0% found this document useful (0 votes)
72 views

Assignment 2 Security Requirements

1. The document discusses security requirements for network access control lists and implementing console passwords to restrict unauthorized access. 2. It also covers quality of service (QoS) which ensures priority for key network traffic and applications. 3. Details are provided on designing the network system including IP address allocation and a local area network (LAN) blueprint.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Assignment 2 Security Requirements

1. The document discusses security requirements for network access control lists and implementing console passwords to restrict unauthorized access. 2. It also covers quality of service (QoS) which ensures priority for key network traffic and applications. 3. Details are provided on designing the network system including IP address allocation and a local area network (LAN) blueprint.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Assignment 2

Security Requirements

1. Access control List


ACL is a built-in function of IOS application that enables internet traffic travelling via IOS
devices to be filtered. Packets are used to describe network traffic. A packet contains a little
amount of data as well as all of the data needed to send it. When a switch receives a packet in
an interface, it does the following operations by default. This usual actions are completely
insecure. Anyone with the correct destination address can use the router to send their packet.
2. Implementing console password
When assigning passwords to switches, anyone without permission is unable to configure
them. This is a one-of-a-kind approach to network system security.

Quality of service

The ability of a network to deliver better service to specified network traffic through multiple
technologies is referred to as quality of service. This ensures that key programs run smoothly.
Prioritization, comprising dedicated bandwidth, regulated jitter and delay, and enhanced loss
attributes, is the fundamental purpose of QoS. Before their competition, Internet service
providers must employ technology and tactics to deliver the finest service available.
Design of network system
IP address allocation table

Work Stations IP Address Subnet mask Gateway IP address


range class
General office & 192.168.1.2 – 255.255.255.0 192.168.1.1 C
Manager office 192.168.1.4
Reception 192.168.1.5 – 255.255.255.0 192.168.1.1 C
192.168.1.7
Accounts 192.168.1.9 – 255.255.255.0 192.168.1.1 C
192.168.1.11
Administration 192.168.1.12 – 255.255.255.0 192.168.1.1 C
192.168.1.14
Workstation 192.168.2.2 – 255.255.255.0 192.168.2.1 C
192.168.2.22
Office 192.168.2.25 – 255.255.255.0 192.168.2.1 C
192.168.2.28
Project managers 192.168.2.28 – 255.255.255.0 192.168.2.1 C
room 192.168.2.30

Blueprint of LAN

.
Installing and configuring network services and application

I successfully installed Windows Server software using VMware Workstation


Design Implementation
VLANs were created for each department. The state of Switch1's VLAN may be seen in this
image.

User Feedback
Maintenance Schedule
System Maintenance Time Notice

General office and reception 8.00am – 5.00pm, Sunday, Will provide 12–24 hours,
systems. only as needed. notice when taking down
Our system.
Accounts and administrative 5.30am – 8.30am, Will provide 24 – 48 hours,
system Saturdays, only as needed. Notice when taking down
our system.
Network services and access 9.00am – 5.00pm, When a longer down time is
point. Saturdays. required, will provide 12-24
Hours, notice.
Workstations 4.00am – 8.30am, Monday, No additional notice.
Only as needed.
Pcs and printers. No weekly schedule No additional notice.
Required, only as needed.
IP Configuration

Trucking
Conduct Verification

1. Ping
The ping command is a simple way to check for connection. Ping checks for connections
by delivering ICMP echo messages to a site and waits for a reply. After awaiting for
every packet to be sent, the ping program displays the data packets being sent returned.
Each packet received is matched to the one that was sent. Four echo packets with 64
bytes of data are delivered by default. DNS resolve both for host name and the IP address
can be tested with the ping program.

2. Telnet
The term "telnet" is derived from the phrases "telephone" and "network." It was created
with the intention of allowing command line remote management across slower
connections. A TCP-based method may be used to test the connection of an array of
options. It can be used to check SMTP, SQL, and Remote Desktop connection.

3. Trace Route
The trace route program, which developed on UNIX and Cisco platforms, has been
ported to Windows. Trace route is a Global configuration utility that shows the path a
packet follows from its current location to its destination. It accomplishes this by
delivering echo response message to the target via the Internet Control Message Protocol
(ICMP).

Test Results
This image depicts workstation computers that have been successfully pinged.
Result with Telnet

Trace route result


IP configure Test Result

Functionalities

1. Firewall
A firewall is a network equipment that analyses incoming and outgoing network traffic
and determines when specific types of communication must be permitted or forbidden
according to a security procedure. For more than 25 years, firewalls were the main line
defense in information security. They serve as a barrier among internal networks that are
trusted and secure and possibly unreliable external networks.

2. Backup servers
A restoration server is made consisting of a standard hardware server with plenty of
storage space, usually with large storage disks, and a backup server program tailored to it.
A client utilities program or the host system software can be used to set the backup
schedule for each computer (OS).

3. Cloud Backup
Cloud backup is a program that allows you to use public cloud services and facilities to
create, modify, maintain, and restore information, services, or applications. This is
performed by utilizing the internet.

References

Study-CCNA.com. (2021, June 24). What is a VLAN? Study CCNA. https://study-


ccna.com/what-is-a-vlan/
Watch These 5 Trends in Wireless and Computer Networking. (2021). Lifewire.
https://www.lifewire.com/future-trends-computer-networking-4108007
Techopedia. (2020, April 23). Network Protocols. Techopedia.Com.
https://www.techopedia.com/definition/12938/network-protocols
Techopedia. (2020, August 25). Network Topology. Techopedia.Com.
https://www.techopedia.com/definition/5538/network-topology
Implementing Quality of Service Over Cisco MPLS VPNs > Introduction to QoS. (2020). Cisco
Press. https://www.ciscopress.com/articles/article.asp?p=471096
Molenaar, R. (2019, August 2). Introduction to WANs (Wide Area Network).
NetworkLessons.Com. https://networklessons.com/cisco/ccna-routing-switching-%20icnd1-100-
105/introduction-to-wans-wide-area-network/
Thakur, D. (2020, August 11). What is transmission media ? Types of transmission media.
Computer Notes. https://ecomputernotes.com/computernetworkingnotes/communication-
networks/what-is-transmission-media-and-types-of-transmission-media

You might also like