tag:blogger.com,1999:blog-19026173270267032772024-03-05T09:46:07.155-08:00sOn_nYaBloG InI m3ndEskriPsikan tenTang bagaimana menampilkan jawaban-jawaban atau mungkin pendapatnya sendiri!!!^-^LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.comBlogger238125tag:blogger.com,1999:blog-1902617327026703277.post-29364879126321329462011-04-12T10:30:00.000-07:002011-04-12T10:30:10.564-07:00Vigenere Cipher dan Hill cipher<div style="font-family: Georgia,"Times New Roman",serif;">A. Vigenere Cipher </div><div style="font-family: Georgia,"Times New Roman",serif;">Vigenere Cipher merupakan salah satu cipher yang terkenal. Vigenere Cipher termasuk cipher substitusi abjad-majemuk. Vigenere Cipher dipublikasikan pada tahun 1856 dan dapat dipecahkan oleh Babbage dan Kasiski pada pertengahan abad 19.</div><div style="font-family: Georgia,"Times New Roman",serif;">Proses enkripsi dan dekripsi pada Vigenere Cipher menggunakan bujursangkar Vigenere. Kolom paling kiri menyatakan huruf-huruf kunci, baris paling atas menyatakan huruf-huruf plainteks.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span><b><i>Hill cipher</i></b> bekerja pada kelompok huruf dalam cara yang agak berbeda.</span> <span> Hill cipher bekerja dengan melihat sekelompok huruf sebagai vektor, dan enkripsi dilakukan dengan perkalian matriks.</span> <span> Namun, kami akan menghindari referensi aljabar linear dalam penjelasan kami.</span> </div><span style="font-family: Georgia,"Times New Roman",serif;"> Hill cipher pertama kali dijelaskan oleh Lester Hill dalam sebuah makalah yang diterbitkan pada tahun 1931. Sementara cipher ini dapat bekerja pada blok surat dari setiap panjang, kami akan menjelaskan sebagai bekerja pada pasangan huruf, atau digraf.</span> <div style="font-family: Georgia,"Times New Roman",serif;"> <span> Pertama, kunci kami terdiri dari empat nomor-nomor yang kita sebut <i>a, b, c,</i> dan <i>d.</i></span> <span> Angka-angka ini harus dipilih sehingga <i>iklan</i> kuantitas - <i>bc</i> relatif prima dengan panjang alfabet (26 dalam kasus kami, sehingga <i>iklan</i> - <i>bc</i> tidak bisa genap atau kelipatan 13).</span> </div><div style="font-family: Georgia,"Times New Roman",serif;"> <span> Untuk mengenkripsi sepasang surat, kita melihat setara numerik mereka seperti biasa.</span> <span> Misalkan angka-angka ini <i>x</i> dan <i>y</i></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span>Dalam upaya untuk memecahkan sebuah sandi Hill, kegunaan dari analisis frekuensi menjadi makin kecil dengan ukuran blok meningkat huruf.</span> <span> Sebuah cipher Hill tidak sulit untuk diterapkan pada kelompok 6 atau lebih huruf.</span> <span> Sebuah kerugian yang besar, bagaimanapun, adalah bahwa hal itu sangat rentan terhadap apa yang disebut <b><i>serangan plaintext yang dikenal.</i></b></span> <span> Jika bagian dari plaintext diketahui penyerang, maka menguraikan transformasi dapat disimpulkan hanya dengan menyelesaikan beberapa persamaan linier.</span> <span> Beberapa bantuan dapat diperoleh dengan menerapkan cipher Vigenere setelah enkripsi dengan cipher Hill, <sup><a href="http://translate.googleusercontent.com/translate_c?hl=id&sl=en&u=http://www.math.sunysb.edu/%7Escott/papers/MSTP/crypto/8Hill_Cipher.html&prev=/search%3Fq%3Dvigenere%2Bcipher%2Bdan%2BHill%2Bcipher%26hl%3Did%26prmd%3Divns&rurl=translate.google.co.id&twu=1&usg=ALkJrhgYsbRO_Nl90tDwfVRSRxAh5EC-EA#foot488" name="tex2html17">13</a></sup> walaupun ada banyak cara yang lebih baik untuk meningkatkan keamanan.</span><span><i> </i></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-39660668953430022292011-04-12T10:11:00.000-07:002011-04-12T10:11:12.729-07:00Mesin Enigma<div style="font-family: Georgia,"Times New Roman",serif;"><b>Mesin Enigma</b> adalah sebuah <a href="http://id.wikipedia.org/wiki/Mesin">mesin</a> <a class="mw-redirect" href="http://id.wikipedia.org/wiki/Sandi" title="Sandi">penyandi</a> yang digunakan untuk <a href="http://id.wikipedia.org/wiki/Enkripsi" title="Enkripsi">mengenkripsikan</a> dan <a class="new" href="http://id.wikipedia.org/w/index.php?title=Dekripsi&action=edit&redlink=1" title="Dekripsi (halaman belum tersedia)">mendekripsikan</a> pesan rahasia. Enigma dipatenkan oleh <a href="http://id.wikipedia.org/wiki/Insinyur">insinyur</a> <a href="http://id.wikipedia.org/wiki/Jerman">Jerman</a> <a class="new" href="http://id.wikipedia.org/w/index.php?title=Arthur_Scherbius&action=edit&redlink=1" title="Arthur Scherbius (halaman belum tersedia)">Arthur Scherbius</a>, dan awalnya digunakan untuk tujuan komersial, namun nantinya terkenal karena digunakan oleh <a class="mw-redirect" href="http://id.wikipedia.org/wiki/Tentara" title="Tentara">tentara</a> dan <a href="http://id.wikipedia.org/wiki/Pemerintah">pemerintah</a> <a href="http://id.wikipedia.org/wiki/Jerman_Nazi">Jerman Nazi</a> sebelum dan selama <a href="http://id.wikipedia.org/wiki/Perang_Dunia_II">Perang Dunia II</a>. Secara teknis, mesin Enigma termasuk keluarga <a class="new" href="http://id.wikipedia.org/w/index.php?title=Mesin_rotor&action=edit&redlink=1" title="Mesin rotor (halaman belum tersedia)">mesin rotor</a> <a class="new" href="http://id.wikipedia.org/w/index.php?title=Elektromekanik&action=edit&redlink=1" title="Elektromekanik (halaman belum tersedia)">elektromekanik</a>, yang memiliki berbagai model. Nama <i>Enigma</i> diambil dari kata <a href="http://id.wikipedia.org/wiki/Bahasa_Latin" title="Bahasa Latin">Latin</a> <i>aenigma</i>, yang artinya <a class="new" href="http://id.wikipedia.org/w/index.php?title=Teka-teki&action=edit&redlink=1" title="Teka-teki (halaman belum tersedia)">teka-teki</a>.</div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.blogger.com/post-create.g?blogID=1902617327026703277" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.blogger.com/post-create.g?blogID=1902617327026703277" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.blogger.com/post-create.g?blogID=1902617327026703277" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"> </div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-50828394150393076532011-04-12T09:47:00.000-07:002011-04-12T09:47:06.836-07:00Simetris Kriptografi<div style="font-family: Georgia,"Times New Roman",serif;">Algoritma kunci rahasia atau sandi kunci rahasia. Adalah algoritma kriptografi yang menggunakan kunci enkripsi yang sama dengan kunci dekripsinya. Algoritma ini mengharuskan pengirim dan penerima menyetujui suatu kunci tertentu sebelum mereka saling berkomunikasi. Keamanan algoritma simetris tergantung pada kunci, membocorkan kunci berarti bahwa orang lain dapat mengenkripsi dan mendekripsi pesan. Agar komunikasi tetap aman, kunci harus tetap dirahasiakan.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Sifat kunci yang seperti ini membuat pengirim harus selalu memastikan bahwa jalur yang digunakan dalam pendistribusian kunci adalah jalur yang aman atau memastikan bahwa seseorang yang ditunjuk membawa kunci untuk dipertukarkan adalah orang yang dapat dipercaya. Masalahnya akan menjadi rumit apabila komunikasi dilakukan secara bersama-sama oleh sebanyak n pengguna dan setiap dua pihak yang melakukan pertukaran kunci, maka akan terdapat sebanyak (n-1)/2 kunci rahasia yang harus dipertukarkan secara sama</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Algoritma kunci simetris memiliki beberapa kelebihan dan kekurangan, yakni:</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Kelebihan :</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Waktu proses untuk enkripsi dan dekripsi relatif cepat, hal ini disebabkan karena efisiensi yang terjadi pada pembangkit kunci.</div><div style="font-family: Georgia,"Times New Roman",serif;">Karena cepatnya proses enkripsi dan dekripsi, maka algoritma ini dapat digunakan pada sistem secara real-time seperti saluran telepon digital.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Kekurangan :</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Untuk tiap pasang pengguna dibutuhkan sebuah kunci yang berbeda, sedangkan sangat sulit untuk menyimpan dan mengingat kunci yang banyak secara aman, sehingga akan menimbulkan kesulitan dalam hal manajemen kunci.</div><div style="font-family: Georgia,"Times New Roman",serif;">Perlu adanya kesepakatan untuk jalur yang khusus untuk kunci, hal ini akan menimbulkan masalah yang baru karena tidak mudah u menentukan jalur yang aman untuk kunci, masalah ini sering disebut dengan “Key Distribution Problem”.</div><div style="font-family: Georgia,"Times New Roman",serif;">Apabila kunci sampai hilang atau dapat ditebak maka kriptosistem ini tidak aman lagi.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Block-Cipher</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Block-cipher adalah skema algoritma sandi yang akan membagi-bagi teks terang yang akan dikirimkan dengan ukuran tertentu (disebut blok) dengan panjang t, dan setiap blok dienkripsi dengan menggunakan kunci yang sama. Pada umumnya, block-cipher memproses teks terang dengan blok yang relatif panjang lebih dari 64 bit, untuk mempersulit penggunaan pola-pola serangan yang ada untuk membongkar kunci. Untuk menambah kehandalan model algoritma sandi ini, dikembangkan pula beberapa tipe proses enkripsi, yaitu :</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">ECB, Electronic Code Book</div><div style="font-family: Georgia,"Times New Roman",serif;">CBC, Cipher Block Chaining</div><div style="font-family: Georgia,"Times New Roman",serif;">OFB, Output Feed Back</div><div style="font-family: Georgia,"Times New Roman",serif;">CFB, Cipher Feed Back</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Stream-Cipher</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Stream-cipher adalah algoritma sandi yang mengenkripsi data persatuan data, seperti bit, byte, nible atau per lima bit(saat data yang di enkripsi berupa data Boudout). Setiap mengenkripsi satu satuan data di gunakan kunci yang merupakan hasil pembangkitan dari kunci sebelum.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Contoh algoritma yang menggunakan kunci simetris:</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">1. Data Encryption Standard (DES)</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Data encryption standar (DES) yang diadopsi oleh NIST (Nasional Institue Of Standar and Technolog) sebagai standar pegolahan informasi federal As.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Data encryption standar (DES) terbagi menjadi tiga kelompok:</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Proses Kunci</div><div style="font-family: Georgia,"Times New Roman",serif;">Enkripsi data 64 bit</div><div style="font-family: Georgia,"Times New Roman",serif;">Deskripsi data 64 bit</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Secara umum skema Data encryption standar (DES) memiliki dua fungsi input yaitu:</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Plaintext untuk dienkripsi dengan panjang 64 bit</div><div style="font-family: Georgia,"Times New Roman",serif;">Kunci dengan panjang 56 bit</div><div style="font-family: Georgia,"Times New Roman",serif;">2. Triple Data Encryption Standar (3DES)</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-81521750389821776082011-03-09T22:32:00.000-08:002011-03-09T22:34:01.627-08:00Pertemuan Kedua<div style="font-family: Georgia,"Times New Roman",serif;">Nama : Sonya Leoni</div><div style="font-family: Georgia,"Times New Roman",serif;">NIM : 06491</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><link href="file:///C:%5CDOCUME%7E1%5CPCCLIE%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml" rel="File-List"></link><link href="file:///C:%5CDOCUME%7E1%5CPCCLIE%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_editdata.mso" rel="Edit-Time-Data"></link><style>
