Preview

NT2640 Lab 7 SC

Satisfactory Essays
Open Document
Open Document
2232 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2640 Lab 7 SC
NT2640:Unit 7 Labs

Detailed Lab Step Answers: 49 answers

Step 2.
FastEthernet0/0 192.1.1.129
Serial0/1/0 192.1.1.2

Step 6.
It will put them on both interfaces due to the IP address. Fa 0/0 and Serial 0/0/1

Step 8:

R2 is directly connected to 192.1.1.128/26 & 192.1.1.0/26
It learned a route from R1 on 192.1.1.64/26

Step 10:

R1 is directly connected to 192.1.1.0/26 & 192.1.1.64/26
R1 has learned a new route from R2 on 192.1.1.128/26

Detailed Lab Step Answers:

Step 2.

FastEthernet0/0 10.1.0.1/30
Serial0/0/0 10.50.0.1/28
Serial0/1/0 10.51.0.1/28

Step 3.

It will probably use 10.51.0.1 because it is a higher address.

Step 4.

Router ID 10.51.0.1

Step 11.

FastEthernet0/0 10.1.0.1
Serial0/0/0 10.50.0.1
Serial0/1/0 10.51.0.1
Loopback0 1.1.1.1

Step 12.

I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface

Step 13.
R1 1.1.1.1

Standard ACL’s Lab
Topology for Lab

Table Lab Equipment Configuration

Router Name
FA0/0 Address
S0/0 Address
LO0 Address
GAD
192.168.1.1/24
192.168.2.1/24
172.16.1.1/24
BHM
192.168.3.1/24
192.168.2.2/24
N/A
The enable password for both routers is ciscopress.
The routing protocol for both routers is RIP.

Table Host IP Address, Subnet Mask, and Gateway Configuration

■ Plan, configure, and apply a standard ACL to permit or deny specific traffic.

■ Test the ACL to determine whether it achieved the desired results.

Background/Preparation

The company’s home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. You will implement standard ACLs as a simple and effective tool to control traffic based

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Lab 8

    • 551 Words
    • 3 Pages

    The team also noticed some inconsistencies in the graph that they feel could be fixed by changing their code. One of these issues being that cutting off power completely from the AEV’s resulted in the motors having to do extra work in order to get started again. Possibly changing the code so the amount of power supplied to the motors gradually decreased over time instead of stopping the power completely, could make for a more efficient AEV. Theoretically speaking, when a plane begins to near its destination the pilot begins to lower the amount of thrust given to the engines, not cease thrust completely, so if the team were able to find a way to mimic this, they feel that their AEV could save energy overall, and become more productive.…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Lab

    • 361 Words
    • 2 Pages

    4. What is the significant difference in the temperature of the PC (with the processor fan) with and without the…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 472 Words
    • 2 Pages

    Fill in the blanks in the following table. Then use the table to answer the questions:…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…

    • 1103 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    1. Public Keys and Public Certificates can be stored in the Central Repository. It is not the same as the Public Key Infrastructure, but it is not the same.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 1

    • 30 Words
    • 1 Page

    NT1210 Lab 1.3 Caleb Waldemar 12/9/2014 Exercise 1.3.1 Byte 1=25, Byte 2= 233 Exercise 1.3.2 Byte 1 and 2= 6633 Exercise 1.3.3 120 MB= 125829120 Bytes Exercise 1.3.4 16GB and word size of 32 bits. Number of words= 536870912 Exercise 1.3.5 Binary 110110^ 2= Hexadecimal 36 Exercise 1.3.6…

    • 30 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 7 Lab 1

    • 753 Words
    • 4 Pages

    On NYC-VS1 desktop Click Start, and in the Start Search box, type C:\WUA7\64bit_rep.jpg and press Enter. Review the report, after reviewing close the window.…

    • 753 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Lab 4.1

    • 666 Words
    • 3 Pages

    4.2.4 Explain that non-disjunction can lead to changes in chromosome number, illustrated by reference to Down…

    • 666 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 7

    • 855 Words
    • 4 Pages

    When performing a Live Migration using the Move the virtual machine’s data by selecting where to move the items option, which of the following advanced options would be the best to choose from to ensure that the folder structure remains the same on the destination server after the LM completes?…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sec 572 Week 4 Ilab

    • 944 Words
    • 4 Pages

    * Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC Use the IP addresses indicated on the network topology page. Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use <Ctrl>V to paste the commands and output results into your Lab Document.…

    • 944 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays

Related Topics