Network design and troubleshooting
A computer network differs in the transmission media used to carry their signals, the communications protocols to organize network traffic, the network’s size, topology and organizational intent. Mostly, communications protocols are layered on other more specific or more general communications protocols, except for the physical layer that directly deals with the transmission media (Naiksatam et al. Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, fax machines, and use of emails and instant messaging applications. The topology used is Star. Security Protocols are:- VLAN and ACLs. IP needed : 23 • Prefix: /27 • IP address Range: 192. 94 • First host IP : 192. 65 • Network ID: 192. 65 • Broadcast ID: 192. 94 • Subnet mask : 255. 174 • Subnet mask : 255. 128 After creating these major department we need to create one more department called DMZ where we will going to establish the devices like web server, an email server.
Department number (5): DMZ Zone Need: firewall, web server, mail server, and other server devices. • IP address : 192. 182 • First IP address: 192. • Created VLAN • VLAN names designed • IP addressing dividing into multiple parts. • Subnetting in local area network and Supernetting (VLSM) for the outside the network. • Firewall and created the security rules for the connections. Configuration Design: Network design and configuration is done using the concept of CCNA (Routing and switch) and CCNA security. We have used Cisco packet tracer 2. Justification for the use of any technologies/protocols. The Technologies that has been used in this network design are VLAN only. VLAN means Virtual Local Area Network which can say or kind of a filter or security mechanism. But in the networking world, VLAN is always considered as technology (Petite, 2018).
In this Design, VLAN plays a major role because it separates the same network into multiple segments. Create a plan for the enhancement of the network. This requires establishment of a delivery plan with tasks and obligations that enhances distribution of the data between links. This gives a certain degree of assurance to the network administrator. In maintenance, it is important to check whether the suggested rules and regulation are followed by everyone. In a network administration there are specific protocols and user agreements that must be understood by all participants (Petrescu-Prahova et al. Access control list for DMZ. an extended access list is considered to protect the DMZ network Router #config terminal Router (config)#access-list standard 2 permit ip 192. 255 any Router (config)#access-list standard 2 deny ip any any Router(config)#interface fa0/0 Router(config-if)#ip access-group 2 in Also an outbound extended access list is required to specify which traffic can enter the DMZ network.
Traffic entering the DMZ network will be coming from either the Internet or the corporate network requesting World Wide Web services. To configure an outbound extended access-list specifying that World Wide Web requests be allowed into the network. An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). Subnetting further divides the host part of an IP address into a subnet and host address (<network><subnet><host>). It is called a subnet mask because it is used to identify network address of an IP address by performing a bitwise AND operation on the netmask. A Subnet mask is a 32-bit number which masks an IP address, and divides it into network address and host address.
128 • DMZ zone -255. 240 A firewall is a network device used for controlling network security and access rules. Firewalls are configured to reject access requests from unrecognized sources while allowing actions from recognized ones. A DMZ is a fire wall which is a physical or logical subnet that separates an internal local area network (LAN) from other networks, especially the internet. External-facing servers, resources and services such as emails and DNS are located in the DMZ hence, they are accessible from the internet. Available at: https://www. zdnet. com/article/dmzs-for-dummies-5000297743/ (Accessed: 6 August 2019) Muhammed Zen Samsona Hadi, ST, (2011) Access Control list [online]. Available at: http://zenhadi. lecturer. D. , Sherwood, R. W. , Dhami, M. S. S. Patent 9,860,820. Petrescu-Prahova, C. , Kern, C. , Anderson, E.
From $10 to earn access
Only on Studyloop