IP Services in a Medium Enterprise Network | My Assignment Tutor

WSC-ASSICTNWK506-V1.2-06032019 Page | 1International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MAssessmentICTNWK506Configure, Verify and Troubleshoot WAN Links andIP Services in a Medium Enterprise NetworkWSC-ASSICTNWK506-V1.2-06032019 Page | 2International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MAssessment Task RequirementsYou are required to complete and pass every task in the assessment in order to be deemedcompetent.Assessment ScheduleDue dates are subjected to the unit commencement week. TaskDue DateTask 1Week 2Task 2Week 4 WSC-ASSICTNWK506-V1.2-06032019 Page | 3International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MAssessment Task 1Submission Details of AssessmentThe assessment task is due on the date specified by your assessor. Any variations to thisarrangement must be approved in writing by your assessor.Save your completed work with the following naming procedure:Name_StudentID_UnitCode_TaskNumber (e.g. JohnSmith_123456_BSBSUS501_T1)Submit your assessment to WSC Moodle.Purpose of the AssessmentThis task requires you to demonstrate the underlying knowledge necessary to configure,verify and troubleshoot WAN links and IP services in a medium enterprise network.Assessment DescriptionBased on instructions from your trainer, learning materials, your own study and/or onlineresearch, answer following questions.Ask your trainer for further guidance on assessment requirements, submission procedureand/ or timeline.Instructions1. Describe the basic operation and configuration of internet protocol version 6 (IPV6)?2. Research and define below listed router setup and operations: ACLs Router calling line identification (CLI) configuration Router debug commands3. Describe typical problems that can occur with WAN links installation and how to troubleshoot. Provide relevant solution for the problems.4. Explain the operation and benefits of using dynamic host configuration protocol (DHCP).WSC-ASSICTNWK506-V1.2-06032019 Page | 4International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MWhat your assessor will be looking for as evidence:Evidence checklist: Evidence MUST be SubmittedTick off Items WhenSubmitted Completed written questionnaire. WSC-ASSICTNWK506-V1.2-06032019 Page | 5International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MAssessment Task 2 ProjectSubmission Details of AssessmentThe assessment task is due on the date specified by your assessor. Any variations to thisarrangement must be approved in writing by your assessor.Save your completed work with the following naming procedure:Name_StudentID_UnitCode_TaskNumber (e.g. JohnSmith_123456_BSBSUS501_T1)Submit your assessment to WSC Moodle.Purpose of the AssessmentThe purpose of this assessment is to enable students to demonstrate their skills andknowledge in configuring, verifying and troubleshooting WAN links and IP services in amedium enterprise network.Assessment DescriptionThis task requires students to install, configure and troubleshoot WAN links in a mediumenterprise, to configure and verify IP services on a router and to secure a network usingrouter services.WSC-ASSICTNWK506-V1.2-06032019 Page | 6International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MInstructionsPlease read the following scenario and background information before completing theassessment tasks:TopologyWSC-ASSICTNWK506-V1.2-06032019 Page | 7International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MIP Addressing Table DeviceInterface IP AddressSubnet MaskDefaultGatewaySwitch PortR1FA0/1 192.168.1.1255.255.255.0N/AS1 FA0/5S0/0/0(DCE)10.1.1.1255.255.255.252N/AN/AR2S0/0/0 10.1.1.2255.255.255.252N/AN/AS0/0/1(DCE)10.2.2.2255.255.255.252N/AN/AR3FA0/1 192.168.3.1255.255.255.0N/AS3 FA0/5S0/0/1 10.2.2.1255.255.255.252N/AN/APC-ANIC 192.168.1.3255.255.255.0192.168.1.1S1 FA0/6PC-CNIC 192.168.3.3255.255.255.0192.168.3.1S3 FA0/18 Required Resources 3 routers 2 switches (Cisco 2960 or comparable) PC-A (Windows 7 or later) PC-C (Windows 7 or later) Serial and Ethernet cables as shown in the topology Rollover cables to configure the routers via the consoleBackgroundVPNs can provide a secure method of transmitting data over a public network, such asthe Internet. VPN connections can help reduce the costs associated with leased lines.Site-to-Site VPNs typically provide a secure (IPsec or other) tunnel between a branchoffice and a central office. Another common implementation that uses VPN technology isremote access to a corporate office from a telecommuter location