StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

User Access Verification and Security - Assignment Example

Cite this document
Summary
This report "User Access Verification and Security" presents the international Travel Agency as an organization with HQ in London and two other remote sites in Paris and Rome. The organization branches are connected together through three routers that enable communication…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
User Access Verification and Security
Read Text Preview

Extract of sample "User Access Verification and Security"

Introduction The international Travel Agency is an organization with HQ in London and two other remote sites in Paris andRome. The organization branches are connected together through three routers that enable communication. The HQ and each branch has a number of PCs which are assigned IP address. The address space utilized was 192.168.156.0/22. This address was sub-netted in order to accommodate all hosts on the network. During subnetting available IP address, Network ID and respective subnet masks were populated. Sub-netting, however, helped in utilization of IP addresses and avoid wastage. This was done based on the number of Hosts in a given network. OSPF was used as the dynamic routing protocol on the routers. OSPF best fits the scenario because it was assumed that not all routers are Cisco. OSPF has the capability for route redistribution, which is a translation service between routing protocols using Dijkstra algorithm. OSPF converges quickly and supports multiple equal cost routes to the same destination (Parkhurst 444). Verification and Testing Plan Task # 2: Configuring dynamic routing OSPF routing algorithm was used to enable communication to remote networks. OSPF enables fast convergence in large networks and a default static route was configured on the London HQ router. The reason behind using OSPF is that it can support variable length subnet masks (VLSM) and non-contiguous subnets and therefore can meet all the demands of the organization. Task # 3: Configuring static routing A basic static route was configured on the HQ and propagated to all other branches in order to enable communication across the networks of the organization. Verification The ping command is used to verify TCP/IP Network layer connectivity to the default gateway and remote networks in Paris, and Rome. Verify TCP/IP Network layer connectivity of PC1 to Default gateway (London HQ) Packet Tracer PC Command Line 1.0 PC>ping 192.168.157.129 Pinging 192.168.157.129 with 32 bytes of data: Reply from 192.168.157.129: bytes=32 time=11ms TTL=255 Reply from 192.168.157.129: bytes=32 time=6ms TTL=255 Reply from 192.168.157.129: bytes=32 time=7ms TTL=255 Reply from 192.168.157.129: bytes=32 time=9ms TTL=255 Ping statistics for 192.168.157.129: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 6ms, Maximum = 11ms, Average = 8ms Verify TCP/IP Network layer connectivity form PC1 to a remote network (PC 6 on Rome Network) PC>ping 192.168.159.254 Pinging 192.168.159.254 with 32 bytes of data: Reply from 192.168.159.254: bytes=32 time=24ms TTL=126 Reply from 192.168.159.254: bytes=32 time=18ms TTL=126 Reply from 192.168.159.254: bytes=32 time=20ms TTL=126 Reply from 192.168.159.254: bytes=32 time=20ms TTL=126 Ping statistics for 192.168.159.254: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 18ms, Maximum = 24ms, Average = 20ms Verify TCP/IP Network layer connectivity of PC3 to Default gateway (Paris) PC>ping 192.168.158.33 Pinging 192.168.158.33 with 32 bytes of data: Reply from 192.168.158.33: bytes=32 time=21ms TTL=255 Reply from 192.168.158.33: bytes=32 time=10ms TTL=255 Reply from 192.168.158.33: bytes=32 time=10ms TTL=255 Reply from 192.168.158.33: bytes=32 time=10ms TTL=255 Ping statistics for 192.168.158.33: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 10ms, Maximum = 21ms, Average = 12ms Verify TCP/IP Network layer connectivity form PC1 to a remote network (PC 2 on London HQ network) PC>ping 192.168.157.65 Pinging 192.168.157.65 with 32 bytes of data: Reply from 192.168.157.65: bytes=32 time=31ms TTL=253 Reply from 192.168.157.65: bytes=32 time=20ms TTL=253 Reply from 192.168.157.65: bytes=32 time=21ms TTL=253 Reply from 192.168.157.65: bytes=32 time=16ms TTL=253 Ping statistics for 192.168.157.65: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 16ms, Maximum = 31ms, Average = 22ms Alternatively use London HQ#ping 192.168.158.129 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.158.129, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 16/25/32 ms To verify appropriate path selection use show IP route command in privileged exec mode to view the information within the routing table. Appropriate path selection for HQ verification London HQ>en London HQ#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is 0.0.0.0 to network 0.0.0.0 189.54.0.0/30 is subnetted, 1 subnets C 189.54.69.252 is directly connected, Loopback0 192.168.157.0/24 is variably subnetted, 4 subnets, 3 masks C 192.168.157.0/30 is directly connected, Serial0/0/1 C 192.168.157.4/30 is directly connected, Serial0/0/0 