1 Semester 3 Threaded Case Study Royal Palm 41306-3A/3B Ip Siu Tik Tsang Man Wu Wai Hung Wong Lai Ting.

Slides:



Advertisements
Similar presentations
TCS – Sunset Elementary Pat Bruen, Conor Buckley, James Gallagher
Advertisements

Threaded Case Study on RE Miller By Aidan Coleman Paul Guilfoyle.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
Washington School District Computer Network System Threaded Case Study Jim, Jeff, Pete, Adam, Chris  100X LAN Growth  2X WAN Growth  1.0 Mbps to any.
Threaded Case Study - RE Miller (Nick Effler, Brian Ford, Cindy Coultas & Teresa Duchardt) April-May, 2000 b Project Goals Implement WAN Access to connect.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
IT. Support Networking Threaded Case Study School: R.E. Miller By: Shane Coyne. Andrea Martyn. Gary Hall. Barry Gray. Presented by: Gary Hall & Andrea.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Networking Project Ailis&Louise. General Requirements The Washington School District is in the process of implementing an enterprise wide network which.
Access Lists 1 Network traffic flow and security influence the design and management of computer networks Access lists are permit or deny statements that.
ACACIA Threaded Case Study Seamus Burns Ronan Conaghan Eugene Cullen.
Acacia Threaded Case Study Aoife McIntyre Cordelia Carty Mary Kearns.
ACACIA Threaded Case Study Presented By: Louise Maguire, Caroline Kearney, Peter Honeyman, Michael Mctague.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.

Andrew Smith 1 NAT and DHCP ( Network Address Translation and Dynamic Host Configuration Protocol )
Treaded Case Study Computer Networks 2002 Daire Sheriden Ronan Monaghan Mark Gilmore.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Cisco’s Threaded Case Study Desert View
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
CISCO PIX FIREWALL Configuration for DCSL Tuan Anh Nguyen CSCI 5234 University of Houston Clear Lake Fall Semester, 2005.
CNT-150VT. Question #1 Your name Question #2 Your computer number ##
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
Royal Palm WAN & LAN Layout and Design
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
Day 4 Security ( ACL ) , Standard Access Lists , Extended Access Lists, Named ACLs Network Address Translation (NAT), Static NAT , Dynamic NAT , PAT (Overloading)
TCOM 515 Lecture 6.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Cisco Threaded Case Study
Virtual Networking. Module Objectives By the end of this module participants will be able to: Understand the use of virtual LANs Create VLAN subinterfaces.
By H.B.O. Systems July 13, 2000 Presenters: Janet Hughes, John Banister, Karen Oliver.
LAN Design of a Local High School Martin Kucek Chris C. Yu Sandy Ramirez Cisco TCS Project – Semester 3 © 2001 Martin Kucek / Chris C. Yu / Sandy Ramirez.
Wireless Networks and the NetSentron By: Darren Critchley.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Threaded Case Study for Phoenix, AZ. School District Sunny Slope & Sunset Elementary present by Todd Thousand, Bill Siepel, and Jeff Moore.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Washington School District Project. General Requirements: Functional =7-10 Years 100X Growth in LAN 2X Growth in WAN 10X Growth in Internet Connectivity.
Desert View TCS By Charlene Cooley and Dan Austin.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Firewalls & Network Monitoring Advanced Registry Operations Curriculum.
Firewalls and proxies Unit objectives
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
ACCESS CONTROL LIST.
The Washington School District Mike, Mark, Joy, Armando, & Mona.
Network Proposal for Mountain Sky Elementary School
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Presentation on TCS By : 1. Ershad Islam 2. Maung Han Soey 3. Shaon Shahriar 4. Ahsanul Haque.
Threaded Case Study of Bangladesh Internet Press Ltd. (BIPL) By: Md. Ikbal Zavid Abul Kalam Asad Supervise By: Debanon Datta Legal Main Contact, CNAP Ahsanullah.
What are the two types of routes used by network administrators? Static Dynamic.
Threaded Case Study Acacia School Project Project Members: Md. Shafayet Hossain Md. Shakhawat Hossain Md. Moniruzzaman Md. Maksudur Rahman.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
VLAN-Based Security for Modern Service-Provision Networks Version 0.9 October, 2000 Bill Woodcock Packet Clearing House.
Lab 12 – Cisco Firewall.
CCENT Study Guide Chapter 12 Security.
Examcollection VCE Download
Implement Inter-VLAN Routing
Implement Inter-VLAN Routing
AbbottLink™ - IP Address Overview
Implement Inter-VLAN Routing
Computer Networks Protocols
Presentation transcript:

