StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Management: Lab 3 - Assignment Example

Cite this document
Summary
The tutorial discusses firewall tutorial for Cisco 3725. Two routers running simultaneously are used to demonstrate firewalls configurations. There are two terms that are succinctly defined in Cisco…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Network Management: Lab 3
Read Text Preview

Extract of sample "Network Management: Lab 3"

Network management Number: Lecturer: This paper discusses the lessons learned from the ial on firewall ial. The ial discusses firewall tutorial for Cisco 3725. Two routers running simultaneously are used to demonstrate firewalls configurations. There are two terms that are succinctly defined in Cisco routers. Inbound refers to traffic into the router while outbound refers to traffic out of the router. For example application of ACL on inbound traffic at the internal router on fa/00 implies that traffic going into the client network is affected.

On the other hand application of ACL on outbound traffic means those that are into the router and not into the client’s network.The process of setting up a router includes setting up internal and external router configs. The hostname and fa00 interface must be set up on both internal and external routers. The configuration process allows a number of activities on the router such as denying access to a specific IP address, adding a password or securing virtual terminal lines. For instance, we can deny access to 12.12.12.

15 to prevent it from accessing internal network, the configuration is as follows (Anonymous, 2012):conf t: access list 1-100 deny/permit 12.12.12.15. The number “12.12.12.15” represents the IP address to be blocked in the internal network. In the internal router configuration interface, the following line of code is inputted: Internal (Config) #access-list 1 deny 12.12.12.15. Internal (Config) #int fa0/0 Internal (Config) #ip access-group 1 inThis code denies access to traffic from 12.12.12.15 to the inbound router.

This description is for a simple firewall setup. However, there are complicated scenarios which encompass complex configurations. They are referred as extended access control list and are demonstrated in another tutorial (Anonymous, 2012). In summary, this tutorial has introduced access control list in Cisco IOS firewall. It is applicable to configuration of Intrusion Detection Systems to detect and prevent unwanted IP addresses in a network. ReferencesAnonymous. (2012). Cisco Access Control List .

Retrieved 2015, from YouTube: http://www.youtube.com/watch?v=jHW_Bv8VN94

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Management: Lab 3 Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1681577-network-management-lab-3
(Network Management: Lab 3 Assignment Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1681577-network-management-lab-3.
“Network Management: Lab 3 Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1681577-network-management-lab-3.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Management: Lab 3

Spam Detection and Categorisation and Network Protection using a Firewall

These marketing emails are normally known as junk mails which automatically move to junk email folder.... The spam reorganization report which was produced by… This is not a big threat but it does impact the organizations' image.... Organizations prevent themselves from such threats by the mean of implementing various techniques and costly solutions in order to filter Solutions are implemented by keeping in mind the cost and time constraints for the processing of emails to be filtered....
3 Pages (750 words) Lab Report

Creating WiFi Hot Spot

We shall start working by going into the network and Sharing Center via Control Panel; it can also be quickly accessed by right-clicking on the network icon in the system tray.... Once we are there, we will see the link for "Set up a new connection or network" as shown in the… A new wizard will open after clicking the link "Set up a new connection or network" that allows to connect virtual private networks, dial-up, setting up a new wireless connection and create a new ad hoc wireless network....
2 Pages (500 words) Lab Report

Engine Parameters Analysis

In the test for the engine parameters, it was found out that the temperature changes for ambient temperature, and fuel in the engine increased with time.... On the other hand, the temperatures for oil output, the exhaust, cooler in the engine, the cooler output and the oil input… The results recorded were used to calculate for the derived values such that torque was obtained as 72....
2 Pages (500 words) Lab Report

Internet Skills Checklist

It provides links to jobs, police department, contact us, the local history, city council, emergency management plan, fire and life safety.... The links include CIS-Health Informatics, computer network operations, computer programming, computer simulation, computer… The page also shows the whole department, clearly outlining the coursework provided by the department; which is a two-year associate of applied science degree programs, designed for preparation of students for jobs in the various Internet Skills Checklist due: Step 4 The following information is found under my program, computer information technology....
2 Pages (500 words) Lab Report

Traffic Statistics on the Network

The tool enables a user to study, manage and troubleshoot a real-life network infrastructure with ease.... The 16 networks cabled use the 10-baseT link hence the network speed averages at 10 Mbps.... The Traffic Statistics on the network Introduction The tool in question, Riverbed Modeler Academic Edition, is vital in mastering the fundamental concepts of network configuration.... The tool enables a user to study, manage and troubleshoot a real-life network infrastructure with ease....
1 Pages (250 words) Lab Report

Computational Exercise 3 : Cyclotron motion

Introduction:(6pts)In this lab, we were simulating the motion of the charged particle.... Write down the equation for the magnitude of the centripetal force.... Set these two equations equal to each other, and solve for the radius.... (1pt) 5 After you get the code working (you can ask… Try changing the charge strength, particle mass, and field strength one at a time....
1 Pages (250 words) Lab Report

The Dominant Operating: Microsoft Windows Platform

The first lesson learned from the first lab session was the possibility of more than two operating systems running adjacent to each other.... From the procedures in the second lab session, it was clear that Linux had a more superior boot loader, referred to as Grand Unified Bootloader (GRUB), than its alternate in windows platform.... The Image management System, one of the choices in the PXE menu, is another significant tool that The paper "The Dominant Operating: Microsoft Windows Platform" is a worthy example of an assignment on information technology....
2 Pages (500 words) Lab Report

Plastics Testing and Failure Analysis

This lab report "Plastics Testing and Failure Analysis" presents the obtained values and the observations made to the literal values using the plastic and elastomers identification chart provided the unknown samples were identified and summarized in the table below.... he lab session aimed at characterizing, testing, and identifying various plastics given that plastic properties are considerably different and are dependent on various factors like composition, thermal history, chemical structure, and manufacturing condition....
5 Pages (1250 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us