Autumn 2020 300575 Networked Systems Pur-pose 1
300575 Networked Systems Pur-pose:
Netoperation Pur-pose Eatables 2020S1
DUE DATE: Friday 5 June 2020 by 17:00 (Patience via vUWS)
Autumn 2020 300575 Networked Systems Pur-pose 2
Overview and Objectives
In this eatables you conclude pur-pose an operation flake netoperation using the skills and referableice gained in this
portio and its prerequisites. This eatables is referable a trite job. To full it as outlined with whole the exactd
documentation conclude be a suggestive job.
The eatables scenario describes in open stipulations, the netoperation that is to be pur-poseed. Controlthcoming the
scenario, the eatables is domesticated into a reckon of minoritys (phases), each of these phases has a constructive
list of capabilitys. It is influential to interpret and recognize each capforce to gain confident that the eatables
is fulld precisely.
The controlthcoming jobs are exactd to full the eatables:
• Pur-pose the netoperation using the diagram and cognate capabilitys
• Simulate and experiment the netoperation using the netoperation vaunter dupe Cisco Packet Tracer (v7.2.1)
• Correctly cast sepaadmonish area OSPF protocol
• Correctly cast VLANs and 802.1q stocking
• Correctly cast PPP and PPPoE
• Correctly cast DHCP
• Correctly cast GRE
• Correctly cast NAT and PAT
• Fashion and everyot admittance manage lists on the misspend marchrs and interfaces
• Verify that whole contours are operational and functioning according to the scenario managelines
• Get documentation and contour betters as constructive in the controlthcoming minoritys and phases.
Autumn 2020 300575 Networked Systems Pur-pose 3
Scenario
Introduction
MegaCon is a corporation naturalized in the Campbelltconfess area. Recently, they possess opened another aspect at
Parramatta which conclude be reasond to prop a reckon of engineers. Accordingly the engineers are frequently
required at customer aspects, they are expected to be operationing detached from the Parramatta duty greatly of the duration.
The concern has enunciateed speedyly; a examination of concept has been fashiond, the infrastructure pur-pose has been
calculated and further engineers possess been hired to flake the consequence. This fantastic artifice conclude exact a larger
subsidence control day-to-day skill as polite-behaved-behaved as a reckon of close amalgamateions among abode subsidences of
newly appointed staff.
It is your job to analyse whole the capabilitys and to enunciate a recital that specifies the implementation of the
requirements, subscription realistic alternatives where practicable (Final Recital). This recital conclude be reasond as the basis
control a redeveloped netoperation as MegaCon grows.
Your conclude be exactd to coast experiment the pur-pose to get a “examination of concept” to enconfident your disconnection conclude cater
to MegaCon’s wants. This is an influential tread accordingly it is induced to recognize if the disconnection conclude operation
correctly precedently committing contractually to delivering this proposal. Coast experimenting in this contingency conclude be done with
Cisco’s software emulation lot, Packet Tracer Account 7.2.1.
Requirements
Being a growing corporation, the primal netoperation topology was imunfair a isolated marchr, switch and internet
connection. With the speedy augmentation generated through hiring enunciateers, MegaCon has managed by
purchasing attached switches and daisy chaining them to fashion a sepaadmonish lifeless network.
MegaCon’s Netoperation Capabilitys
Scalable pur-pose which conclude adapt concern disquisition.
Seamless amalgamateivity among their ocean campus at Campbelltconfess (Cam1, Cam2 and Cam3) and the fantasticly
opened duty at Parramatta (Par).
Close message to outvie storage subsidence (reached via ISP).
MegaCon’s Internet Service Getr (In-Tel) conclude be providing a WAN disconnection and conclude be supplying your class
with specific referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification and unfair contour to relieve with coast experimenting.
Technical consultants possess relieveed MegaCon in translating the aggravate netoperation capabilitys into the controlthcoming
sections, which comprehend technical capabilitys you want to conglutinate into the disconnection.
Autumn 2020 300575 Networked Systems Pur-pose 4
Minority 1: Basic Network
Figure 1: Basic netoperation diagram (projected topology)
Basic Contour Capabilitys
• Cast intention calls as shconfess in the topology.
• Disable DNS lookup.
• Disable HTTP on whole marchrs and switches.
• Enable SSH on whole marchr and switches. Reason the intention cevery as the reasonrcevery and cisco as the
password on whole intentions.
• Cast logging contemporary control the soothe and VTY lines.
• Cast a MOTD flag to alarm reasonrs that unacknowledged admittance is prohibited.
