Usetutoringspotscode to get 8% OFF on your first order!

Cybersecurity

Requirements:

    You will need to study the network diagram on the previous page in order to understand and interpret the physical topology. This physical topology has not been created by you, so you will need to ask questions in order to fully understand what is required from you. A list of meaningful questions will need to be written and submitted with the written part of the assignment. The questions will be answered in a 15-minutes one-to-one meeting with the client representative (your tutor).

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of PPP, eBGP and the remote access VPN. This last task is quite a challenging configuration that makes use of AAA, encryption and hashing technologies and will require good research skills and some experimentation using Packet Tracer to configure successfully.

    You need to provide a report of 1200-1600 words where you show:

o    A list of meaningful questions that you prepared for the meeting with the client in order to clarify the requirements and a rationale showing your understanding and interpretation of the requirements. Your questions should demonstrate an understanding of the technical requirements that should be considered in order to implement the technologies you will be configuring. Five questions should be asked and each question can receive a maximum of two marks, therefore a total of ten marks can be achieved for the questions.

o    A detailed IP addressing scheme for the new additions to the T1 Electro network that is carefully and clearly explained.

o    An explanation of router configurations required to meet the customer requirements and commented screenshots of testing the connections on Packet Tracer Simulator command line option. Ensure that you include a screenshot of the remote access VPN in its fully connected state, this can be achieved by using ipconfig on the remote workers PC and an appropriate Cisco CLI show command(s) on the R3 router.
For reporting on router configuration, just copying and pasting some commands is not enough. The syntax of the commands can change from one platform to another and from one manufacturer to another, it is the process that needs to be explained. You will be using Cisco router commands to explain configuration steps that can otherwise be done on any other types of routers but just with different syntax. As you will need to do some research of BGP, PPP and RA VPNs, you need to use Harvard referencing to cite your sources.

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes