Your topology will have 3 sites (Waterloo, Kitchener and Guelph)
Ask Expert

Be Prepared For The Toughest Questions

Practice Problems

Your topology will have 3 sites (Waterloo, Kitchener and Guelph)

Design Requirements

The following is a list of design requirements that would be typical in any organization. Your design and implementation must incorporate these requirements.

Topology

Your will use a single IP address with a /28 CIDR (IP address will be assigned at the end of this document)

Your topology will have 3 sites (Waterloo, Kitchener and Guelph)

Each site will have 1 Access router

Each site will have 1 Edge Router

Each Edge router will use EIGRP to update routing information between each other and authenticate using MD5

Each Edge router will be daisy chained together. For example

o Edge router A will be connected to the Access Router at Site A and Edge Router B.

o Edge router B will be connected to the Access Router at Site B and Edge Router C.

o Edge Router C will be connected to the Access Router at Site C

The access router at each site will be the gateway for all computers in their respective site

All network devices will be configured with a Message of the Day banner.

All network devices will be configured with a Privileged Mode password.

All Network device consoles will be configured to force login.

All passwords to network devices will be encrypted service passwords.

All switches will allow ssh login using local accounts.

SITE A

Routing updates between the Access router and the Edge router must:

o Use Secure Authentication 

o Use EIGRP (With Loopback network)

o Not Use Auto Summary

Remote ssh login to the Access router and the Edge router must authenticate using a Tacacs Server 

There must be a Web Server (With a custom Home page) on this network

The site will have three layer 2 switches connected to each other (SW1 to SW2 to SW3 to SW1) without causing a network loop.

o For this site you will identify, configure and document:

The Root Bridge

The Root Ports

Designated Ports

Blocking Ports

Port Costs

SITE B 

Routing between the Access router and the Edge Router must:

o Use OSPF with Authentication

The Edge router must securely redistribute routing information between SITE A and SITE B

Access router and the Edge router must authenticate using a Radius Server for logging in remotely with Secure Shell.

o Radius Server will be connected to one of the VLANS

Each switch will have 2 identical VLANs 

Two PCs will connect to each Layer 2 switch and will be on separate VLANs.

The Radius Server will be on one of the VLANs

Each layer 2 switch will have two computers connected it, one on each VLAN

You will connect the Layer 2 switches to a layer 3 switch and configure VLAN Trunking and Inter VLAN Routing 

The computers connected to each switch must:

o Be able to contact the other computer on the same switch.

o Be able to contact computers on the other switch.

o Be able to securely and remotely login into each network device in the site.

o PING all devices on the entire network (will not work until all routing is configured)  

SITE C

Routing between the Access router and the Edge Router must:

o Use RIP 

The Edge router must securely redistribute routing information between SITE A and SITE C

The Access Router will have 3 separate but directly connected Subnets

The computers connected to the Access Router must:

o Be able to contact the other computers on the same router.

o Be able to contact computers on the other sites.

o Using local authentication, be able to securely and remotely login into each network device in the site.

o PING all devices on the entire network (will not work until all routing is configured)

Remote management will be configured on each network device at the site and will use local authentication.

Deliverables

The following describes what you must submit for this assignment.

Create and upload a professionally written and formatted project document that includes the following (you may use the lab book template and modify as required if you wish):

Description of the project

Requirements – what your network is going to do

Design – write-up of how you are going to meet the requirements. Include items such as Networks, Routing protocols and their purposes, objects, interfaces and their purposes, etc. This should not be a list of commands. Rather it should be a description from which you can determine what commands are required to meet the design. For example, Routing protocol used will perform updates between devices or sites by… . 

A topology schematic that includes all nodes, names, connections, IP addresses, etc. Use lab schematics as a guide. The use of Visio is recommended.

Upload all running-config files

Upload your packet tracer files

You will create a video presentation demonstrating functionality and explaining the entire build process. 

Your video should be between 12 and 15 minutes in length and must record your image while giving the demonstration.

Your video should demonstrate that your build matches your design (i.e. demonstrate that you have created and configured components as per your design).

Your video should also demonstrate that your build works properly (i.e. demonstrate that all policy requirements have been met).

Hint
Engineering"Network Design ProposalBased on the design requirements provided, the following network design proposal is suggested.IP Addressing Scheme:The network will use a single IP address with a /28 CIDR block. This will provide a total of 16 IP addresses, of which 1 will be reserved for the network address, 1 for the broadcast address, and 1 for the gateway address, leaving a total of 13 usabl...

Know the process

Students succeed in their courses by connecting and communicating with
an expert until they receive help on their questions

1
img

Submit Question

Post project within your desired price and deadline.

2
img

Tutor Is Assigned

A quality expert with the ability to solve your project will be assigned.

3
img

Receive Help

Check order history for updates. An email as a notification will be sent.

img
Unable to find what you’re looking for?

Consult our trusted tutors.

Developed by Versioning Solutions.