<!--
/* Font Definitions */
@font-face
{font-family:Calibri;
mso-font-alt:"Century Gothic";
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-1610611985 1073750139 0 0 159 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraph, li.ListParagraph, div.ListParagraph
{mso-style-name:"List Paragraph";
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst
{mso-style-name:"List ParagraphCxSpFirst";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle
{mso-style-name:"List ParagraphCxSpMiddle";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast
{mso-style-name:"List ParagraphCxSpLast";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.Section1
{page:Section1;}
/* List Definitions */
@list l0
{mso-list-id:52630526;
mso-list-type:hybrid;
mso-list-template-ids:-1977587186 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1
{mso-list-id:205682673;
mso-list-type:hybrid;
mso-list-template-ids:1036403514 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style> </div><div class="MsoNormal"><b>Komponen jaringan <o:p></o:p></b></div><div class="ListParagraphCxSpFirst" style="text-indent: -0.25in;">1.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span><span style="height: 12px; left: 0px; margin-left: 132px; margin-top: 2px; position: absolute; width: 44px; z-index: 2;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/01/clip_image001.gif" v:shapes="_x0000_s1027" width="44" /></span><span style="height: 27px; left: 0px; margin-left: 80px; margin-top: 7px; position: absolute; width: 12px; z-index: 1;"><img height="27" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/01/clip_image002.gif" v:shapes="_x0000_s1026" width="12" /></span>MAC CISC Complex</div><div class="ListParagraphCxSpMiddle" style="text-indent: -0.25in;">2.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span><span style="height: 12px; left: 0px; margin-left: 132px; margin-top: 4px; position: absolute; width: 44px; z-index: 3;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/01/clip_image003.gif" v:shapes="_x0000_s1028" width="44" /></span>PC RISC Reduce</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Sata 1 150 mbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Sata 2 300 mbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Sata 3 6000 mbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Parallel port (LPT2) gunanya untuk printer sekarang lebih banyak menggunakan usb</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Kecepatan usb 1</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Kecepatan usb 2.0 = 480 mbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Kecepatan usb 3.0 = 4,5 gbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Keluaran interface terbaru namanya <b>“ThunderBoat”</b> yaitu kecepatan nya sekitar 10 gbps</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Bus jalur keretanya kememori</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Ram berfungsi tempat penyimpanan sementara data yang akan diolah (vollatiel)</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Memori terbagi 2 yaitu </div><div class="ListParagraphCxSpMiddle" style="text-indent: -0.25in;">1.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>DIMN</div><div class="ListParagraphCxSpMiddle" style="text-indent: -0.25in;">2.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>SIMN</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Dan sekarang lebih dikenal dari tekhnologi tersebut adalah DDR (DDR 3)</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Adanya extrenala memori, tipe penyimpanan external berdasarkan piringan disebut <b>“Harddisk”<o:p></o:p></b></div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Dan ada satu lagi yang disebut sebagai <b>“SSD” </b>yaitu media penyimpanan yan berupa media</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Kalau untuk desktop core i5 terdapat Sata 1, II, III serta harddisk dan SSD 2 GB atau menggunakan SLI.</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;">Fungsi dari VGA atau sering disebut dengan kartu grafis atau lanCard berfungsi sebagai yaitu apabila kita mengingikan hasil tampilan lebih bagus dan bagus</div><div class="ListParagraphCxSpMiddle" style="margin-left: 0in;"><br />
</div><div class="ListParagraphCxSpLast" style="margin-left: 0in;">Bagian- bagian motherboard</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-63088097578057770622011-03-09T22:26:00.000-08:002011-03-09T22:26:29.920-08:00Pertemuan kedua<div style="font-family: Georgia,"Times New Roman",serif;">Nama : sonya leoni</div><div style="font-family: Georgia,"Times New Roman",serif;">NIM : 06491</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">ENKRIPSI DAN DEKRIPSI</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Kriptografi, secara umum adalah ilmu dan seni untuk menjaga kerahasiaan berita [bruce Schneier - Applied Cryptography]. Selain pengertian tersebut terdapat pula pengertian ilmu yang mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi seperti kerahasiaan data, keabsahan data, integritas data, serta autentikasi data</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Algoritma Sandi</div><div style="font-family: Georgia,"Times New Roman",serif;">algoritma sandi adalah algoritma yang berfungsi untuk melakukan tujuan kriptografis. Algoritma tersebut harus memiliki kekuatan untuk melakukan (dikemukakan oleh Shannon):</div><div style="font-family: Georgia,"Times New Roman",serif;">konfusi/pembingungan (confusion), dari teks terang sehingga sulit untuk direkonstruksikan secara langsung tanpa menggunakan algoritma dekripsinya difusi / peleburan (difusion), dari teks terang sehingga karakteristik dari teks terang tersebut hilang.</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">Block-Cipher</div><div style="font-family: Georgia,"Times New Roman",serif;">Block-cipher adalah skema algoritma sandi yang akan membagi-bagi teks terang yang akan dikirimkan dengan ukuran tertentu (disebut blok) dengan panjang t, dan setiap blok dienkripsi dengan menggunakan kunci yang sama. Pada umumnya, block-cipher memproses teks terang dengan blok yang relatif panjang lebih dari 64 bit, untuk mempersulit penggunaan pola-pola serangan yang ada untuk membongkar kunci. Untuk menambah kehandalan model algoritma sandi ini, dikembangkan pula beberapa tipe proses enkripsi, yaitu :</div><div style="font-family: Georgia,"Times New Roman",serif;">�� ECB, Electronic Code Book</div><div style="font-family: Georgia,"Times New Roman",serif;">�� CBC, Cipher Block Chaining</div><div style="font-family: Georgia,"Times New Roman",serif;">�� OFB, Output Feed Back</div><div style="font-family: Georgia,"Times New Roman",serif;">�� CFB, Cipher Feed Back</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">ROT13</div><div style="font-family: Georgia,"Times New Roman",serif;">ROT13 (dari Bahasa Inggris rotate by 13, putar 13 kali), adalah algoritma enkripsi sederhana yang menggunakan sandi abjad-tunggal dengan pergeseran k=13 (huruf A diganti dengan N, huruf B diganti dengan O, dan seterusnya). Enkripsi ini merupakan penggunaan dari sandi Caesar dengan geseran 13. ROT13 biasanya digunakan di forum internet, agar spoiler, jawaban teka-teki, kata-kata kotor, dan semacamnya tidak terbaca dengan sekilas. Hal ini mirip dengan mencetak jawaban TTS secara terbalik di surat kabar atau majalah.</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-20646293485633664062011-03-09T22:13:00.000-08:002011-03-09T22:21:03.968-08:00Pertemuan Pertama tgl 01 maret 2011<div style="font-family: Georgia,"Times New Roman",serif;"><link href="file:///C:%5CDOCUME%7E1%5CPCCLIE%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_filelist.xml" rel="File-List"></link><link href="file:///C:%5CDOCUME%7E1%5CPCCLIE%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_editdata.mso" rel="Edit-Time-Data"></link><o:smarttagtype name="City" namespaceuri="urn:schemas-microsoft-com:office:smarttags"></o:smarttagtype><o:smarttagtype name="place" namespaceuri="urn:schemas-microsoft-com:office:smarttags"></o:smarttagtype><style>
<!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;
mso-font-charset:2;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
{font-family:Calibri;
mso-font-alt:"Century Gothic";
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:-1610611985 1073750139 0 0 159 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraph, li.ListParagraph, div.ListParagraph
{mso-style-name:"List Paragraph";
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpFirst, li.ListParagraphCxSpFirst, div.ListParagraphCxSpFirst
{mso-style-name:"List ParagraphCxSpFirst";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpMiddle, li.ListParagraphCxSpMiddle, div.ListParagraphCxSpMiddle
{mso-style-name:"List ParagraphCxSpMiddle";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:0in;
margin-left:.5in;
margin-bottom:.0001pt;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
p.ListParagraphCxSpLast, li.ListParagraphCxSpLast, div.ListParagraphCxSpLast
{mso-style-name:"List ParagraphCxSpLast";
mso-style-type:export-only;
margin-top:0in;
margin-right:0in;
margin-bottom:10.0pt;
margin-left:.5in;
mso-add-space:auto;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.Section1
{page:Section1;}
/* List Definitions */
@list l0
{mso-list-id:709114776;
mso-list-type:hybrid;
mso-list-template-ids:-1949820700 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;}
@list l0:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1
{mso-list-id:733506959;
mso-list-type:hybrid;
mso-list-template-ids:-1540720698 875056272 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:-;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;
font-family:Calibri;
mso-fareast-font-family:Calibri;
mso-bidi-font-family:"Times New Roman";}
@list l2
{mso-list-id:828058519;
mso-list-type:hybrid;
mso-list-template-ids:-32488452 67698703 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;}
@list l2:level1
{mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-.25in;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style> </div><div class="MsoNormal" style="font-family: Georgia,"Times New Roman",serif;">Komponen-komponen jaringan computer</div><div class="ListParagraphCxSpFirst" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">1.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>PC</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">2.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>NIC</div><div class="ListParagraphCxSpLast" style="font-family: Georgia,"Times New Roman",serif;">Menggunakan interface RJ-45 [8 bit]</div><div class="MsoNormal" style="font-family: Georgia,"Times New Roman",serif;"> Empat warna dasar kabel :</div><div class="ListParagraphCxSpFirst" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">-<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span><st1:city w:st="on"><st1:place w:st="on">Orange</st1:place></st1:city></div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">-<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>HIjau</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">-<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>Biru</div><div class="ListParagraphCxSpLast" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">-<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>Cokelat</div><div class="MsoNormal" style="font-family: Georgia,"Times New Roman",serif;">Empat warna dasar kabel ini memiliki pasangan kabel putih</div><div class="MsoNormal" style="font-family: Georgia,"Times New Roman",serif;"><b>Konsep pemasanagan kabel<o:p></o:p></b></div><div class="ListParagraphCxSpFirst" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">1.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span>Kabel yang memiliki pasangan kabel putih berada pada pin ganjil</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; text-indent: -0.25in;">2.