such as a small officeor home office.In this lab, you build a multi-router network and configure the routers and hosts. You useCisco IOS and SDM to configure a site-to-site IPsec VPN and test it. The IPsec VPNtunnel is from router R1 to router R3 via R2. R2 acts as a pass-through and has noknowledge of the VPN. IPsec provides secure transmission of sensitive information overunprotected networks such as the Internet. IPsec acts at the network layer, protectingand authenticating IP packets between participating IPsec devices (peers), such asCisco routers.Note: The router commands and output in this lab are from a Cisco 1841 with Cisco IOSRelease 12.4(20)T (Advanced IP image). Other routers and Cisco IOS versions can beused. See the Router Interface Summary table at the end of the lab to determine whichinterface identifiers to use based on the equipment in the lab. Depending on the routerWSC-ASSICTNWK506-V1.2-06032019 Page | 8International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690Mmodel and Cisco IOS version, the commands available and output produced might varyfrom what is shown in this lab.Note: Make sure that the routers and the switches have been erased and have nostartup configurations.Required Resources 3 routers 2 switches (Cisco 2960 or comparable) PC-A (Windows 7 or later) PC-C (Windows 7 or later) Serial and Ethernet cables as shown in the topology Rollover cables to configure the routers via the console Diagram, Network design documentationPart AEach question in this part of the assessment requires you to produce writtenexplanations or documentation using MS Word. Submit all documents, as listed in theevidence checklist (below) to your assessor by the due date.1. Prepare a set of guidelines explaining how to prepare for an ICT job according towork health and safety (WHS) codes, regulations and standards. Includereference to the relevant legislation, regulations, codes and standards.2. Arrange access to the site as per organizational procedure.3. Review the existing network design documentation (‘scenario and backgroundinformation’ provided above) to ensure that it is current and complete. Documentany changes required.4. Select and document network elements required to be installed to meet technicalrequirements.5. Send email to contact vendors and service suppliers to obtain the specificationsand determine the availability of the identified components.Also, give a follow-up call to your vendor/ supplier (your assessor) to confirm yourinquiry. Write summary of discussion.6. Develop plans, with prioritised tasks and contingency arrangements, forinstallation of components with minimum disruption to client.7. Discuss with your manager (your assessor) and obtain approval for the plansincluding security and timing. Provide evidence of your approval.WSC-ASSICTNWK506-V1.2-06032019 Page | 9International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MPart BFor each question in Part B, you must take a screenshot and/or provide a writtenexplanation as evidence of completion. You must also keep records of any issues orproblems that arise, for use in troubleshooting in Part E.Submit all documents, as listed in the evidence checklist (below) to your assessor by thedue date.1. Determine different methods for connecting to a wide area network (WAN).Discuss it with your manager (your assessor) and write discussion summary.2. Configure and verify a basic serial WAN configuration3. Configure and verify at least two WAN protocols.4. Determine and explain virtual private network (VPN) technology and documentthe VPN technology you implemented.5. Configure and verify a site-to-site VPN. Document the steps taken for:o Configure IPsec VPN settings on R1 and R3o Verify site-to-site IPsec VPN configurationo Test IPsec VPN operation6. Determine asymmetric digital subscriber line (ADSL) technology.Discuss it with your manager (your assessor) and write discussion summary.7. Configure and verify an ADSL connection. This can be achieved on anysupported router in given topology (R3 is proposed router).Part CFor each question in Part C, you must take a screenshot and/or provide a writtenexplanation as evidence of completion. You must also keep records of any issues orproblems that arise, for use in troubleshooting in Part E.Submit all documents, as listed in the evidence checklist (below) to your assessor by thedue date.1. Determine the operation and benefits of using dynamic host configurationprotocol (DHCP) and discuss it with your manager (your assessor). Write yourdiscussion summary.WSC-ASSICTNWK506-V1.2-06032019 