Preview

Documents NETW206 W2 Ilab Report

Satisfactory Essays
Open Document
Open Document
708 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Documents NETW206 W2 Ilab Report
Implementing a Small Network Lab (15 points)
Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and just as important, how you feel it will benefit you in your academic and professional career. (3 points)

Copy and paste the following screenshots from your Implementing a Small Network lab below.
Task 1, Step 5: Paste a screenshot showing the sequence of commands that you used to configure the management VLAN on NYCORE1. (1 point)

Question: A switch is a Layer 2 device and so forwards frames based on the MAC addresses of source and destination devices. Why are we assigning an IP address to a switch?

*Hint* Read and study the explanations within the lab for assistance. (2 points)

Task 1, Step 14: Paste a screenshot showing the sequence of commands that you used to configure interfaces fa1/0/1 on switch NYCORE1. (1 point)

Question: What is the purpose of the command switchport port-security max 1 that was issued on this port?

*Hint* Read and study the explanations within the lab for assistance. (2 points)

Task 1, Step 19: Paste a screenshot showing port security that you enabled on switch NYCORE1. (1 point)

Question: According to the security output, what action will be taken by the switch in the event that it detects the attachment of an unauthorized device?

*Hint* Read and study the explanations within the lab for assistance. (2 points)

Task 1, Step 26: Paste a screenshot showing the successful ping of the NYEDGE2 Loopback0. (1 point)

Question: Which network can be accessed by two paths? Why?

*Hint* Read and study the explanations within the lab for assistance. (2 points)

Managing Remote Access Sessions Lab Grading Rubric

Category
Points
Description
Section 2
Managing Remote Access Sessions: 15 points
Task 1: Steps 5 and 6
Related Explanation or Response
Task 1: Step 14
Related

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (20 points) , In this lab I was able to implement and troubleshoot ACLs. In working through this lab, I learned how to create an extended access list to deny specific Telnet traffic. I did this by applying the access list to multiple interfaces and used show commands to verify the access list syntax. I then verified that the access list worked by generating different types of traffic. I was able to practice troubleshooting skills by copying a problematic list from the TFCP server and used show commands in order to discover why the new access list did not work. At the end of the lab, I reconfigured the access list so that it would work in the way that it was intended to…

    • 601 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NETW202 W7 Lab

    • 916 Words
    • 3 Pages

    Task 1, Step 12: Console into NYCORE1. Check the ARP cache to find the MAC address that is mapped to: 10.1.1.1 (the second address value varies depending on which pod you were assigned for your iLab). (1 point)…

    • 916 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pm 586 Week 4

    • 686 Words
    • 3 Pages

    Use the network diagram below and the additional information provided to answer the corresponding questions. [15 points]…

    • 686 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    E4.20: Give an instruction to configure the pins 7, 5, 1, and 0 of port B for…

    • 900 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    W4 Hw Ev

    • 534 Words
    • 3 Pages

    Use the network diagram below and the additional information provided to answer the corresponding questions. [13 points]…

    • 534 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It-321 - Project 2 Script

    • 791 Words
    • 4 Pages

    switchport mode trunk int fa1/0 no shutdown exit int fa1/0.1 encapsulation dot1q 1 ip address 172.16.1.1 255.255.255.0 no shutdown exit int fa1/0.10 encapsulation dot1q 10 ip address 172.16.10.1 255.255.255.0 no shutdown exit int fa1/0.20 encapsulation dot1q 20 ip address 172.16.20.1 255.255.255.0 no shutdown exit vlan 10 name Accounting exit vlan 20 name Marketing exit int fa0/1 switchport mode trunk no shutdown exit int fa0/2 switchport mode trunk no shutdown exit int fa0/3 switchport mode trunk no shutdown exit int vlan 1 ip address 172.16.1.4 255.255.255.0 no shutdown ip default-gateway 172.16.1.1 int…

    • 791 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Memo

    • 675 Words
    • 3 Pages

    References: Skill Port. (2013). Control Fundamentals and Security Threats [Multimedia]. Retrieved from Skill Port, BSA/210 website.…

    • 675 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. Use the Work with TCP/IP Network Status (NETSTAT *CNN) command to verify that the following entries appear in the NETSTAT output file. If you cannot find these entries, then you must restart iSeries NetServer. ** netbios>001:27:44 Listen ** netbios>000:00:01 *UDP ** netbios>000:00:00 *UDP ** netbios>000:30:57 Listen ** cifs>427:49:42 Listen…

    • 1166 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Ccna-Voice Voip

    • 907 Words
    • 4 Pages

    Configuring a Router-Based DHCP Server RTR# configure terminal RTR(config)# ip dhcp excluded-address 172.16.1.1 172.16.1.9 RTR(config)# ip dhcp excluded-address 172.16.2.1 172.16.2.9 RTR(config)# ip dhcp pool DATA_SCOPE RTR(dhcp-config)# network 172.16.2.0 255.255.255.0 RTR(dhcp-config)# default-router 172.16.2.1 RTR(dhcp-config)# dns-server 4.2.2.2 RTR(dhcp-config)# exit RTR(config)# ip dhcp pool VOICE_SCOPE RTR(dhcp-config)# network 172.16.1.0 255.255.255.0 RTR(dhcp-config)# default-router 172.16.1.1 RTR(dhcp-config)# option 150 ip 172.16.1.1WAN_RTR(dhcp-config)# dns-server 4.2.2.2 Setting the Clock of a Cisco Device with NTP WAN_RTR# configure terminal WAN_RTR(config)# ntp server 64.209.210.20 WAN_RTR(config)# clock timezone Cairo +2 Installing CME Files into Flash Memory…

    • 907 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    802.1x CISCO ACS

    • 1730 Words
    • 9 Pages

    Step-by-step Guide for Configuring Cisco® ACS server as the Radius with an External Windows Database Table of Contents: INTRODUCTION: ....................................................................................................................................... 2 GETTING STARTED: ................................................................................................................................ 3 STEP-1: INTERFACE CONFIGURATION ............................................................................................. 4 STEP-2: NETWORK CONFIGURATION ...............................................................................................…

    • 1730 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Ss7 Config

    • 627 Words
    • 3 Pages

    -------- == Starting SS7 linkset on span 1 Huh?! Got FISU in link state 1 --- SS7 Down --- MTP2 link up (SLC 0) Received out of sequence MSU w/ fsn of 1,…

    • 627 Words
    • 3 Pages
    Satisfactory Essays

Related Topics