<span style="font-size-adjust: none; font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span><span style="height: 12px; left: 0px; margin-left: 167px; margin-top: 3px; position: absolute; width: 49px; z-index: 1;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image001.gif" v:shapes="_x0000_s1026" width="49" /></span>Pin 1 dan pin 2 sepasang</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif;"><span style="height: 12px; left: 0px; margin-left: 169px; margin-top: 5px; position: absolute; width: 49px; z-index: 2;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image002.gif" v:shapes="_x0000_s1027" width="49" /></span>Pin 3 dan pin 6 Sepasang</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif;"><span style="height: 12px; left: 0px; margin-left: 157px; margin-top: 3px; position: absolute; width: 49px; z-index: 3;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image001.gif" v:shapes="_x0000_s1028" width="49" /></span>Pin 4 dan pin 5 Sepasang</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif;"><span style="height: 12px; left: 0px; margin-left: 157px; margin-top: 3px; position: absolute; width: 49px; z-index: 4;"><img height="12" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image002.gif" v:shapes="_x0000_s1029" width="49" /></span>Pin 7 dan pin 8 Sepasang</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in;"> Standar warna A Standar warna B</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 48px; left: 0px; margin-left: 35px; margin-top: 6px; position: absolute; width: 12px; z-index: 5;"><img height="48" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image003.gif" v:shapes="_x0000_s1030" width="12" /></span> 1 CP HP OP</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> C</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> 2 C H O</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 103px; left: 0px; margin-left: 35px; margin-top: 8px; position: absolute; width: 12px; z-index: 6;"><img height="103" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image004.gif" v:shapes="_x0000_s1031" width="12" /></span> 3 BP OP HP</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 45px; left: 0px; margin-left: 59px; margin-top: 7px; position: absolute; width: 12px; z-index: 7;"><img height="45" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image005.gif" v:shapes="_x0000_s1032" width="12" /></span> B 4 H B B</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> H</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify; text-indent: 0.5in;">5 HP BP BP</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> 6 B O H</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 67px; left: 0px; margin-left: 35px; margin-top: 8px; position: absolute; width: 12px; z-index: 8;"><img height="67" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image006.gif" v:shapes="_x0000_s1033" width="12" /></span> 7 OP CP CP </div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> O</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"> 8 O C C</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><b> Pemasangan Kabel<o:p></o:p></b></div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 39px; left: 0px; margin-left: 2px; margin-top: 11px; position: absolute; width: 32px; z-index: 9;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="39" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="32"><span style="left: 0pt; position: absolute; z-index: 9;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1034"><div class="MsoNormal">A</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span><span style="height: 38px; left: 0px; margin-left: 168px; margin-top: 5px; position: absolute; width: 35px; z-index: 11;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="38" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="35"><span style="left: 0pt; position: absolute; z-index: 11;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1036"><div class="MsoNormal">A</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span><span style="height: 4px; left: 0px; margin-left: 28px; margin-top: 20px; position: absolute; width: 142px; z-index: 10;"><img height="4" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image007.gif" v:shapes="_x0000_s1035" width="142" /></span> Strike </div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 38px; left: 0px; margin-left: 169px; margin-top: 6px; position: absolute; width: 33px; z-index: 14;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="38" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="33"><span style="left: 0pt; position: absolute; z-index: 14;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1039"><div class="MsoNormal">B</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span><span style="height: 2px; left: 0px; margin-left: 28px; margin-top: 22px; position: absolute; width: 142px; z-index: 13;"><img height="2" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image008.gif" v:shapes="_x0000_s1038" width="142" /></span><span style="height: 38px; left: 0px; margin-left: 2px; margin-top: 5px; position: absolute; width: 32px; z-index: 12;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="38" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="32"><span style="left: 0pt; position: absolute; z-index: 12;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1037"><div class="MsoNormal">B</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span> Strike</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpMiddle" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><br />
</div><div class="ListParagraphCxSpLast" style="font-family: Georgia,"Times New Roman",serif; margin-left: 0in; text-align: justify;"><span style="height: 35px; left: 0px; margin-left: 163px; margin-top: 9px; position: absolute; width: 34px; z-index: 17;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="35" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="34"><span style="left: 0pt; position: absolute; z-index: 17;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1042"><div class="MsoNormal">B</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span><span style="height: 4px; left: 0px; margin-left: 28px; margin-top: 23px; position: absolute; width: 135px; z-index: 16;"><img height="4" src="file:///C:/DOCUME%7E1/PCCLIE%7E1/LOCALS%7E1/Temp/msohtml1/06/clip_image009.gif" v:shapes="_x0000_s1041" width="135" /></span><span style="height: 37px; left: 0px; margin-left: 2px; margin-top: 8px; position: absolute; width: 32px; z-index: 15;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="white" height="37" style="-moz-background-clip: -moz-initial; -moz-background-inline-policy: -moz-initial; -moz-background-origin: -moz-initial; background: white none repeat scroll 0% 0%; border: 0.75pt solid black; vertical-align: top;" width="32"><span style="left: 0pt; position: absolute; z-index: 15;"> <table cellpadding="0" cellspacing="0"><tbody>
<tr> <td><div class="shape" style="padding: 4.35pt 7.95pt;" v:shape="_x0000_s1040"><div class="MsoNormal">A</div></div></td> </tr>
</tbody></table></span> </td> </tr>
</tbody></table></span> Cross<br />
<br />
<br />
<br />
<div style="color: #35383d; line-height: 17px;"><span style="font-size: x-small;"><b>3. <span class="Apple-style-span">Network Device</span></b></span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span"> - HUB </span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span"> </span><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"><b>Hub</b> adalah sebuah perangkat <a href="http://id.wikipedia.org/wiki/Jaringan_komputer" style="background-image: none; color: #0645ad; text-decoration: none;">jaringan komputer</a> yang berfungsi untuk menghubungkan peralatan-peralatan dengan <a href="http://id.wikipedia.org/wiki/Ethernet" style="background-image: none; color: #0645ad; text-decoration: none;">ethernet</a> <a href="http://id.wikipedia.org/wiki/10BaseT" style="background-image: none; color: #0645ad; text-decoration: none;">10BaseT</a> atau <a href="http://id.wikipedia.org/wiki/Serat_optik" style="background-image: none; color: #0645ad; text-decoration: none;">serat optik</a> sehingga menjadikannya dalam satu <a class="new" href="http://id.wikipedia.org/w/index.php?title=Segmen_jaringan&action=edit&redlink=1" style="background-image: none; color: #ba0000; text-decoration: none;" title="Segmen jaringan (halaman belum tersedia)">segmen jaringan</a>. Hub bekerja pada <a href="http://id.wikipedia.org/wiki/Lapisan_fisik" style="background-image: none; color: #0645ad; text-decoration: none;">lapisan fisik</a> (<i>layer 1</i>) pada <a href="http://id.wikipedia.org/wiki/Model_OSI" style="background-image: none; color: #0645ad; text-decoration: none;">model OSI</a>.</span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"></span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"><img src="http://upload.wikimedia.org/wikipedia/commons/thumb/d/d9/4_port_netgear_ethernet_hub.jpg/220px-4_port_netgear_ethernet_hub.jpg" /> </span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;">- Switch</span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"><span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;"></span></span></div><b>Switch jaringan</b> (atau <b>switch</b> untuk singkatnya) adalah sebuah alat jaringan yang melakukan <a class="new" href="http://id.wikipedia.org/w/index.php?title=Bridging_%28jaringan%29&action=edit&redlink=1" style="background-image: none; color: #ba0000; text-decoration: none;" title="Bridging (jaringan) (halaman belum tersedia)">bridging</a> transparan (penghubung segementasi banyak jaringan dengan<i>forwarding</i> berdasarkan <a class="mw-redirect" href="http://id.wikipedia.org/wiki/Alamat_MAC" style="background-image: none; color: #0645ad; text-decoration: none;" title="Alamat MAC">alamat MAC</a>)</div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"> </span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"> Perbedaan Hub dengan Swicth:<br />
- Hub lebih lambat dari pada Swicth. Swicth mempunyai perangkat Room yang berfungsi untuk mencari data informasi pada alamat yang ada pada komputer PC (NIC0.<br />
<br />
ROUTER<br />
Router berfungsi menghubungkan dua jaringan yang berbeda.<br />
<span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;"><b>outer</b> adalah sebuah alat <a href="http://id.wikipedia.org/wiki/Jaringan_komputer" style="background-image: none; color: #0645ad; text-decoration: none;">jaringan komputer</a> yang mengirimkan <a href="http://id.wikipedia.org/wiki/Paket_jaringan" style="background-image: none; color: #0645ad; text-decoration: none;" title="Paket jaringan">paket</a> <a href="http://id.wikipedia.org/wiki/Data" style="background-image: none; color: #0645ad; text-decoration: none;">data</a> melalui sebuah <a href="http://id.wikipedia.org/wiki/Jaringan_komputer" style="background-image: none; color: #0645ad; text-decoration: none;" title="Jaringan komputer">jaringan</a> atau <a href="http://id.wikipedia.org/wiki/Internet" style="background-image: none; color: #0645ad; text-decoration: none;">Internet</a>menuju tujuannya, melalui sebuah proses yang dikenal sebagai <i><a href="http://id.wikipedia.org/wiki/Routing" style="background-image: none; color: #0645ad; text-decoration: none;">routing</a></i>. Proses <i>routing</i> terjadi pada lapisan 3 (<a href="http://id.wikipedia.org/wiki/Lapisan_jaringan" style="background-image: none; color: #0645ad; text-decoration: none;">Lapisan jaringan</a> seperti <a class="mw-redirect" href="http://id.wikipedia.org/wiki/Internet_Protocol" style="background-image: none; color: #0645ad; text-decoration: none;" title="Internet Protocol">Internet Protocol</a>) dari <a class="new" href="http://id.wikipedia.org/w/index.php?title=Stack_protokol&action=edit&redlink=1" style="background-image: none; color: #ba0000; text-decoration: none;" title="Stack protokol (halaman belum tersedia)">stack protokol</a> <a href="http://id.wikipedia.org/wiki/Model_OSI" style="background-image: none; color: #0645ad; text-decoration: none;" title="Model OSI">tujuh-lapis OS</a></span></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"></div><div style="color: #35383d; font-size: 12px; line-height: 17px;"><span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;">BRIDGE</span><br />