Page | 10International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690M2. Configure and verify DHCP operation on a supported router (R3 is proposedrouter).3. Implement static and dynamic addressing services for hosts in a local areanetwork (LAN) environment.Document the hosts static and dynamic addressing services you used.o Screen Shot of any interface’s IP configuration could be the evidence forstatic addressing services.o Screen Shot of, dynamically assigned IP, to client could be the evidencefor dynamic addressing services. (Such as PC-C getting dynamic IP fromDHCP on R3)4. Determine the basic operation of network address translation (NAT)Document which operation of NAT you performed and discuss it with yourassessor (This could be demonstrated with ADSL or IPSec configurations).5. Configure NAT for given network requirements. As above, provide evidenceusing screen shot for configured NAT.6. Implement and verify NAT in a medium sized enterprise branch office network.Provide evidence as screenshot and/or descriptions of how you have done it.7. Discuss the basic operation and configuration of internet protocol version 6 (IPv6)with your manager and write summary of discussion.Part DFor each question in Part D, you must take a screenshot and/or provide a writtenexplanation as evidence of completion. You must also keep records of any issues orproblems that arise, for use in troubleshooting in Part E.Submit all documents, as listed in the evidence checklist (below) to your assessor by thedue date.1. Determine the purpose and types of access control lists (ACLs) and discuss itwith your manager (your assessor). Write summary of discussion.2. Configure and apply ACLs based on network filtering requirements3. Configure and apply ACLs to provide secure access to the routerPart EFor each question in Part E, you must take a screenshot and/or provide a writtenexplanation as evidence of completion.WSC-ASSICTNWK506-V1.2-06032019 Page | 11International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690MSubmit all documents, as listed in the evidence checklist (below) to your assessor by thedue date.1. Troubleshoot WAN implementation issues identified in Part A – D2. Rectify WAN problemsDocument the steps taken to troubleshoot and rectify WAN issues3. Write issues identified and solutions implemented to rectify these issues.Part F1. Write a reflection journal outlining what you have learnt while doing all the aboveactivities.What your assessor will be looking for as evidence:Evidence checklist: Evidence MUST be SubmittedTick off Items WhenSubmittedPart APlan and prepared for the wide area network (WAN) linkinstallation taskEvidence of arranging access to siteRecord of required changes to network documentationDocumentation of required network elementsRecord of contacting suppliers and suppliers aboutrequired componentsPlan for installation of componentsEvidence of plan approval.Part B WSC-ASSICTNWK506-V1.2-06032019 Page | 12International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690M Screenshot showing WAN link configured and verifiedScreenshot showing two WAN protocols configured andverifiedScreenshot showing site-to-site VPN configured andverifiedEvidence site-to-site VPN configured and verifiedExplanation of asymmetric digital subscriber line (ADSL)technologyScreenshot showing ADSL connection configured andverifiedPart CScreenshot showing DHCP operation on a routerconfigured and verifiedScreenshot showing implementation of static anddynamic addressing services for hosts in a local areanetwork (LAN) environmentDocumentation of static and dynamic addressingservices for hosts in a local area network (LAN)environmentExplanation of basic operation of network addresstranslation (NAT)Screenshot showing configuration of NAT for givennetwork requirementsExplanation of configuration of NAT for given networkrequirementsScreenshot showing implementation and verification ofNATDocumentation of implementation and verification of NATPart DExplanation of the purpose and types of access controllists (ACLs) WSC-ASSICTNWK506-V1.2-06032019 Page | 13International College of Australia Pty Ltd T/A Western Sydney CollegeRTO: 45360 | CRICOS: 03690M Screenshots showing configuration and application ofACLs based on network filtering requirementsScreenshots showing configuration and application ofACLs to provide secure access to the routerPart EEvidence of troubleshoot and rectify WAN issuesDocumentation of solutions to issuesPart FSubmitted completed journal

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *