W2.8Performance Assessment- VLSM

docx

School

ECPI University, Manassas *

*We aren’t endorsed by this school

Course

202L

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

29

Report

Uploaded by sidorelakollcaku

Performance Assessment – VLSM This Performance Assessment will assess your understanding of the first two Packet Tracer Guided Practices for this week. You will be performing similar tasks but using different equipment with less direction. In this Performance Assessment you will be connecting and configuring a small subnetted network with multiple routers. You will use Packet Tracer in this Performance Assessment. Task 1 – Adding and connecting devices You will start with the network shown below in the packet tracer file. You will connect to the CSU-DSU later. For now, select the network below and drag it to the corner of your Packet Tracer desktop. You will be using three 4331 routers instead of three 4321 routers. You will need to perform the same tasks you did previously in the Guided Practice (add serial modules, connect them together using serial cables, label each, etc.). Drag and drop the rest of the equipment for the network onto the desktop. There will be three 3560 switches , four PCs, two servers, a WRT300N wireless router and a smart phone in addition to the three routers. Update the labels of each device to be your studentID followed by the type of device.
Connect the devices the same way you did previously in the Guided Practice. Take a screenshot of your network labeled and connected. Deliverables for Task 1 Screenshot of your network labeled and connected.
Task 2– Configure the network Look at the table below. This is a standard network connection grid that you will be using in the future for all of your network programming. Notice we are using different subnet masks on the routers- we will be using VLSM (Variable Length Subnet Mask), a technique that allows network administrators to divide an IP address space into subnets of varied sizes, rather than dividing it into subnets of the same size. System Port Connect To IP address Subnet Mask Clock Rate User s <studentID>-R1 G0/0/0 CSU-DSU 11.0.0.51 255.255.255.0   G0/0/1 Wi-Fi Router 172.16.51.1 255.255.255.252 1 S0/1/0 R2 10.51.2.1 255.255.255.252 500000 S0/1/1 R3 10.51.2.10 255.255.255.252 <studentID>-R2 G0/0/0.1 0 Sw1 192.168.51.233 255.255.255.248 5 G0/0/0.2 0 Sw1 192.168.51.241 255.255.255.248 5 S0/1/0 R3 10.51.2.5 255.255.255.252 500000 S0/1/1 R1 10.51.2.2 255.255.255.252 <studentID>-R3 G0/0/0.1 0 Sw2 192.168.51.1 255.255.255.128 120 G0/0/0.2 0 Sw2 192.168.51.129 255.255.255.192 60 G0/0/0.3 0 Sw2 192.168.51.193 255.255.255.240 25 G0/0/0.4 0 Sw2 192.168.51.225 255.255.255.240 10 S0/1/0 R1 10.51.2.9 255.255.255.252 500000 S0/1/1 R2 10.51.2.6 255.255.255.252 Once you configure all the interfaces in the table above, run a show ip interface brief on each router to show each one configured. Take a screenshot of each. Configure the clock rate for the DCE ends of each link between the routers. Take a screenshot of each. Assign Server1 and Server2 static IP addresses. The PCs and Wi-Fi Router will use DHCP that you will configure on Server1 in the next task.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Configure the VLANs and trunks on the switches. The S1 switch will have VLANs 10 on Fa0/1-11 and VLAN 20 on Fa0/12-24. G0/1 and G0/2 will be trunks (make sure to add switchport trunk encapsulation dot1q command before the switchport mode trunk command). The S2 switch will have VLANs 10 on Fa0/1-11 and VLAN 20 on Fa0/12-24. G0/1 and G0/2 will be trunks (make sure to add switchport trunk encapsulation dot1q command before the switchport mode trunk command). The S3 switch will have VLANs 30 on Fa0/1-11 and VLAN 40 on Fa0/12-24. G0/1 and G0/2 will be trunks (make sure to add i command before the switchport mode trunk command). Don’t forget to add VLANs 30 and 40 on the S2 switch.
Let us verify the switches are configured with the VLANs and trunks on each switch in the running- configuration with a show running-config command. Scroll down to the bottom of each switch to show the trunks configured. Take a screenshot of each. Here is an example of the S1 switch.
Deliverables for Task 2 Screenshots of show ip interface brief for each router showing configured interfaces.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshots of clock rate configured on the R1, R2 and R3 routers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot of show running-configuration on the S1, S2 and S3 switches showing VLANs and trunks.
Task 3– Configure routing using RIPv2 In this task you will connect the R1 router to the CSU-DSU of the Internet network, configure dynamic routing on the R1, R2 and R3 routers using RIPv2 and then test connectivity. Connect G0/0/0 of the R1 router to the CSU-DSU with a straight-through cable. Take a screenshot.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Configure RIPv2 on the R1, R2 and R3 routers and take a screenshot of each. Below is an example of RIPv2 configured on R3. You should now be able to ping from your routers to the Internet server. Ping 11.1.1.10 from the R1, R2 and R3 routers. Take a screenshot of each. Let’s take a look at our routing table of the R1, R2 and R3 routers. Take a screenshot of each. What do R, C and L stand for in the routing tables? Deliverables for Task 3 Screenshot of G0/0/0 of the R1 router connected to the CSU-DSU with a straight-through cable. Ping from the R1, R2 and R3 routers to the Internet server.