<span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;">Bridge merupakan kebalikan dari Router, menghubungkan dua jaringan yang sama.</span><br />
Bridge merupakan sebuah perangkat atau alat yang menghubungkan beberapa jaringan untuk mendapatkan jaringan yang efiesien. Kebanyakan bridge dapat mengetahui masing-masing alamat dari tiap segmen komputer pada jaringan disekitarnya.<br />
Diibaratkan bahwa bridge seperti lalu lintas yang mengatur di persimpangan jalan pada saat jam-jam sibuk. Bridge mengatur agar informasi di antara kedua sisi jaringan tetap berjalan dengan baik dan teratur. Bridge juga dapat digunakan sebagai koneksi jaringan yang menggunakan tipe kabel yang berbeda ataupun topologi yang berbeda pula.<br />
<div class="separator" style="clear: both; text-align: left;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEJriUvMNiWWyUoPja5TEZp62bIzZjuX1OMpDpswgySj9HwDfICMPtBA5CVqsQD-OPomipOuWBRP3uDzfXrr6Y3Xb5lfINbgN-pz9j2sjwyUdMjXJbfxM2N_c6xVqwrKJOh6oyMoBroijt/s1600/bridge.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEJriUvMNiWWyUoPja5TEZp62bIzZjuX1OMpDpswgySj9HwDfICMPtBA5CVqsQD-OPomipOuWBRP3uDzfXrr6Y3Xb5lfINbgN-pz9j2sjwyUdMjXJbfxM2N_c6xVqwrKJOh6oyMoBroijt/s1600/bridge.jpg" /></a></div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<b> 4. Media Transmisi</b><br />
Terbagi dua:<br />
- Wire : - UTP<br />
- Fiber Optik<br />
- Coaxial<br />
- Wireless : - WiFi<br />
<b><br />
</b><br />
<b>5. NOS (Network Operating System)</b><br />
<b>Sistem operasi jaringan</b> (<a href="http://id.wikipedia.org/wiki/Bahasa_Inggris" title="Bahasa Inggris">Inggris</a>: <i><b>network operating system</b></i>) adalah sebuah jenis <a href="http://id.wikipedia.org/wiki/Sistem_operasi">sistem operasi</a> yang ditujukan untuk menangani <a href="http://id.wikipedia.org/wiki/Jaringan_komputer" title="Jaringan komputer">jaringan</a>. Umumnya, sistem operasi ini terdiri atas banyak layanan atau service yang ditujukan untuk melayani pengguna, seperti <a class="new" href="http://id.wikipedia.org/w/index.php?title=File_service&action=edit&redlink=1" title="File service (halaman belum tersedia)">layanan berbagi berkas</a>, <a class="new" href="http://id.wikipedia.org/w/index.php?title=Print_service&action=edit&redlink=1" title="Print service (halaman belum tersedia)">layanan berbagi alat pencetak (printer)</a>, <a class="mw-redirect" href="http://id.wikipedia.org/wiki/Domain_Name_System" title="Domain Name System">DNS Service</a>, <a class="mw-redirect" href="http://id.wikipedia.org/wiki/HTTP" title="HTTP">HTTP</a> Service, dan lain sebagainya. Istilah ini populer pada akhir dekade <a href="http://id.wikipedia.org/wiki/1980">1980</a>-an hingga awal dekade <a href="http://id.wikipedia.org/wiki/1990">1990</a>-an.<br />
<br />
<span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;"> </span><br />
<span class="Apple-style-span" style="font-size: 15.6px; line-height: 19px;"> </span><span class="Apple-style-span" style="color: black; font-size: 15.6px; line-height: 15px;"> </span></div></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-34929617911126931972011-03-03T00:15:00.000-08:002011-03-03T00:15:36.365-08:00Pertemuan Pertama<div style="font-family: Georgia,"Times New Roman",serif;">Komponen Dasar Jaringan</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;">1. komputer terdiri dari</div><div style="font-family: Georgia,"Times New Roman",serif;">a. CPU, </div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span" style="font-size: x-small;">Di dalam CPU terdapat Motherboard atau Mainboard(MB) yaitu papan utama untuk melekatkan / meletakkan perangkat. Kunci utama Mainboard adalah Chipshet.</span><br />
<br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><a href="https://lh6.googleusercontent.com/-6Dvs0mCe6Fk/TW5MkCH31WI/AAAAAAAAAFo/-kLuegazlpw/s1600/motherboard1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://lh6.googleusercontent.com/-6Dvs0mCe6Fk/TW5MkCH31WI/AAAAAAAAAFo/-kLuegazlpw/s200/motherboard1.jpg" width="175" /></a></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"><br />
</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;">Perbedaan CISC dan RISC</span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>CISC</strong> adalah singkatan dari <em><strong>Complex Intruction Set Computer</strong></em> dimana prosesor tersebut memiliki set instruksi yang kompleks dan lengkap. Sedangkan <strong>RISC</strong> adalah singkatan dari <em><strong>Reduced Instruction Set Computer</strong></em> yang artinya prosesor tersebut memiliki set instruksi program yang lebih sedikit. Karena perbedaan keduanya ada pada kata set instruksi yang kompleks atau sederhana (<em>reduced</em>), maka mari kita bahas sedikit tentang intruksi itu sendiri. </div><div style="font-family: Georgia,"Times New Roman",serif;"><span class="Apple-style-span"><span class="Apple-style-span" style="letter-spacing: 1px; line-height: 18px;"> </span></span></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"></div><div class="separator" style="clear: both; font-family: Georgia,"Times New Roman",serif; text-align: center;"><a href="https://lh6.googleusercontent.com/-6Dvs0mCe6Fk/TW5MkCH31WI/AAAAAAAAAFo/-kLuegazlpw/s1600/motherboard1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br />
</a></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-67611933930624942602011-01-08T18:06:00.001-08:002011-01-08T18:06:43.027-08:00Membuat Lima Pertanyaan<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span style="background-color: white;" title="23.">1. </span><span style="background-color: white;" title="Which two statements describe how the information contained in a BPDU is used by a switch?">Bagaimana gambaran informasi yang terkandung dalam BPDU yang digunakan oleh switch? </span><span title="(Choose two.)">(Pilih dua)</span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span style="background-color: white;" title="(Choose two.)"><span style="color: red;">• to determine which ports are placed in forwarding mode</span></span></span></span><span><span class="long_text" id="result_box"><span title="(Choose two.)"> </span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span style="background-color: white;" title="(Choose two.)"><span style="color: red;">• to determine the root bridge</span></span></span></span><span><span class="long_text" id="result_box"><span title="(Choose two.)"> </span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span style="background-color: white;" title="(Choose two.)">• to set the duplex mode of a redundant link<br />
• to activate looped paths throughout the network<br />
• to prevent loops by sharing routing tables between connected switches<br />
<span style="color: red;"></span></span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span title="(Choose two.)"><span style="color: red;"><br />
</span></span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif">2</span><span class="" title="Klik untuk terjemahan alternatif">.</span> <span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif"></span><span class="" title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif">Protokol yang</span> <span class="hps" title="Klik untuk terjemahan alternatif">akan</span> <span class="hps" title="Klik untuk terjemahan alternatif">digunakan</span> <span class="hps" title="Klik untuk terjemahan alternatif">untuk</span> </span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif">membuat</span> <span class="hps" title="Klik untuk terjemahan alternatif">panggilan</span> <span class="hps" title="Klik untuk terjemahan alternatif">VoIP</span></span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif"> (</span><span class="hps" title="Klik untuk terjemahan alternatif">paket</span> <span class="hps" title="Klik untuk terjemahan alternatif">suara)</span><span title="Klik untuk terjemahan alternatif">?</span><br />
<span class="hps" title="Klik untuk terjemahan alternatif">•</span> <span class="hps" title="Klik untuk terjemahan alternatif">TCP</span><b><span class="hps" style="color: red;" title="Klik untuk terjemahan alternatif"></span></b><br />
<span class="hps" title="Klik untuk terjemahan alternatif">•</span> <span class="hps" title="Klik untuk terjemahan alternatif">PPP</span><br />
<span class="hps" title="Klik untuk terjemahan alternatif">•</span> <span class="hps" title="Klik untuk terjemahan alternatif">HDLC</span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box" lang="id"><b><span class="hps" style="color: red;" title="Klik untuk terjemahan alternatif">•</span><span style="color: red;"> </span><span class="hps" style="color: red;" title="Klik untuk terjemahan alternatif">UDP</span></b></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><br />
</span> </div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box" lang="id"><b><span class="hps" style="color: red;" title="Klik untuk terjemahan alternatif"></span></b></span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif"></span><span title="Klik untuk terjemahan alternatif"></span><span class="hps" title="Klik untuk terjemahan alternatif">3. </span></span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif">Di dalam</span> <span class="hps" title="Klik untuk terjemahan alternatif">jaringan</span> <span class="hps" title="Klik untuk terjemahan alternatif">perusahaan</span></span><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif">, ada</span> <span class="hps" title="Klik untuk terjemahan alternatif">dua</span> <span class="hps" title="Klik untuk terjemahan alternatif">cara</span> <span class="hps" title="Klik untuk terjemahan alternatif">keanggotaan</span> <span class="hps" title="Klik untuk terjemahan alternatif">VLAN</span> <span class="hps" title="Klik untuk terjemahan alternatif">dapat</span> <span class="hps" title="Klik untuk terjemahan alternatif">dibuat. Bagaimana caranya</span> <span class="hps" title="Klik untuk terjemahan alternatif"></span><span title="Klik untuk terjemahan alternatif">?</span> <span class="hps atn" title="Klik untuk terjemahan alternatif">(</span><span title="Klik untuk terjemahan alternatif">Pilih</span> <span class="hps" title="Klik untuk terjemahan alternatif">dua</span><span title="Klik untuk terjemahan alternatif">.</span><span class="" title="Klik untuk terjemahan alternatif">)</span></span><span class="Apple-style-span" style="line-height: 16px;"><br />
• allowing the user to choose a specific VLAN through a GUI menu </span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="Apple-style-span" style="line-height: 16px;"><span style="color: red; margin: 0px; padding: 0px;">• manually configuring the switch ports to be part of a VLAN</span></span></span><span><span class="Apple-style-span" style="line-height: 16px;"> • configuring the switch to allow VLAN membership based on NetBIOS association <br />
• implementing an access list that specifies which devices are placed into specific VLANs. <span style="color: red; margin: 0px; padding: 0px;"></span><br />
