Interconnecting Cisco Devices

InterconnectingCisco

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

THREE PART PROJECT

Network Infrastructure Design Diagram

PART 1

Instructions

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:

Table 1. Kamehameha Educational Offerings.

Group

Offering

Kamehameha Branded

Focused on the general public/provides services directly to its students

Co-Branded

Provides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”

White Label Branded

While the service offering is the same, these services are labeled solely with the third parties’ information

The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

· Each of the facilities has three floors:

· The first and second floor of each building requires 150 network connections each

· The third floor of each building houses a data center and requires 75 network connections

· The Honolulu location requires additional network connections for failover purposes

· The Hilo location will be the primary data center and house redundant database servers

· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)

· A constant connection between the three locations, carrying at least 75 Mbps of data

· All servers at all locations must have redundancy

· Protection from intrusions is required and should be documented

· A plan to verify security and failover measures is required

Submission:

 Using the free tool, daw.io available at 

https://draw.io

 (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:

Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:

Table 2. Example Network Diagram Callout Box.

CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010

· Any necessary hardware

· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)

· Annotate the following values for each of the Sites:

· Network ID

· Useable Range

· Subnet Mask

· CIDR Value

· Broadcast Address

· All devices require hostnames complying with the following naming conventions:

· Routers: Rx; where x is the site number incremented by a value of 1 for each router

· Switches: Sx; where x is the site number incremented by a value of 1 for each switch

· Servers: SRVx where x is the server number incremented by a value of 1 for each server

· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:

· management vlan

· production vlan

· High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:
Figure 2. Draw.io ‘Export’ as Function to PDF

PART 2

 Packet Tracer Task

Instructions

As a network engineer for Kamehameha Institute, you will need to become familiar with the Packet Tracer simulation tool from Cisco. Packet Tracer is used to simulate and test network configurations. This allows you to work out and improve upon the settings before implementing them.

Using the diagram and configuration information from your first task, create a Packet Tracer simulation.

PART 3

Instructions

For the final assignment, summarize the site requirements and/or any challenges (changes to the topology as you detailed in Assignments 1 and 2) you are attempting to overcome. You should also provide an updated overall site topology based on your design.

This solution should be comprehensive, and the approach should be justified. Configurations of technologies should be written out to help guide the systems administrators with implementation. In some cases, you may find it necessary to implement additional cabling, which can be done by adding to the supplied topology. Any adjustments to the sites’ topology should be documented and supplied with your submission.

NB;

Use the template below to record your work.

Use this document as a guide for formatting and organizing your final Network Design Proposal submission.

Title Page

Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date.

Document Index/Contents

Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission.

Sample text:

I. Site “XXXXXXXX” Challenges and Implementation
II. Site “XXXXXXXX” Challenges and Implementation
III. Site “XXXXXXXX” Challenges and Implementation

IV. Bibliography

I. Site “XXXXXXXXXX” Challenge and Implementation

(Provide a section for each site, as suggested in your table of contents.)

Site Details and Challenges (Summary)

Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs.

Sample text:

As described in the scenario, the Dallas site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective.

Site Solution(s) and Technologies

With the challenges stated, you will be able to clearly define your approach to solving those challenges and can state the technologies you will be implementing. Use this area to justify your approach and selection of technologies. The specific length and details of this area will vary based on the specifics and depth of the challenge you are facing. Your justification would be your selection of a specific technology or approach over another and why you chose the approach you are taking. Show off your knowledge in the foundational skills here.

Sample text:

In order to relieve the administrative tasks surrounding the implementation of manual IP addressing per device, we will configure and implement a DHCP (dynamic host configuration protocol) server, per site requirements. The DHCP allows for devices to identify, request and implement IP configurations as well as other settings….

Since this area may call for facts and details around technologies and approaches, you will most likely find yourself using in-text citations, which would appear as follows:

Open Shortest Path First is an open standard routing protocol that’s been implemented by a wide variety of network vendors, including Cisco (Jones, 20xx).

Sample Configuration

Understanding the technologies will satisfy a portion of the documents’ requirements. You will also need to display how the solutions you are suggesting would be implemented.

Embed a copy of the PTK file for the Packet Tracer File you created.

Supporting Tables/Diagrams

When structuring solutions per certain sites, you may find it helpful or even necessary to structure information with tables and/or diagrams. These items can be used to support and display your understood solutions located in the “Site Solution(s) and Technologies” area. Display your organizational and logical skills in this area.

Provide an updated and polished network design diagram (Assignment 1 updated).

Repeat the format to include document components for each site. In this sample, sections numbered II and III in your table of contents would be provided next, followed by the bibliography.

IV. Bibliography

Be responsible with your research and included works. Provide proper credit in the APA format to original authors and their works that you leverage in your submission.

Discussions Questions.

Discussion 1

Dissecting Switching Protocols in Wireshark

Download and install Wireshark. Alternatively, you may use 

https://www.cloudshark.org/

 (you may need to create an account).

Open up the 

Switches packet capture (.pcap) file

. Compare and contrast the SWITCH, ARP, and VLAN protocols seen in the .pcap.

· What does ARP primarily do on the network? How is this related to switches?

· What are some of the VLAN ID’s found in the .pcap?

· Examine the STP traffic. What are some of the priorities associated with the root bridges?

· What packet number did you find that information in?

Discussion 2

Dissecting Routing Protocols in Wireshark

If you haven’t done so already, download and install Wireshark. Alternatively, you may use 
https://www.cloudshark.org/
 (you may need to create an account).

Open up the 

Routing packet capture (.pcap) file

. Compare and contrast the RIPv1, RIPv2, EIGRP, and OSPF routing protocols.

· Which routing protocols use multicast and which use broadcast?

· What are the multicast addresses used by the various routing protocols?

· Is TCP or UDP used? What is the port number?

· Are you able to find the autonomous system number for EIGRP in the packet details? How did you locate it?

Discussion 3

Outsourcing Networking Technologies

The Chief Operating Officer (COO) has tasked you to provide recommendations on the technologies within your environment that should be outsourced. You recommended the two technologies below:

· Full support of all network devices including switches, firewalls, and routers

· An accounting application with several third-party plugins

The COO gave you the green light to continue your research and has asked for additional information to support a final decision. As you formulate your response to the COO, think beyond just networking and consider how your specialization interacts with other functions and the overall business purpose:

· What role should virtualization, software-defined networking (SDN), and automation play in your recommendation?

· What is the relationship between core and edge systems?

· What other factors would influence your recommendation? 

· How would your decision be different if you are overseeing a team of four technicians versus a larger team of fourteen?

Your response should be no more than two well-written paragraphs. Ensure you provide citations in either IEEE or APA 7th Edition style for any external sources

Discussion 4

Part 1: Type 5 Cisco Password Hashes

To keep your routers, firewalls, and switches secure, they need good passwords. Type 5 Cisco password hashes employ a technique called salting. Discuss password hashes and salting and discuss password cracking tools or websites that can be used to crack Cisco password hashes. Some of the most popular Linux tools are John the Ripper and Hashcat, which are both already included with the Kali Linux distribution. The Windows tool Cain can also crack Cisco passwords. Use the as is choice and the default wordlist that comes with Cain on the password hashes below. You may elect to crack some of them and explain how you did it for part of this discussion:

$1$mERr$TMFGl3gjZgTURz2zWGujv1

$1$mERr$j2lBkUQmIwqeeIUhzEMH/1

$1$mERr$UeZ8mb786UhNnpZquiKwc0

Part 2: Type 7 Cisco Password Hashes

The Cisco type 7 password is not much better than putting the password in clear text, which is the default if you do not type the command service password-encryption. Discuss password hashes and discuss password cracking tools or websites that can be used to crack Cisco type 7 password hashes. Here is a list of some Cisco password hashes. You may elect to crack some of them and explain how you did it for part of this discussion.

11280B061F1B583342

532E26010C082B070B6F02

46152908515041

09611E590A565451

023057495B085E226D6E

062B3D0D1C4A0E4A44

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP