Preview

LAN/WAN Topology

Better Essays
Open Document
Open Document
1805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAN/WAN Topology
LAN/WAN Topology and Configuration Plan

Introduction
This document presents an overview of the different configuration challenges, methods, and techniques required to implement a Local Area Network (LAN) and Wide Area Network (WAN). These are useful technologies that securely connect multiple LANs in separate geographical locations. When properly configured these networking technologies provide robust features, increased data transfer speeds, and secure data connectivity required by today’s companies.
Discussed is the use of Access Control Lists, Virtual Private Networks (VPN), Network Address Translation (NAT), Protocol Address Translation (PAT), IPv6, Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Point-to-Point (PPP), Frame Relay, and Internet Protocol addressing schemes. Included are descriptions, configurations, implementation plans, and various debug commands to help administrators pinpoint and resolve connection issues.
WAN Layout
There is considerable planning required when connecting multiple geographically distant sites to create a WAN topology with security at the top of the list. The existing LAN topology, legacy equipment, incorporating new equipment, budget restraints, and security concerns help dictate the network structure. Circuit-Switched or Packet-Switched connection technologies are cost-effective options. Internet Service Providers (ISPs) used shared routes with other companies to distribute data. A secure (and expensive) method of inter-connecting locations are leased and dedicated lines. For example, an MPLS (T1) circuit is a secure, scalable choice for connecting two sites with diverse protocols and legacy equipment, but expensive because it is available only to the organization leasing the equipment and path lines.
Access Control Lists
Deciding how to implement system ACLs is determined by organizational needs. ACLs allow or prevent specified IP addresses, subnet masks, TCP, and UDP



References: Chin, J. (2004, Apr. 30). Cisco Frame Relay Configurations. Retrieved from http://www.ciscopress.com/articles/article.asp?p=170741&seqNum=10 Empson, S. (2013). CCNA Routing and Switching Portable Command Guide (Third ed.). Indianapolis, IN, US: Paul Boger. Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.1. (n.d.). © 2010 Cisco Systems, Inc. . Odom, W. (2013). Official Cert Guide Cisco CCENT/CCNA ICND 100-101. Indianapolis, IN: Cisco Press. Shinder, D. (2004). Comparing VPN Options. Retrieved from http://www.windowsecurity.com/articles-tutorials/firewalls_and_VPN/the

You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Distributed systems originally referred to a computer network that was physically and geographically located. Now the term is used to describe a process that run on a several systems and are interacting with each other by a physical…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at the LAN-to-WAN Domain level.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 5. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    References: Hallberg, B.A. (2010). Networking: A beginner’s guide (5th ed.). New York, NY: McGraw-Hill. https://portal.phoenix.edu/classroom/coursematerials/it_230/20130715/OSIRIS:45023271…

    • 576 Words
    • 3 Pages
    Good Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    A router is a piece of equipment that has different functionality. The first functionality that we will need from the router is the actual routing function, which sends the data to the desired workstation or other piece of equipment. The next functionality to look for when choosing a router is a built in firewall, and port forwarding. These two functions go hand in hand with each other, the firewall stops intrusions on ports that are not opened or forwarded and forwarding sends open ports to the computer that runs the server or services for the opened ports. The last functionality to look for is the ability to run a VPN; the VPN is the way in which we will actually connect our wide area network together. There are other functionalities to look for in a router such as DynDns, MAC Address Filtering, and many more. What we have chosen to use in the construction of this network is going to be the now that we have discussed the…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Wireless technology has grown to include additional communication media such as satellite communication connections and infrared laser communication. Within the wireless technology is the Local Area Networks. When a wireless hub or router is employed, the LAN can become a WLAN. The definition of a LAN is a computer network that interconnects computers within a limited area. LAN’s are prevalent in an office setting, schools, and within a home. A LAN is in contrast with a WAN or Wide Area Network, due to its limited area of coverage. A WAN is a computer network that covers a much larger area, such as a metropolitan area. KFF’s new WAN will employ leased lines to connect the network of computers. Businesses often use WANs to relay data between employees, customers and suppliers regardless of geographical location. Many businesses use the Internet as the backbone for their…

    • 2950 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Activity 1.7.1

    • 1271 Words
    • 6 Pages

    All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.…

    • 1271 Words
    • 6 Pages
    Powerful Essays

Related Topics