• manually configuring the host devices to be part of a VLAN</span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="Apple-style-span" style="line-height: 16px;"><span style="color: red; margin: 0px; padding: 0px;">• associating MAC addresses to specific VLANs in a VLAN management policy server database</span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><br />
</span> </div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="long_text" id="result_box"><span style="background-color: white;" title="A company is developing an Internet store for its website.">4. Ada sebuah perusahaan sedang mengembangkan sebuah toko Internet untuk situs webnya. </span><span style="background-color: white;" title="Which protocol should be used to transfer credit card information from customers to the company web server?">Protokol apa yang harus digunakan untuk mentransfer informasi kartu kredit dari pelanggan ke web server perusahaan?</span></span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><span><span class="Apple-style-span" style="line-height: 16px;">• FTPS <br />
• HTTP <br />
<span style="color: red; margin: 0px; padding: 0px;">• HTTPS </span><br />
• WEP2 <br />
• TFTP </span></span></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="font-size: small;"><br />
</span> </div><span style="font-size: small;"><span style="font-family: Georgia,"Times New Roman",serif;"><span class="long_text" id="result_box" lang="id"><span class="hps" title="Klik untuk terjemahan alternatif">5</span><span class="" title="Klik untuk terjemahan alternatif">.</span> Apakah <span class="hps" title="Klik untuk terjemahan alternatif">jenis</span> <span class="hps" title="Klik untuk terjemahan alternatif">alamat</span> <span class="hps" title="Klik untuk terjemahan alternatif">dari 192.168.17.111/28</span><span title="Klik untuk terjemahan alternatif">?</span><br />
<span class="hps" title="Klik untuk terjemahan alternatif"></span></span><span class="Apple-style-span" style="line-height: 16px;">• host address <br />
• network address <br />
<span style="color: red; margin: 0px; padding: 0px;">• broadcast address</span> <br />
• multicast address</span></span></span>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-28341486527650030532011-01-08T17:52:00.001-08:002011-01-08T17:52:22.191-08:00Tugas CCNA 4 Labskill Chapter 10<div style="font-family: Georgia,"Times New Roman",serif;">Lab 10.0.2.2 Finding the Right Networking Job</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 1: Perform a Skills Strength and Interest Assessment</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 2: Search a job website for a possible IT position</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 3: Create a résumé and cover letter</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 4: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif;">What other areas related to applying for a job are not covered in this particular lab?</div><div style="font-family: Georgia,"Times New Roman",serif;">• Interviews: types of interviews that can be conducted, potential questions asked in interviews, preparing for an interview</div><div style="font-family: Georgia,"Times New Roman",serif;">· wawancara : tipe wawancara, pertanyaan berbobot yang ditanyakan saat interview, persiapan wawancara</div><div style="font-family: Georgia,"Times New Roman",serif;">· negosiasi mengenai gaji dan keuntungan yang didapat</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-46559263745658013622011-01-08T17:47:00.001-08:002011-01-08T17:47:19.807-08:00Tugas CCNA 4 Labskill Chapter 9<div class="post_content" style="font-family: Georgia,"Times New Roman",serif;"> <div style="text-align: justify;"><strong><span style="text-decoration: underline;">Lab 9.1.2 Editing and Organizing the Existing Information</span></strong></div><div style="text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="text-align: justify;"><strong>Step 1: Collate and organize the information</strong></div><div style="text-align: justify;">a. Gather and read through all the project documents that you created in previous labs.</div><div style="text-align: justify;">b. Ensure that multipage documents are together and that the pages are in the correct sequence.</div><div style="text-align: justify;"><strong>Step 2: Review the existing information</strong></div><div style="text-align: justify;">Ensure that the documents are complete and contain the information specified. Any incomplete documents, or missing information that was not recorded at the time of that lab, now need to be checked and included at this stage.</div><div style="text-align: justify;"><strong>Step 3: Organize the information</strong></div><div style="text-align: justify;">A project proposal typically contains the following sections:</div><table border="1" cellpadding="0" cellspacing="0"><tbody>
<tr> <td valign="top" width="168"> <div><strong>Section</strong></div></td> <td valign="top" width="427"> <div><strong>Description</strong></div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Executive Summary</strong></div></td> <td valign="top" width="427"> <div>Discusses the project goals and project scope at a high level. This section demonstrates that the network vendor understands the extent of the project and the role of the network in meeting the business goals. The goal of the summary is to convince the decision-makers of the business benefits of the design. This section is typically one to two pages long.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Network Requirements</strong></div></td> <td valign="top" width="427"> <div>Reviews the business goals and network requirements, including users and applications that need to be supported. This section often lists the business goals, in order of priority, with critical goals marked. This section includes the topologies; protocols, hardware, software, and training that are required to meet the business goals.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Current Network Environment</strong></div></td> <td valign="top" width="427"> <div>Documents the state of the existing network. This section includes physical and logical diagrams and the IP addressing scheme. The section summarizes the results of the network characterization, including strengths and weaknesses of the existing network. It also documents the user community and applications currently in use, based on the network characterization.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Proposed Physical Design</strong></div></td> <td valign="top" width="427"> <div>Describes the physical layout of the proposed design. This section</div><div>documents trade-offs made to accommodate business goals and technical requirements. The section describes the features and recommended uses for the technologies and devices proposed for the new network design. This section documents the new WAN service and new network equipment. The section also includes proposed network diagrams.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Proposed Logical Design</strong></div></td> <td valign="top" width="427"> <div>Describes the logical topology of the proposed network. This section</div><div>documents any proposed addressing and naming conventions. It describes the routing and switching protocols recommended for the planned network. This section includes recommended security mechanisms and products that support the security policy of the business. The section may include information on recommended network management procedures and applications.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Implementation Plan</strong></div></td> <td valign="top" width="427"> <div>Provides a detailed list of the tasks that must be performed to install and implement the new network. This section includes tasks, steps, time required, and proposed schedules.</div></td> </tr>
<tr> <td valign="top" width="168"> <div><strong>Cost Proposal</strong></div></td> <td valign="top" width="427"> <div>Provides cost proposal for equipment, software, installation, and ongoing</div></td> </tr>
</tbody> </table><div style="text-align: justify;"><strong>Step 4: Edit and finalize the information</strong></div><div style="text-align: justify;">a. Review all the materials to ensure that they are complete. It is important that the FilmCompany management and technical staff are able to easily find and understand the material contained in the proposal. A disorganized or incomplete proposal can cause the customer to choose another contractor to complete the project.</div><div style="text-align: justify;">b. Ensure that all the information has a consistent format and style. If necessary, edit or rewrite sections</div><div style="text-align: justify;">so that the proposal has the appearance of a single document and not a set of separate documents.</div><div style="text-align: justify;">c. Complete diagrams and other graphics and finalize what is to be included in the proposal.</div><div style="text-align: justify;">d. Clearly note those sections of the proposal that have to be completed; these sections will be compiled</div><div style="text-align: justify;">in the following labs.</div><div style="text-align: justify;">e. Save the word processing documents and file the hardcopy information in your portfolio.</div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 9.2.1 Creating an Implementation Plan</strong></span></div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="text-align: justify;"><strong>Step 1: Determine the tasks to implement the network design</strong></div><div style="text-align: justify;">Implementing a network design requires the completion of a set of tasks, such as installing hardware,</div><div style="text-align: justify;">configuring systems, testing the network, and launching the network into production. Each task consists of several steps.</div><div style="text-align: justify;">Each task requires the following documentation:</div><div style="text-align: justify;">• A description of the task</div><div style="text-align: justify;">• References to design documents</div><div style="text-align: justify;">• Detailed implementation guidelines</div><div style="text-align: justify;">• Detailed rollback guidelines in case of failure</div><div style="text-align: justify;">• The estimated time required for implementation</div><div style="text-align: justify;">• Completion sign-off</div><div style="text-align: justify;">Analyze the FilmCompany network design documentation that you have compiled in previous labs. Determine and list the three main sets of tasks required to be performed to implement the network upgrade. These sets of tasks will be referred to as phases.</div><div style="text-align: justify;">Phase 1</div><div style="text-align: justify;"><strong>Install Distribution and Core Layer equipment</strong></div><div style="text-align: justify;"><strong>Configure new IP addressing & VLAN scheme</strong></div><div style="text-align: justify;"><strong>Configure routing</strong></div><div style="text-align: justify;">Phase 2</div><div style="text-align: justify;"><strong>Upgrade the WAN connectivity</strong></div><div style="text-align: justify;"><strong>Extend the network to the remote site</strong></div><div style="text-align: justify;"><strong>Configure ACLs & security</strong></div><div style="text-align: justify;">Phase 3</div><div style="text-align: justify;"><strong>Install wireless/mobility network</strong></div><div style="text-align: justify;"><strong>Step 2: Note identified success and failure criteria</strong><strong> </strong></div><div style="text-align: justify;">When implementing a design, the possibility of a failure must be considered – even after a successful pilot or prototype network test. Each step of the implementation may require additional testing to ensure that the network operates as designed.</div><div style="text-align: justify;">In the Reflection section in Chapter 2, Lab 2.3.3, you considered success criteria when determining the</div><div style="text-align: justify;">objectives of the FilmCompany network upgrade. List two or three success or failure criteria for each phase of the project.</div><div style="text-align: justify;"><strong>Step 3: Include provision for customer approval</strong></div><div style="text-align: justify;">The Implementation Plan details the work required to accomplish the project goals. The plan includes the</div><div style="text-align: justify;">customer expectations and the success criteria for customer approval and project sign-off. As soon as customer approval of the implementation plan is obtained, the installation can begin. The customer is given a detailed list of all devices required and the work to be completed. This list forms part of the Implementation Plan. A signed copy of this list is kept by the network designer and account manager.</div><div style="text-align: justify;">Upon completion of each task, the customer is required to sign off that the work was completed and that the results are as expected.</div><div style="text-align: justify;">a. Include in the documentation a signature page for an authorized FilmCompany representative to sign</div><div style="text-align: justify;">and approve the Implementation Plan.</div><div style="text-align: justify;">b. Include in the documentation a signature page at the end of each task for an authorized</div><div style="text-align: justify;">FilmCompany representative to sign and accept the completion of each task.</div><div style="text-align: justify;"><strong>Step 4: Document Phase 1</strong></div><div style="text-align: justify;"><strong>Step 5: Document Phase 2</strong></div><div style="text-align: justify;"><strong>Step 5: Document Phase 3</strong></div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 9.2.2 Creating a Phased Installation Plan</strong></span></div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="text-align: justify;"><strong>Step 1: Compare the installation methods</strong></div><div style="text-align: justify;">There are three possible installation methods:</div><div style="text-align: justify;">• <strong>New installation</strong>, commonly referred to as a <em>green field installation</em></div><div style="text-align: justify;">• <strong>Phased installation </strong>into an existing, functioning network</div><div style="text-align: justify;">• <strong>Complete replacement</strong>, commonly referred to as a <em>fork-lift upgrade</em></div><div style="text-align: justify;">Consider and list the advantages and disadvantages of the three installation methods.</div><div style="text-align: justify;"><strong>New Installation</strong></div><div style="text-align: justify;">Advantages:</div><div style="text-align: justify;"><strong>Semua peralatan dan layanan dapat diinstal dan diuji pada saat yang sama.</strong><strong> </strong></div><div style="text-align: justify;"><strong>Rencana</strong><strong> </strong><strong>implementasi</strong><strong> </strong><strong>untuk</strong><strong> </strong><strong>jaringan</strong><strong> </strong><strong>baru</strong><strong> </strong><strong>kurang</strong><strong> </strong><strong>kompleks</strong><strong> </strong><strong>dibandingkan dengan dua</strong><strong> </strong><strong>jenis</strong><strong> </strong><strong>instalasi</strong><strong>.</strong><strong><br />
Jadwal lebih fleksibel daripada ketika jaringan yang ada di tempat.<br />
Ada gangguan minimal terhadap perusahaan.</strong><strong> </strong></div><div style="text-align: justify;">Disadvantages:</div><div style="text-align: justify;"><strong>M</strong><strong>odal</strong><strong> </strong><strong>besar </strong><strong>karena</strong><strong> </strong><strong>semua</strong><strong> </strong><strong>peralatan dan</strong><strong> </strong><strong>layanan</strong><strong> </strong><strong>yang diinstal</strong><strong> </strong><strong>pada waktu</strong><strong> </strong><strong>yang sama</strong><strong>.</strong><strong> </strong></div><div style="text-align: justify;"><strong>Phased Installation into Existing Network</strong></div><div style="text-align: justify;">Advantages:</div><div style="text-align: justify;"><strong>Bagian-bagian dari</strong><strong> </strong><strong>upgrade</strong><strong> </strong><strong>jaringan</strong><strong> </strong><strong>diimplementasikan dalam</strong><strong> </strong><strong>isolasi</strong><strong> </strong><strong>dari</strong><strong> </strong><strong>bagian</strong><strong> </strong><strong>yang sedang berjalan.</strong><strong><br />
Upgrade jaringan dibagi menjadi potongan-potongan kecil yang dapat diinstal dan diuji dengan cepat.<br />
Instalasi upgrade secara bertahap yang lebih kecil menyebabkan sedikitnya jumlah downtime.</strong><strong> </strong></div><div style="text-align: justify;">Disadvantages:</div><div style="text-align: justify;"><strong>Sebuah penerapan secara bertahap membutuhkan perencanaan yang lebih </strong><strong> </strong><strong>rinci dengan</strong><strong> </strong><strong>pelanggan.</strong><strong> </strong></div><div style="text-align: justify;"><strong>Complete Network Replacement</strong></div><div style="text-align: justify;">Advantages:</div><div style="text-align: justify;"><strong>Jaringan yang ada bisa tetap </strong><strong>ber</strong><strong>operasi sepenuhnya sampai jaringan pengganti dibawa ke dalam produksi.</strong><strong> </strong></div><div style="text-align: justify;">Disadvantages:</div><div style="text-align: justify;"><strong>Kedua</strong><strong> </strong><strong>jaringan</strong><strong> </strong><strong>mungkin</strong><strong> </strong><strong>beroperasi</strong><strong> </strong><strong>secara paralel</strong><strong> </strong><strong>untuk</strong><strong> </strong><strong>beberapa</strong><strong> </strong><strong>waktu</strong><strong>, </strong><strong>yang</strong><strong> </strong><strong>meningkatkan</strong><strong> </strong><strong>biaya operasi</strong><strong> </strong><strong>dan</strong><strong> </strong><strong>dapat menyebabkan kebingungan</strong><strong> </strong><strong>dan</strong><strong> </strong><strong>dukungan</strong><strong> </strong><strong>bagi </strong><strong>pemakai</strong><strong> </strong></div><div style="text-align: justify;"><strong>Step 2: Select the installation method</strong></div><div style="text-align: justify;">Two of the FilmCompany requirements are:</div><div style="text-align: justify;">• The company network services must be available during the upgrade.</div><div style="text-align: justify;">• Existing equipment must be used in the new network design.</div><div style="text-align: justify;">Select the appropriate installation approach for the FilmCompany network upgrade.</div><div style="text-align: justify;"><strong>Pendekatan </strong><strong>i</strong><strong>nstalasi bertahap akan digunakan untuk proyek ini</strong><strong> </strong></div><div style="text-align: justify;"><strong>Step 3: Complete the details for the installation phases</strong></div><div style="text-align: justify;">Using the charts created in Lab 9.2.1; fill out the information for each of the Installation Phases.</div><div style="text-align: justify;">a. On the table created in Lab 9.2.1 for Phase 1, fill in the Task/Step, Description, and Implementation</div><div style="text-align: justify;">Details information:</div><div style="text-align: justify;">• Install Distribution and Core Layer equipment</div><div style="text-align: justify;">• Configure new IP addressing & VLAN scheme</div><div style="text-align: justify;">• Configure routing</div><div style="text-align: justify;">b. On the table for Phase 2, fill in the Task/Step, Description, and Implementation Details information:</div><div style="text-align: justify;">• Upgrade the WAN connectivity</div><div style="text-align: justify;">• Extend the network to the remote site</div><div style="text-align: justify;">• Configure Access Control Lists & security</div><div style="text-align: justify;">c. On the table for Phase 3, fill in the Task/Step, Description, and Implementation Details information:</div><div style="text-align: justify;">• Install and configure the wireless and associated mobility network equipment</div><div style="text-align: justify;"><strong><span style="text-decoration: underline;">Lab 9.2.3 Creating a Timeline</span></strong></div><div style="text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="text-align: justify;"><strong>Step 1: List and prioritize the factors affecting the timeline</strong></div><div style="text-align: justify;">Note issues such as equipment and material availability, skilled personnel, and customer requirements that should be considered for the following factors when developing a project timeline. Consider the possibility that the project might not begin on the proposed start date.</div><div style="text-align: justify;">Equipment order and delivery</div><div style="text-align: justify;">Service installation, such as WAN links</div><div style="text-align: justify;">Customer schedule, including available maintenance and downtime windows</div><div style="text-align: justify;">Availability of appropriate technical personnel</div><div style="text-align: justify;"><strong>Step 2: Complete the time details for each installation phase</strong></div><div style="text-align: justify;">The FilmCompany network upgrade is linked to the StadiumCompany network redevelopment. It would be efficient to align the FilmCompany stadium remote site work with that project. The StadiumCompany RFP states that the project must be completed during the off-season for the two teams. This requirement gives the project a timeline of four months, which can be also applied to the FilmCompany upgrade.</div><div style="text-align: justify;">a. On the table created in Lab 9.2.1 for Phase 1, fill in the Date information:</div><div style="text-align: justify;">• Install Distribution and Core Layer equipment</div><div style="text-align: justify;">• Configure new IP addressing & VLAN scheme</div><div style="text-align: justify;">• Configure routing</div><div style="text-align: justify;">b. On the table for Phase 2, fill in the Date information:</div><div style="text-align: justify;">• Upgrade the WAN connectivity</div><div style="text-align: justify;">• Extend the network to the remote site</div><div style="text-align: justify;">• Configure Access Control Lists & security</div><div style="text-align: justify;">c. On the table for Phase 3, fill in the Date information:</div><div style="text-align: justify;">• Install and configure the wireless and associated mobility network equipment</div><div style="text-align: justify;"><strong>Step 3: Consider customer-caused delays</strong></div><div style="text-align: justify;">Customers may make changes to the requirements during the installation of a project. When changes occur, the timeline is used to make adjustments to personnel and other available resources. The timeline</div><div style="text-align: justify;">documentation can also be used to show the customer how delays affect the project completion date.</div><div style="text-align: justify;">Based on the timeline, write a project variation statement showing the possible delay in the project completion date if the FilmCompany decided at this stage to relocate an additional three production staff and their workstations to the stadium.