C 192.168.157.64/26 is directly connected, FastEthernet0/1 C 192.168.157.128/25 is directly connected, FastEthernet0/0 192.168.158.0/24 is variably subnetted, 4 subnets, 3 masks O 192.168.158.4/30 [110/454] via 192.168.157.2, 00:37:28, Serial0/0/1 O 192.168.158.32/27 [110/455] via 192.168.157.2, 00:37:28, Serial0/0/1 O 192.168.158.64/26 [110/455] via 192.168.157.2, 00:37:28, Serial0/0/1 O 192.168.158.128/26 [110/65] via 192.168.157.2, 00:37:28, Serial0/0/1 O 192.168.159.0/24 [110/65] via 192.168.157.2, 00:37:28, Serial0/0/1 S* 0.0.0.0/0 is directly connected, Loopback0 User Access Verification and security NB (The password for both routers in all modes is cisco except for the Rome that is cisco and password respectively) User Access verification Password: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1, changed state to up Password: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up 00:00:20: %OSPF-5-ADJCHG: Process 1, Nbr 192.168.159.1 on Serial0/0/1 from LOADING to FULL, Loading Done Password: London HQ>en Password: London HQ#config t Enter configuration commands, one per line. End with CNTL/Z. London HQ(config)# Deliverables Device Interface Number of Hosts Network Addresses Subnet Masks IP Addresses London (HQ) Fa0/0 90 192.168.157.128 255.255.255.128 192.168.157.129 Fa0/1 60 192.168.157.64 255.255.255.192 192.168.157.65 S0/0/1 2 192.168.157.0 255.255.255.252 192.168.157.1 S0/0/0 2 192.168.157.4 255.255.255.252 192.168.157.5 Paris Fa0/0 30 192.168.158.32 255.255.255.224 192.168.158.33 Fa0/1 60 192.168.158.64 255.255.255.192 192.168.158.65 S0/0/0 2 192.168.157.4 255.255.255.252 192.168.157.6 S0/0/1 2 192.168.158.4 255.255.255.252 192.168.158.5 Rome Fa0/0 128 192.168.159.0 255.255.255.0 192.168.159.1 Fa0/1 60 192.168.158.128 255.255.255.192 192.168.158.129 S0/0/0 2 192.168.158.4 255.255.255.252 192.168.158.6 S0/0/1 2 192.168.157.0 255.255.255.252 192.168.157.2 PCs PC1 192.168.157.128 255.255.255.128 192.168.157.254 PC2 192.168.157.64 255.255.255.192 192.168.157.126 PC3 192.168.158.32 255.255.255.224 192.168.158.62 PC4 192.168.158.64 255.255.255.192 192.168.158.126 PC5 192.168.158.128 255.255.255.192 192.168.158.190 PC6 192.168.159.0 255.255.255.0 192.168.159.254 The table below shows a detailed addressing scheme, including network addresses, their relevant subnet masks and IP addresses for each PC as specified in the design topology diagram. The sub-netting is based on the number of hosts available in the London (HQ), Paris, and Rome. A detailed design description of your proposed routing solution Addressing table The interfaces have their IP addresses configured, OSPF routing algorithm was used to enable communication to remote networks. OSPF enables fast convergence in large networks and a default static route was configured on the London HQ router (Tiso 441). Suitably annotated router configurations User Access Verification Password: London HQ>en Password: London HQ#show run start London HQ#sh run Building configuration... Current configuration : 1200 bytes version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption hostname "London HQ" enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 ! ! spanning-tree mode pvst ! ! interface Loopback0 ip address 189.54.69.254 255.255.255.252 ! interface FastEthernet0/0 ip address 192.168.157.129 255.255.255.128 duplex auto speed auto ! interface FastEthernet0/1 ip address 192.168.157.65 255.255.255.192 duplex auto speed auto ! interface Serial0/0/0 bandwidth 2000 ip address 192.168.157.5 255.255.255.252 clock rate 9600 ! interface Serial0/0/1 ip address 192.168.157.1 255.255.255.252 clock rate 9600 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes passive-interface Loopback0 network 192.168.157.0 0.0.0.3 area 0 network 192.168.157.4 0.0.0.3 area 0 network 192.168.157.64 0.0.0.63 area 0 network 192.168.157.128 0.0.0.127 area 0 network 189.54.69.252 0.0.0.3 area 0 ! ip classless ip route 0.0.0.0 0.0.0.0 Loopback0 ! ! no cdp run ! ! line con 0 password cisco login line vty 0 4 password cisco login line vty 5 15 password cisco login ! ! end London HQ# Works Cited Parkhurst, William R. Cisco Ospf Command and Configuration Handbook. Indianapolis, IN: Cisco Press, 2002. Tiso, John. Designing Cisco Network Service Architectures (arch): Foundation Learning Guide. Indianapolis, IN: Cisco Press, 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(User Access Verification and Security Assignment Example | Topics and Well Written Essays - 1250 words, n.d.)
User Access Verification and Security Assignment Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/logic-programming/1788011-network-routing-assignment
(User Access Verification and Security Assignment Example | Topics and Well Written Essays - 1250 Words)
User Access Verification and Security Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/logic-programming/1788011-network-routing-assignment.
“User Access Verification and Security Assignment Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/logic-programming/1788011-network-routing-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF User Access Verification and Security

Security Monitoring

Name Instructor Course Date security Monitoring The paper is intended is discuss security monitoring activities in any organization which has both commercial and internal I.... In addition, the paper will also examine the software's which ought to be considered to offer ample security management across the organization.... In order to avoid malicious threats and incidents, which have dominated the media for years now, has served to raise awareness and urge most organizations and business to invest resources and time into defending against rampant security issues (Bejtlich p 12)....
3 Pages (750 words) Research Paper

Design a system to pay the credit card bills via handset

security is a major concern for electronic transactions.... If the issue of security is well managed, this mode of transacting will be widely used.... This mobile service is preferred by individuals due to ease of use and the access opportunities to a wide variety of personalized services.... WAP-enabled communication devices like mobile phones and PDA can be used for information access and banking transactions.... The success of this payment options is that the user is not expected to go out of his way to access this feature....
18 Pages (4500 words) Essay

High performance system

Whilst the conditions of verification and validation are employed in credentials and texts, there are discrete variations in their vocabulary.... The security case is another solution provided by the author of the article towards the checking of errors in a system.... 1999, the verification procedure carried out by software is not able to perceive errors coming from inaccurate input pattern.... Relying on verification is also not sufficient causing another issue with software development and utilization....
1 Pages (250 words) Assignment

Choose a recent IS security breach or service outage that has been in the media

Basically, security attacks and breaches may or may not depend on what is included within the term “security breach.... ?? In this scenario, the majority of information… ecurity laws and regulations describe “security breach” as an illegal access to a particular set of personal data and information (in the US, typically  information employed to produce or get access to financial accounts) (Nash; Cate). For this paper, I have chosen a ID # A security breach or service outage that has been in the media In the past few years, information security has become a serious challenge for the business organizations....
2 Pages (500 words) Essay

Permissions Oversight and Overview

While designing any computer application, the programmer should put in place measures to curb security Permissions Oversight and Overview Permissions Oversight and Overview Data security remains to be one of the hottest themes in the world of connected computers.... Firstly, data must be protected from tampering and unauthorized access; this involves data security.... While designing any computer application, the programmer should put in place measures to curb security dilemma....
2 Pages (500 words) Essay

The Certification Criteria Used by HIPAA

Application-level data security builds an all-inclusive security program.... These policies help make security security I agree with the first and third claims made by the healthcare IT staff.... First, I agree that application-level data security is claimed to be sufficient for HITECH and HIPAA compliance.... Application-level data security builds an all-inclusive security program....
2 Pages (500 words) Essay

LDAP and Security

This paper "LDAP and security" casts light on the fact that in current email application packages each software package has a private address register, however how we search for an online address of somebody which is not at all known to us by email.... This paper presents a comprehensive analysis of the security features which LDAP supports, then it will assess that how can access control list be implemented on the LDAP servers.... Afterward, it will also analyze the security auditing features that LDAP supports in addition to the detection of brute forcing attacks (such as NAT) against an LDAP server....
8 Pages (2000 words) Coursework

The Security Technology Evaluation

This essay "The security Technology Evaluation" focuses on the security technology, the Unsuccessful Logon Attempts, which entails the locking out of accounts due to unsuccessful login attempts.... hellip; This technology is typically core for security administrators who have the responsibility of protecting organizational data.... For the verification process, the security properties for the system are reviewed.... This is best done within the local security settings....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us