Screenshot of R1, R2 and R3 routing tables.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Answer the question: What do R, C and L stand for in the routing tables?
R: Stands for "Route" or "Routing." It indicates information about a specific route or path in the routing table. This entry includes details such as the destination network, next-hop address, and associated parameters. C: Stands for "Connected." This designation signifies a directly connected network. In a routing table, a connected route is automatically established for each directly connected network interface on the device. L: Stands for "Local." It denotes a local address on the device. In the context of a routing table, an "L" entry typically refers to the loopback interface or the device's own IP address. Task 4 – Configuring DHCP In this task you will configure DCHP pools on Server1 of your network. Your PCs and Wi-Fi Router will use DCHP and the servers should have static IP addresses you configured in task 2. Below is an example of the DHCP pools on Server1. Make sure to add the ip helper-address command to your interfaces on the R1 and R3 routers. Reference the previous Guided Practice for this and creating your DCHP pools on Server1. Take a screenshot of your DCHP pools on Server1 and your PCs with IP addresses via DHCP. Below is an example of PC1.
Deliverables for Task 4 Screenshot of your DCHP pools on Server1. Screenshot of your PCs with IP addresses via DHCP.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Task 5 – Configuring SSH and Telnet You will now set up SSH and Telnet communications on your routers. This is the typical way network administrators set up their systems so they can communicate to each router from a central location. Otherwise you will need to physically travel to each router with your laptop and a console cable.
You will set up SSH for communications across the network. You will need to do the following for the R1, R2 and R3 routers on your network. Below is an example for the R1 router. 1. Create a secret password on the R1 router and create a domain and logon username. 3. Now we are going to create the crypto key for the SSH session. 4. Now enable SSH version 2, set time out duration and login attempt time on the router. 5. Enable VTY lines and configure access protocols. Testing Connectivity Ping from PC1 to the R2 router. Take a screenshot.
Now SSH from P2 to the R2 router. Take a screenshot. Telnet from PC4 to R1. Take a screenshot.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
What are some differences between SSH and Telnet? Why should you use SSH and not Telnet? Deliverables for Task 5 Screenshot of ping from PC1 to the R2 router.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Screenshot of SSH from PC2 to the R2 router. Screenshot of Telnet from PC4 to the R1 router.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Answer the questions about Telnet vs SSH: What are some differences between SSH and Telnet? Why should you use SSH and not Telnet? Security: SSH (Secure Shell): Provides secure, encrypted communication over a potentially unsecured network (e.g., the internet). Encrypts the entire session, including usernames, passwords, and transmitted data. Telnet: Sends data in plain text, making it susceptible to eavesdropping. Lacks encryption, posing significant security risks. Authentication: SSH: Supports various authentication methods, including passwords, public-key authentication, and multi-factor authentication, offering robust security options. Telnet: Relies on simple username and password authentication, which can be easily intercepted or compromised. Port: SSH: Typically uses port 22 by default. Telnet: Traditionally uses port 23 by default. Connection Type: SSH: Provides both remote shell capabilities and secure file transfer (SFTP, SCP). Telnet: Primarily used for remote shell access but lacks secure file transfer capabilities.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Protocol: SSH: Uses the secure SSH protocol. Telnet: Uses an unencrypted protocol. Use Cases: SSH: Ideal for secure and confidential communication, especially in environments where data integrity and confidentiality are critical. Telnet: Used in scenarios where security is not a concern, or for troubleshooting and testing purposes in controlled, secure environments. SSH is recommended over Telnet due to its robust security features, encryption capabilities, and support for various authentication methods. It ensures the confidentiality, integrity, and authenticity of transmitted data, making it a more secure choice for remote communication and file transfer over potentially unsecured networks. Task 6 – DNS In this task you will be using DNS that is configured on the Internet Server where there are three DNS a records configured. What is a DNS A record? The "A" stands for "address" and this is the most fundamental type of DNS record: it indicates the IP address of a given domain . For example, if you pull the DNS records of cloudflare.com, the A record currently returns an IP address of: 104.17. 210.9. A records only hold IPv4 addresses. Go to PC3 and open a command prompt. Ping 11.1.1.10 and then server.com. Take screenshots. Finally bring up a Web Browser and put server.com in the URL box. Take a screenshot.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Deliverables for Task 6 Screenshot of ping from PC3 to 11.1.1.10 and server.com Screenshot of Web Browser using server.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help