</div><div style="text-align: justify;"><strong>Step 4: Using project management software (Optional)</strong></div><div style="text-align: justify;">Project management tools such as Microsoft Project can be used to create a project timeline. This software can be useful for:</div><div style="text-align: justify;">• Tracking the progress of the project</div><div style="text-align: justify;">• Keeping the project on schedule</div><div style="text-align: justify;">• Identifying milestones</div><div style="text-align: justify;">• Tracking labor assignments and costs</div><div style="text-align: justify;">• Alerting the designer if the project is falling behind schedule.</div><div style="text-align: justify;">If this software is available, enter the resources and timeline for one phase of the Implementation Plan and examine the output.</div><div style="text-align: justify;"><strong><span style="text-decoration: underline;">Lab 9.2.4 Creating an Installation Schedule</span></strong></div><div style="text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="text-align: justify;"><strong>Step 1: List and prioritize the tasks that require downtime on the current network</strong></div><div style="text-align: justify;">List the tasks that require network downtime.</div><div style="text-align: justify;"><strong>Step 2: Document the required downtime on the project timeline</strong></div><div style="text-align: justify;">Sometimes it is not possible to complete all of the required tasks during an approved maintenance window. If an installation task requires the network, or part of the network, to be down during normal business hours, it is important to obtain permission from the customer. As soon as the time frame is determined and approved, all the people involved need to be notified accordingly.</div><div style="text-align: justify;">a. List those tasks that can be completed during a scheduled maintenance window.</div><div style="text-align: justify;">b. List those tasks that require the network to be down during normal business hours.</div><div style="text-align: justify;"><strong>Step 3: Document customer approved downtime</strong></div><div style="text-align: justify;">a. Indicate on the Installation Plan Timeline when the network downtime will occur.</div><div style="text-align: justify;">b. Include a provision for customer approval to be recorded for this downtime.</div><div style="text-align: justify;">c. Include a task that requires that the users who will be affected are notified with adequate advance</div><div style="text-align: justify;">notice of the network downtime. Ensure that the users are also notified when the network or service</div><div style="text-align: justify;">returns to full operation.</div><div style="text-align: justify;"><strong><span style="text-decoration: underline;">Lab 9.3.4 Creating the Bill Of Material</span></strong></div><div style="text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="text-align: justify;"><strong>Step 1: List the items required</strong></div><div style="text-align: justify;">a. Use the table below, or create a similar one, to list all the items and equipment that need to be</div><div style="text-align: justify;">purchased for the FilmCompany network upgrade project.</div><div style="text-align: justify;">b. Search the Internet or use information provided by your instructor to add possible suppliers or</div><div style="text-align: justify;">vendors to the BOM table.</div><div style="text-align: justify;">c. Add costs to the BOM. Where possible, obtain costs from local vendors and suppliers. If this</div><div style="text-align: justify;">information is not readily available, your instructor will provide estimated costs for you to use.</div><div style="text-align: justify;"><strong>Step 2: Determine the software requirements</strong></div><div style="text-align: justify;">a. During the early stages of the network Design Phase, existing applications were identified. Add new</div><div style="text-align: justify;">applications required by the network upgrade to the BOM. Categorize these as either Network or Specialist applications.</div><div style="text-align: justify;">b. Add the new applications, installation costs, and required training to the BOM with the identified</div><div style="text-align: justify;">hardware. Also indicate whether the network upgrade requires additional licenses to be purchased for</div><div style="text-align: justify;">existing software applications.</div><div style="text-align: justify;"><strong>Step 3: Add maintenance contracts</strong></div><div style="text-align: justify;">a. Investigate the maintenance support service contracts available for both the new and existing equipment.</div><div style="text-align: justify;">b. Add the details and costs to the BOM.</div><div style="text-align: justify;"><strong>Step 4: Create the BOM</strong></div><div style="text-align: justify;">a. Create the BOM using word processing or spreadsheet software. Using a spreadsheet will facilitate the calculation of total costs and enable easy updating of the document if costs or quantities are amended.</div><div style="text-align: justify;">b. Save this file and include it in the proposal document. Add a hardcopy of the file to your portfolio.</div><div style="text-align: justify;"><strong><span style="text-decoration: underline;">Lab 9.4.1 Compiling the Documentation</span></strong></div><div style="text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="text-align: justify;"><strong>Task 1: Compile the Project Proposal</strong></div><div style="text-align: justify;"><strong>Step 1: Finalize the documentation requirements</strong></div><div style="text-align: justify;">a. Finalize the documentation created in the previous labs and in your project portfolio.</div><div style="text-align: justify;">b. Insert and compile the information under the following headings:</div><div style="text-align: justify;">• Executive Summary</div><div style="text-align: justify;">• Network Requirements</div><div style="text-align: justify;">• Current Network Environment</div><div style="text-align: justify;">• Proposed Physical Design</div><div style="text-align: justify;">• Proposed Logical Design</div><div style="text-align: justify;">• Implementation Plan</div><div style="text-align: justify;">• Cost Proposal</div><div style="text-align: justify;"><strong>Step 2: Prepare the cover page</strong></div><div style="text-align: justify;">Include a cover page at the beginning of the proposal. The cover page describes the proposal, including the RFP or solicitation number and date, the customer contact information, and the vendor name and contact information.</div><div style="text-align: justify;"><strong>Step 3: Prepare the Table of Contents</strong></div><div style="text-align: justify;">Develop a Table of Contents for the proposal document.</div><div style="text-align: justify;"><strong>Step 4: Create the proposal</strong></div><div style="text-align: justify;">Complete the proposal document. The proposal layout should be highly readable and should aid the reader in locating information.</div><div style="text-align: justify;">• Use graphics to enhance the readability of a proposal and convey information where appropriate.</div><div style="text-align: justify;">• Text should be legible, typically a serif typeface such as Times Roman, at 10-point to 12-point type.</div><div style="text-align: justify;">• Page margins should be at least 0.5 inches (125mm).</div><div style="text-align: justify;">• Page numbers should be included at the top or bottom of each page.</div><div style="text-align: justify;"><strong>Step 5: Update the Executive Summary</strong></div><div style="text-align: justify;">Use information from the completed implementation and costing sections to update the Executive Summary.</div><div style="text-align: justify;"><strong>Step 6: Organize the Proposal binder</strong></div><div style="text-align: justify;">Arrange the proposal components in a binder, based on the order cited in the Table of Contents.</div><div style="text-align: justify;"><strong>Step 7: Prepare Terms and Signatures page</strong></div><div style="text-align: justify;">a. Prepare the terms of agreement and an acceptance page for customer signatures to be included at</div><div style="text-align: justify;">the end of the proposal. The terms and conditions describe all relevant legal terms and contracts that</div><div style="text-align: justify;">will be required. These terms and conditions support the supply of goods and services related to</div><div style="text-align: justify;">network improvements and installations.</div><div style="text-align: justify;">Important clauses in the terms and conditions usually include:</div><div style="text-align: justify;">• Details about the proposal expiration date</div><div style="text-align: justify;">• Obligations of the customer to obtain permission or other consents within their organization</div><div style="text-align: justify;">• Obligations of the vendor to provide services and equipment with care and skill</div><div style="text-align: justify;">• Dates when completed milestone deliverables are payable</div><div style="text-align: justify;">• Interest chargeable on outstanding payments</div><div style="text-align: justify;">• The amount of notice the customer must give to cancel their equipment and service orders</div><div style="text-align: justify;">• Details about guarantees (if any) provided by the vendor</div><div style="text-align: justify;">• Details about escalating and resolving complaints or issues</div><div style="text-align: justify;">If the customer accepts the proposal, an appropriate customer representative signs the Terms and</div><div style="text-align: justify;">Signatures page.</div><div style="text-align: justify;">Your instructor will advise of the standard terms and conditions that will apply to all proposals.</div><div style="text-align: justify;">b. Save this file and include in the proposal document.</div><div style="text-align: justify;"><strong>Task 2: Prepare the Presentation</strong></div><div style="text-align: justify;"><strong>Step 1: Plan the presentation</strong></div><div style="text-align: justify;">After compiling a proposal, network designers review the entire proposal with their management organization by means of a formal presentation. During this stage of the design proposal, the designer must first sell the concept to the internal management and then to the customer.</div><div style="text-align: justify;">For your presentation, list the important points to include that illustrate the proposal. A proposal presentation includes slides or other visual aids to graphically represent the proposal. The presentation, along with the proposal document, is vital to ensuring a successful meeting and increasing the probability of a customer sign-off.</div><div style="text-align: justify;"><strong>Step 2: Create the presentation</strong></div><div style="text-align: justify;">This step assumes that the presentation will use MS PowerPoint or equivalent presentation software. Your instructor will advise of the presentation requirements and resources available.</div><div style="text-align: justify;">a. The content and presentation format are important in a business environment. Create a presentation</div><div style="text-align: justify;">that considers the following points:</div><div style="text-align: justify;">• Every slide should have a heading that summarizes the information presented on the slide.</div><div style="text-align: justify;">• Computer presentations should not contain full paragraphs of text. Use a bulleted list or</div><div style="text-align: justify;">outline format and elaborate on the points during the delivery.</div><div style="text-align: justify;">• All type should be legible. Use large fonts, because small fonts are often hard to read.