Preview

NT2640 Lab 7 SC

Satisfactory Essays
Open Document
Open Document
2232 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2640 Lab 7 SC
NT2640:Unit 7 Labs

Detailed Lab Step Answers: 49 answers

Step 2.
FastEthernet0/0 192.1.1.129
Serial0/1/0 192.1.1.2

Step 6.
It will put them on both interfaces due to the IP address. Fa 0/0 and Serial 0/0/1

Step 8:

R2 is directly connected to 192.1.1.128/26 & 192.1.1.0/26
It learned a route from R1 on 192.1.1.64/26

Step 10:

R1 is directly connected to 192.1.1.0/26 & 192.1.1.64/26
R1 has learned a new route from R2 on 192.1.1.128/26

Detailed Lab Step Answers:

Step 2.

FastEthernet0/0 10.1.0.1/30
Serial0/0/0 10.50.0.1/28
Serial0/1/0 10.51.0.1/28

Step 3.

It will probably use 10.51.0.1 because it is a higher address.

Step 4.

Router ID 10.51.0.1

Step 11.

FastEthernet0/0 10.1.0.1
Serial0/0/0 10.50.0.1
Serial0/1/0 10.51.0.1
Loopback0 1.1.1.1

Step 12.

I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface

Step 13.
R1 1.1.1.1

Standard ACL’s Lab
Topology for Lab

Table Lab Equipment Configuration

Router Name
FA0/0 Address
S0/0 Address
LO0 Address
GAD
192.168.1.1/24
192.168.2.1/24
172.16.1.1/24
BHM
192.168.3.1/24
192.168.2.2/24
N/A
The enable password for both routers is ciscopress.
The routing protocol for both routers is RIP.

Table Host IP Address, Subnet Mask, and Gateway Configuration

■ Plan, configure, and apply a standard ACL to permit or deny specific traffic.

■ Test the ACL to determine whether it achieved the desired results.

Background/Preparation

The company’s home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. You will implement standard ACLs as a simple and effective tool to control traffic based

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    You have remote access to host11. You will not have remote access to host12 because it is already configured and there is nothing for you to do to with it. Both host11 and host12 use DHCP on their first interface (eth0). This interface is used by the lab environment and should not be modified. Both host11 and host12 are unable to communicate over this interface.…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…

    • 1103 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 1

    • 30 Words
    • 1 Page

    NT1210 Lab 1.3 Caleb Waldemar 12/9/2014 Exercise 1.3.1 Byte 1=25, Byte 2= 233 Exercise 1.3.2 Byte 1 and 2= 6633 Exercise 1.3.3 120 MB= 125829120 Bytes Exercise 1.3.4 16GB and word size of 32 bits. Number of words= 536870912 Exercise 1.3.5 Binary 110110^ 2= Hexadecimal 36 Exercise 1.3.6…

    • 30 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 7 Lab 1

    • 753 Words
    • 4 Pages

    On NYC-VS1 desktop Click Start, and in the Start Search box, type C:\WUA7\64bit_rep.jpg and press Enter. Review the report, after reviewing close the window.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Lab 4.1

    • 666 Words
    • 3 Pages

    4.2.4 Explain that non-disjunction can lead to changes in chromosome number, illustrated by reference to Down…

    • 666 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sec 572 Week 4 Ilab

    • 944 Words
    • 4 Pages

    * Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC Use the IP addresses indicated on the network topology page. Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use <Ctrl>V to paste the commands and output results into your Lab Document.…

    • 944 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    Is the computer network node the software uses when the ip address does not match any routes of the routing table.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays

Related Topics