• Intention Bond
o Encrypt the unvarnished citation passwords.
o Advance collocate as the irresponsible EXEC decree belowdosed password.
o Advance cisco as the soothe and VTY passwords control login.
• Control experimenting resolves MegaCon advises their WAN getr, In-Tel, has regular clock admonish control whole external
WAN serial integrates to 128000 kbps.
• Cast the IPv4 and IPv6 discoursees as listed in the Discourseing Table.
ISP
Cam1 Cam2
Cam3
Par
NMPC
Liv
PSW
SwB
SwM
PCP
SPC
LPC
SwT
Autumn 2020 300575 Networked Systems Pur-pose 5
Topology Diagrams
When your netoperation pur-pose has been finalised you conclude be exactd to get an accuadmonish and constructive argumentative
and substantial topology diagram.
The argumentative diagram should precisely cogitate the implemented discourseing proposal.
The substantial diagram should include yet referable be scant to the controlthcoming:
• Internetworking intentions and interface details.
• Integrate networks and IP discourse referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification.
• Routing Territorys and static march details.
• Switching details and features e.g. STP, Channel Ports, VLAN referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification.
The substantial topology diagram should be full plenty to wholeow a third aspect, control model a network
contractor, to instwhole and cast the netoperation beyond any attached documentation.
Minority 2: Netoperation Discourseing
IP Discourse Proposal
MegaCon conclude be using the controlthcoming discourseing proposals:
Discourse Type Discourse Confesser
IPv4 Special Discourse Wholeocation 10.100.0.0/19 MegaCon
IPv6 Discourse Wholeocation 2001:1:10::/52 MegaCon
IPv4 Open Discourse Wholeocation 200.200.0.0/28 Must be wholeocated across Cam1 and Cam2
IPv4 ISP Point-to-point Cam1 integrate 90.1.1.0/30 ISP
IPv6 ISP Point-to-point Cam1 integrate 2001:60:1:1::/64 ISP
IPv4 ISP Point-to-point Cam2integrate 90.1.2.0/30 ISP
IPv6 ISP Point-to-point Cam2integrate 2001:60:1:2::/64 ISP
ISP Lo1 control IPv4 5.5.5.5/32 ISP
ISP Lo1 control IPv6 2001:5.5.5.5::5/128 ISP
ISP Lo2 control IPv4 6.6.6.6/32 ISP
ISP Lo2 control IPv6 2001:6:6:6::6/128 ISP
Table 2: IP discourse obstruct wholeocations
A axioms centre getr has been asked to lease some of their open discourse boundlessness control MegaCon’s axioms centre
infrastructure. In-Tel conclude get an internet collectiveness (link) through serial amalgamateions to Cam1 and Cam2 and
advertise this discourse boundlessness to the Internet. To conclude this there conclude be a static march implemented using the
point-to-point integrate open discourse boundlessness getd in Table 2.
Netoperation Specifics
• Whole marchrs, switches and PCs are dual stack intentions.
• OSPF marchr ID conclude conclude from the special IPv4 interior discourseing.
• PPPoE integrates among whole reasonrs on Eng networks and Par conclude conclude from interior discourseing. Wholeocate
discourse boundlessness and regard how this can be marchd among the network.
• Enconfident march union has been built in to the discourseing proposal control scalability.
• Gatemethod discoursees conclude be advanceed the primeval practicable discourse in each subnet control twain IPv4/6.
• Marchr interfaces control IPv6 conclude reason static integrate-local discourseing (care the discourseing isolated).
• MegaCon’s netoperation aggravateseer PC (NMPC) is substantially portioed to the switch SwM. NMPC reasons the
terminal discourse on the Skill VLAN.
Host Capabilitys
Campbelltconfess conclude reason IPv6 discoursees which are dynamically advanceed through SLAAC.
VLAN Referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification
VLSM is NOT exactd. An perseverance flag of /24 discourseing control interior IP proposal is good. Eventually,
when that is referable manageable, larger networks may be reasond.
Autumn 2020 300575 Networked Systems Pur-pose 6
Aspect VLANs Exactd
Cam1, Cam2 and Cam3 Totalitying/Marketing/Sales/Office
Par Parra Duty / Engineering
Twain aspects Native / Skill / Blackhole
Table 3: VLAN Referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification List
NOTE
Netoperation discourseing proposal should select into totality march summarisation.
Addressing Capabilitys
VLAN Host Capabilitys Augmentation
Accounting 50 Hosts Yes
Marketing 75 Hosts Yes
Sales 150 Hosts Yes
Duty 200 Hosts Yes
Skill 5 Hosts (per aspect) No
Parra Duty 40 Hosts Yes
Engineering 20 Hosts Yes
Table 4: Prevalent Host Discourseing Capabilitys
MegaCon expects that it conclude possess to eatables control doubling of the extents of most of its VLANs aggravate the contiguous couple
years.
Minority 3: Netoperation Switches
MegaCon is tender detached from their ad-hoc switch pur-pose to a further priestly and scalable pur-pose. The
deployment of the controlthcoming technologies should “forthcoming examination” the concern control further disquisition as exactd.
VLAN Capabilitys
Switch admittance ports wholeocation is three ports per VLAN per switch.
Advance VLAN 100 as the Skill VLAN and Native VLAN.
Any unassigned ports are to be placed into a “Blackhole”, an unused and non-routed VLAN (VLAN 999).
Additionally, these ports should be disabled and the vlan deleted.
Afford barely castd VLANs to be unhindered on stock integrates.
Switching Technologies
Enable speedy-PVST+ on whole switches.
Manipulate Spanning Tree to assault adregular VLANs among whole HQ switches.
Implement EtherChannel among SwM and SwB. Impartialify your valuable of EtherChannel method chosen.
Implement Primeval Hop Congeries (FHR) using HSRP on Cam1 and Cam2. Assault Adregular Active
and Standby among these couple substantial marchrs.
Minority 4: Netoperation Routing
With the pliable IP discourse proposal fashiond control MegaCon, integration of the fantasticly fashiond environment using
OSPF is to be deployed throughout.
Routing Capabilitys
Inter-VLAN Routing: Layer 3 routing at the Campbelltconfess implicit marchr and marchr-on-a-stick at Parramatta.
Summarisation to be implemented where practicable with OSPF.
OSPF Marchr IDs wholeocated from interior IPv4 discourseing.
Control best exercitation and bond reasons, needless routing updates shwhole be prevented.
OSPF Capabilitys
Cast OSPF throughout the routing territory.
OSPF routing updates and adjacencies among Sydney and Parramatta must supervene aggravate the GRE tunnel.
Autumn 2020 300575 Networked Systems Pur-pose 7
NOTE
A authoritative GRE tunnel (in Minority 5) is exactd control exchanging OSPF marchs successfully among
Parramatta and Sydney. (While preparing your implementation, you may eagerness to reason static marchs temporarily,
control experimenting resolves.)
Minority 5: Bond and Monitoring
The controlthcoming bond measures are to be imposed, control twain IPv4 and IPv6 discoursees:
Users on the Sales VLAN are referable to be unhindered to admittance any networks beyond their confess VLAN.
Users on the Engineering VLAN are unhindered to extend of reasonrs on their VLAN and the Internet.
NMPC is the netoperation aggravateseer’s PC. Enconfident that it is the barely intention which can manage
MegaCon’s marchrs and switches
NMPC should practise a log better of whole bond violations. Unauthorised attempts to amalgamate to either switch
SwT or switch SwB should be recitaled to NMPC.
Minority 6: WAN
Control congeries, an halt integrate to ISP is exactd from Cam2 Marchr. Accordingly In-Tel canreferable pledge that
its interface on this integrate conclude be getd by a Cisco marchr, MegaCon conclude possess to reason PPP with CHAP
authentication on this integrate.
To better assault balancing, this integrate must be reasond control those VLANs control which Cam2 is the Active marchr.
Misspend incompact static and lapse static routing is exactd control this implementation. The couple loopback
addresses on ISP conclude portray outvie storage, and control this drill it is equal that whole interior hosts can
successful ping these couple looptail discoursees using twain IPV4 and IPv6 discoursees.
To elucibound later integration of the Sydney and Parramatta aspects, a Implicit Special Netoperation (VPN) is calculated.
Even though the integrate among the couple aspects is a special network, a concern capforce dictates the tunnel
must be encrypted to enconfident easily-affected axioms canreferable be intercepted by any media.
Your class conclude demonstadmonish VPN technology using a GRE tunnel amalgamateing marchrs Cam3 and Parra. Thus,
addressing this explanation concern capability, and solving a intricate pur-pose end yet further influentially instilling
confidence through your technical restraintce.
To get abode reasonr admittance PPPoE conclude be implemented. Control the pretence a sepaadmonish PPPoE amalgamateion
is exactd. Eventually, the discourseing and routing should be pur-poseed to wholeow 10 concomitant PPPoE
connections (this authoritativeity can be unfoldd by LPC which is portioed to marchr Liv, In Figure 1).
To get internet amalgamateivity and open discourseing control webservers Netoperation Discourse Translation (NAT)
needs to be castd on the verge marchrs at Campbelltown. Open discourseing has been leased (see
Minority 2) and subnetted from the Axioms Centre’s open discourse obstructs. This discourse boundlessness conclude be advertised
to the Internet by In-Tel and commerce redirected tail to MegaCon’s netoperation via incompact static marchs.
WAN Capabilitys
Statically advance IP discourseing control the amalgamateing marchr’s interfaces.
Aspect to Aspect Amalgamateivity
The point-to-point VPN tunnel conclude reason special discoursees and conclude complete at Cam3 and Parra.
Enable OSPF routing to modify marchs aggravate the tunnel.
Enconfident commerce is exuberant through the tunnel interfaces referable the carriage integrate.
Netoperation Discourse Translation (NAT)
Whole intentions among MegaCon’s netoperation are expected to possess internet amalgamateivity using the ardent discourse
range with aggravateloading.
Internet is to be contrived by a looptail interface on the ISP marchr.
NOTE
NAT authoritativeity can be experimented by barely pinging the ISP looptail (inside-out).
Autumn 2020 300575 Networked Systems Pur-pose 8
Deliverables:
1. Documentation
Your documentation must be of a functional flag and yield to the controlthcoming:
• Controlmatted control A-4 paper;
• Arial font;
• Insufficiency ocean collectiveness citation font extent 10pt;
• Insufficiency diagram font extent 6pt;
• Maximum of 10 pages NOT including any Appendices.
Your documentation at a insufficiency should comprehend the controlthcoming minoritys:
• Title Page;
• Table of contents;
• Introduction;
• Netoperation Pur-pose Summary;
• Argumentative Diagram;
• Summary Discourseing Table/s;
• Netoperation Pur-pose Details – Get whole the exactd referable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableification control whole the intentions in your netoperation pur-pose
in a tabular controlm.
• Appendices comprehending
• Full intention configs
o Sepaadmonish highlighted ACLs configs control whole apt intentions with comments and descriptions
o Sepaadmonish highlighted DHCP config/s control whole apt intentions with comments and description
o Sepaadmonish highlighted NAT config/s control whole apt intentions with comments and descriptions
2. Betters to upload
A sepaadmonish zip archive better must be uploaded to vUWS on or precedently the bounded attributable bound and duration (17:00
07JUN2019).
The zip better cevery must concur to the controlthcoming convention:
Primeval cevery primal followed by terminal cevery primal followed by learner ID followed by “.zip”
Eg Kim Smith with the learner ID 12345678 would cevery their archive better “KS12345678.zip”. The zip archive
better must comprehend the controlthcoming betters:
A PDF fie comprehending your documentation, with the better cevery adhering to the controlthcoming convention:
Primeval cevery primal followed by terminal cevery primal followed by learner ID followed by “.pdf”
Eg Kim Smith with the learner ID 12345678 would cevery their documentation better “KS12345678.pdf”
Cisco Packet Tracer (v7.2.1) better/s control the eatables in the most prevalent account of Cisco Packet Tracer
(v7.2.1) controlmat. With the better call/s adhering to the controlthcoming convention:
Primeval cevery primal followed by terminal cevery primal followed by learner ID followed by “.pkt”
Eg Kim Smith with the learner ID 12345678 with couple Cisco Packet Tracer (v7.2.1) betters would cevery each better
as follows “KS12345678_1of2.pkt” & “KS12345678_2of2.pkt”.
Any better controlmat other than a sepaadmonish zip archive with a better cevery that does referable concur to the naming convention
OR that does referable comprehend the exactd betters in the bounded controlmats and betternames is NOT acceptable and conclude
possess a trace of cipher (0) automatically be awarded.
Multiple patiences conclude be wholeowed eventually barely the terminal patience conclude be assessed. Patience made
after the attributable bound and duration conclude run a price as outlined in the portio lore manage in the minority on “Late
Submission” below minority “2.6 Open Patience Capabilitys”.
You must NOT include an eatables coversheet with your upload. When uploading your patience to vUWS
you conclude testify that:
• you withwithhold a observation of this eatables if the coercionmer is obsolete or damaged,
• you hereby testify that no portio of this eatables or consequence has been copied from any other learners
operation or from any other spring exclude where attributable voucher is made in the eatables,
• no portio of the eatables/consequence has been written/produced control me by any other idiosyncratic exclude
where collaboration has been authorised by the question lecturer/tutor uneasy,
Autumn 2020 300575 Networked Systems Pur-pose 9
• you are known that this operation may be reproduced and submitted to plagiarism exposure software
programs control the resolve of detecting practicable plagiarism (Which may restrain a observation on its axiomsbase
control controlthcoming plagiarism checking.)
• you hereby testify that no portio of this eatables or consequence has been submitted by you in another
(antecedent or prevalent) duty, exclude where misspendly referenced, and with antecedent permission
from the Lecturer/Tutor/Portio Coordinator control this portio.
Autumn 2020 300575 Networked Systems Pur-pose 10
Marking Proposal:
The virtue of your deliverables conclude be evaluated with the controlthcoming rubric.
CRITERIA Unsatisfactor
y (0%)
Poor
(25%)
Good
(50%)
Very Good
(75%)
Excellent
(100%)
Network
Design/Addressin
g Proposal
25 Traces
Does referable
meet any
requirements.
Barely imunfair meets
basic
requirements.
Does referable totality
control augmentation in any
way. Inefficient
reason of available
discourse boundlessness.
Meets basic
requirements.
Accounts control
augmentation in some
way. Referable an
optimal reason of
available
discourse boundlessness.
Meets most
requirements.
Accounts control
augmentation in some
way. Efficient
reason of available
discourse boundlessness.
Meets whole
requirements.
Accounts control
augmentation in an
optimal method.
Most efficient
reason of available
discourse boundlessness.
Presentation
20 Traces
No
documentatio
n getd or
does referable
comprehend any of
the insufficiency
required
sections.
The
documentation is
isolated and referable of
a functional
standard. Hard to
interpret and
recognize or
does referable comprehend
whole of the
minimum
required minoritys.
The
documentation
contains whole of
the insufficiency
required
sections
eventually it is
simplistic and
barely imunfair of a
professional
standard. It is
hard to interpret
and recognize.
The
documentation
is of a
professional
standard, eventually its
layout is referable
optimal or it is
referable gentle to
interpret or
understand.
The
documentation
is of a
professional
standard. It is
well-behaved written
and evident with
a layout that is
gentle to interpret
and
understand.
Reason of Diagrams
10 Traces
No
diagrams
used.
Inaccuadmonish argumentative
diagram and/or
Illegible or
irrelevant
diagrams.
Accuadmonish argumentative
diagram poorly
executed.
Accurate
argumentative diagram
well-behaved executed
no other
diagrams reasond
or do referable add
to the
understanding
of the pur-pose.
Accurate
argumentative diagram
very polite-behaved
executed and
uses diagrams
that remedy in the
understanding
of the pur-pose.
ACLs
20 Traces
ACLs referable
implemente
d
ACL rule
inaccurately
defined and
applied.
ACL rule
accurately
defined yet
inappropriately
applied.
ACL rule
accurately
defined and
appropriately
applied yet referable
optimally.
Optimal ACL
rule precisely
defined and
appropriately
applied.
Packet
Tracer
Implement
and Experiment.
25 Traces
No Packet
Tracer
implement and
experiment or the
Packet Tracer
Implementatio
n does referable
match the
submitted
pur-pose or
given
requirements.
Packet Tracer
Implementation
matches the
submitted pur-pose
and ardent
requirements
eventually it is
poorly lremedy out
and referable
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
pur-pose and
given
requirements
and is polite-behaved-behaved laid
out eventually referable
further than 60%
of the exactd
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
pur-pose and
given
requirements
and is polite-behaved-behaved laid
out eventually
referable further than
80% of the
required
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
pur-pose and
given
requirements
and is polite-behaved-behaved laid
out with further
than 80% of the
required
configuration
items
configured
correctly.
TOTAL
100 Traces
Appendix 1 Tables
Sample Table A.1 IPv4 Subnetting Table
Subnet
Reckon Subnet Discourse Subnet Mask Hosts Exactd Maximum Hosts in
Subnet
Percentage
growth
In Reasons
(Yes or No)
Network
Name
Sample Table A.2 IPv6 Discourseing Table
Network
Reckon IPv6 Prefix/Prefix length
In Reasons
(Yes or No)
Netoperation Call
Sample Table A.3 Intention Interface IP Discourseing Table
Intention Interface IPv4 discourse Subnet Mask IPv6 Discourse/Prefix Length
ISP
SwT
SPC
LPC
PCP
SwM
SwB
PSW
Liv
MPC
Par
Cam3
Cam1 Cam2
ISP

Posted in Blog