1 Semester 3 Threaded Case Study Royal Palm A/3B Ip Siu Tik Tsang Man Wu Wai Hung Wong Lai Ting

2 Wide Area Network

3 LAN Area Network

4 LAN Wiring Scheme

5

6 Addressing and Network Management Class A private address /20 is assigned 7 subnets for two administrative network and five student network /23 - Administrative Network /23 - Administrative Network /23 - Student Network /23 - Student Network /23 - Student Network /23 - Student Network /23 - Student Network

7 Addressing and Network Management Administrative Network /23Router Interface E0 (Admin LAN) > Switches Domain Name Server Server Web Server Administration File Server Administration Server > Staff PC's Static Addresses /23Router Sub-Interface E0 (Admin LAN) > Staff PC's Static Addresses

8 Addressing and Network Management Student Network 83 classrooms and each classroom support maximum 24 computers. 1992(83X24) IP addresses are needed

9 Addressing and Network Management /23Router Interface E1 (Student LAN) Library Server Application Server Student File Server DHCP Server Router Sub-Interface E1 (Student LAN) Router Sub-Interface E1 (Student LAN) Router Sub-Interface E1 (Student LAN) Router Sub-Interface E1 (Student LAN) > DHCP addresses for IDF > DHCP addresses for IDF > DHCP addresses for IDF > DHCP addresses for IDF > DHCP addresses for IDF 5

10 Security Access Lists 101: Student VLAN has no access to admin server or admin file server -- E0 in – router(config) # access-list 101 permit ip any router(config )# acces-list 101 deny ip any any router(config )# interface e0 router(config-if) # ip access-group 101 in

11 Security Access Lists 102: Any traffic leaving administration VLAN not from a valid address on that VLAN is denied Permit Web Server (port 80), DNS(port53) and SMTP(port 25) to be accessible from the student VLAN --E0 out – router(config) # access-list 102 permit tcp any any eq 80 router(config) # access-list 102 permit tcp any any eq 25 router(config) # access-list 102 permit tcp any any eq 53 router(config) # access-list 102 permit udp any any eq 53 router(config) # access-list 102 deny ip router(config) # access-list 102 permit ip any any router(config) # interface e0 router(config-if) # ip access-group 102 out

12 Security Access Lists 103: Any traffic leaving student VLAN not from a valid address on that VLAN is denied --E1 in— router(config) # access-list 103 permit ip any router(config) # access-list 103 permit ip any router(config) # access-list 103 permit ip any router(config) # interface e1 router(config-if) # ip access-group 103 in

13 Internet Connectivity Double firewalls for protection Access Control Lists (ACLs) is utilized in routers tcp port 53(DNS service), 80 (web server) and 110( service) available only Admin server cannot be accessed by student VLAN

14 Internet Connectivity Side effect of using ACLs: increase the latency of traffic increase the CPU utilization of the routers ACL latency effect slow down accessing to , internet & intranet browsing, log on process

15 User Counts Location Student/Curriculum Runs Administrative/Teacher Runs Total Runs Building Building Building Building Building Science building, 628 Computer building double portable classroom Multipurpose building Cafeteria 9312 Total332

16 ~The End~