sales $643,800 Costs 345,300 Depreciation 96,000 EBIT Taxes (35%)...
-
Discuss the factors that would make the heat pump described in Problem 6.47 an irreversible cycle.
-
Jessica and Matthew are running toward the point P along the straight paths that make a fixed angle of @ (Figure 1). Suppose that Matthew runs with velocity va (m/s) and Jessica with velocity 1...
-
To estimate the average number of tweets from all twitter accounts in 2015, one of the authors randomly selected 10 of his followers and counted their tweets. A biased sampling situation is...
-
Below is the comparative balance sheet for Stevie Wonder Corporation. Dividends in the amount of $15,000 were declared and paid in 2014. Instructions From this information, prepare a worksheet for a...
-
Problem #2\ Erica, Deana & Tara had average capital balances of $350,000,$380,000 and $400,000 respectively during the current fiscal year. The partnership agreement provides for an allowance of 4%...
-
Air is pumped into the steel thin-walled pressure vessel at C. If the ends of the vessel are closed using two pistons connected by a rod AB, determine the increase in the diameter of the pressure...
-
You are an advisor for a large pension fund. Real pension funds have liabilities (pensions) due at many dates in the future. For simplicity suppose that the pension fund you are advising has...
-
It is said that cost-benefit analysis (CBA) is used to evaluate public "projects." How does the textbook conceptually define a project? Does it make sense to you? Explain. Provide three examples of...
-
The assertion that is the highest risk for an auditor in auditing investments is: a. accuracy, valuation, and allocation. b. existence. c. completeness. d. presentation.
-
Describe the five-step process an auditor should apply when planning and performing an ADA.
-
Explain when payroll taxes are applied to deferred compensation under a nonqualified plan.
-
What does the following say about economists' efforts to put value on nature? Discuss. Stewardship derives from value. The reason we have jewelry boxes is because diamonds are expensive. The value...
-
Scarcity requires that people must Select one: O a. cooperate. O b.compete. c. make choices. O d. trade. Clear my choice
-
l ask this second time correnct answer is 38,01 can we look pls Consider a non-conducting rod of length 8.8 m having a uniform charge density 4.5 nC/m. Find the electric potential at P, a...
-
I. Define the purpose of an internal monitoring domain, which is an informed awareness of the state of the organizations networks, information systems, and information security defenses. II. Review...
-
True or False: PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.
-
I. Gain awareness that a template cipher or perforated page cipher is not strictly an encryption cipher but more of an example of steganography. II. Examine that ciphering is often difficult to...
-
The topological optimization is discussed in chapter 1. Here, we will consider a topological optimization problem for a chemical process plant. The layout of the chemical process plant has been shown...
-
For installation and operation of a pipeline for an incompressible fluid, the total cost (in dollars per year) can be represented as follows: \[C=C_{1} D^{1.5} L+C_{2} m \Delta p / ho\] where...
-
An adiabatic two-stage compressor is used to compress a gas, which is cooled to the inlet gas temperature between the stages, the theoretical work can be expressed by the following equation:...
Study smarter with the SolutionInn App