</div><div style="text-align: justify;">• Use contrasting colors – either a dark background with light text or a light background with</div><div style="text-align: justify;">dark text.</div><div style="text-align: justify;">• Keep the format and style consistent throughout the presentation. Do not change text font,</div><div style="text-align: justify;">text color, background color, or theme except for an occasional special emphasis.</div><div style="text-align: justify;">• Avoid backgrounds that make the text hard to read. Keep the background simple.</div><div style="text-align: justify;">• Do not use ALL CAPS! Their use is unprofessional and they are also more difficult to read.</div><div style="text-align: justify;">• Include a combination of words, pictures, and graphics. Variety keeps the presentation</div><div style="text-align: justify;">interesting.</div><div style="text-align: justify;">b. Save the presentation file and any other presentation aids that you created.</div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 9.4.2 Presenting the Project Proposal</strong></span></div><div style="text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="text-align: justify;"><strong>Task 1: Prepare for the Presentation</strong></div><div style="text-align: justify;"><strong>Step 1: Review the content</strong></div><div style="text-align: justify;">a. Ensure that your presentation is complete.</div><div style="text-align: justify;">b. Review the content to ensure that there are no technical errors.</div><div style="text-align: justify;">c. Rehearse the presentation to become familiar with the flow of the content and develop a sense of the</div><div style="text-align: justify;">timing required.</div><div style="text-align: justify;"><strong>Step 2: Prepare for questions</strong></div><div style="text-align: justify;">Your presentation may seem complete and clear to you, but to others there may be points that need clarifying or that contain too much information.</div><div style="text-align: justify;">Read through your presentation as if seeing it for the first time, Note the points that you would ask questions about. Remind yourself that you will not be able to prepare for every possible question.</div><div style="text-align: justify;"><strong>Step 3: Prepare yourself</strong></div><div style="text-align: justify;">Your instructor will advise you on the details (time. location, audience) of the presentation class. On the day of the presentation, try to observe the following guidelines:</div><div style="text-align: justify;">a. If possible, and appropriate, wear professional attire.</div><div style="text-align: justify;">b. Try not to be too nervous. The other students in your class are probably feeling the same as you are.</div><div style="text-align: justify;">c. If other students are presenting before or after you, give them your attention and participate in the</div><div style="text-align: justify;">class. Do not think too much about your presentation but focus instead on what is happening in the class.</div><div style="text-align: justify;"><strong>Task 2: Deliver the Presentation</strong></div><div style="text-align: justify;"><strong>Step 1: Submit your portfolio and proposal</strong></div><div style="text-align: justify;">a. Submit your portfolio and proposal to your instructor before delivering the presentation.</div><div style="text-align: justify;"><strong>Step 2: Begin the presentation</strong></div><div style="text-align: justify;">a. Introduce yourself.</div><div style="text-align: justify;">b. Deliver the presentation, using your portfolio and a slide presentation such as PowerPoint.</div><div style="text-align: justify;">• Speak slowly and clearly.</div><div style="text-align: justify;">• Stay with your slide sequence. A common mistake is to introduce material and then continue</div><div style="text-align: justify;">to talk about it in detail without advancing from the general overview slide for that topic to the</div><div style="text-align: justify;">detailed slides that follow.</div><div style="text-align: justify;">c. Demonstrate that you know the content of the proposal and sell it as the one that the customer should</div><div style="text-align: justify;">adopt.</div><div style="text-align: justify;">d. Be prepared to respond to questions from the instructors and students.</div><div style="text-align: justify;"><strong>Step 3: Conclude the presentation</strong></div><div style="text-align: justify;">a. Invite any final questions from the audience.</div><div style="text-align: justify;">b. Finish your presentation by assuring the audience that your proposal meets their requirements and</div><div style="text-align: justify;">thank them for the opportunity to present it.</div></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-73341278757486083802011-01-08T17:46:00.001-08:002011-01-08T17:46:05.815-08:00Tugas CCNA 4 Labskill Chapter 7<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><b>Lab 7.1.6 Analyzing a Test Plan and Performing a Test</b></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b><br />
</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Analyze the Test Plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Analyze the test plan shown above and answer the following questions:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. What are the four main sections of the test plan?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>1) Introduction, </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>2) Equipment, </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>3) Design / Topology Diagram, </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>4) Test Descriptions and related testing information. (Test procedure, success criteria, and conclusions subsections repeat for each test within the test plan.)</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How many tests are defined within the test plan in this lab?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In which testing subsection would you find the types of commands or analysis tools used to determine</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">if the test was successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Procedures</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. In which main test plan section would you find a description the devices and cabling used to build the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">prototype for the test plan?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Equipment</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. In which main testing section would an overall description of the tests to be performed and the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reasons why they are being specified in the test plan?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Introduction</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Configure the PCs and switch VLANs and perform Test 1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Connect devices and configure PC IP addresses</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Connect the switch to the router as shown in the Test Plan topology diagram.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Connect the PC1 and PC2 hosts to the switch using the ports indicated in the Test Plan topology table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the IP address information from the Test Plan table, configure PC1 and PC2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Prepare the switch for configuration</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Connect a PC with a console cable to the switch to perform configurations using a terminal emulation</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program. Confirm that the switch is ready for lab configuration by ensuring that all existing VLAN and general configurations are removed. Remove the switch startup configuration file from NVRAM.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Switch#<b>erase startup-config</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erasing the nvram filesystem will remove all files! Continue? [confirm]</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Press <b>Enter </b>to confirm. The response should be:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase of nvram: complete</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the switch has previously been configured with VLANs, it will necessary to delete the VLAN</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">database information file. From the privileged EXEC mode, issue the following commands:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Switch#<b>delete vlan.dat</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Delete filename [vlan.dat]?<b>[Enter]</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Delete flash:/vlan.dat? [confirm] <b>[Enter]</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If there was no VLAN file, this message is displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">%Error deleting flash:/vlan.dat (No such file or directory)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">It is recommended that the <b>delete </b>command not be issued as: <b>delete flash:vlan.dat</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Accidentally omitting <b>vlan.dat </b>from this command could lead to the complete IOS being deleted</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">from flash memory. Issuing the <b>reload </b>command to restart the switch may not always clear the previous VLAN configuration; for that reason, the power cycle (hardware restart) step is recommended.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Configure VLANs on switch S1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure switch S1 with a hostname and passwords.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Switch(config)#<b>hostname FC-ASW-1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>enable password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>enable secret class</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>line console 0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>login</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>line vty 0 15</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>login</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-line)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure switch S1 with the VLAN 1 IP address of 10.0.1.2/24.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>interface vlan1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>ip address 10.0.1.2 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>no shutdown</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure switch S1 with the default gateway address of 10.0.1.1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>ip default-gateway 10.0.1.1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Create VLAN 10 named <b>main-net </b>and VLAN 20 named <b>voice</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>vlan 10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-vlan)#<b>name main-net</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-vlan)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-vlan)#<b>vlan 20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-vlan)#<b>name voice</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-vlan)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Assign interface range Fa0/2 through Fa0/12 to VLAN 10.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>interface range fa0/2 – 12</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>switchport access vlan 10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Assign interface range Fa0/13 through Fa0/24 to VLAN 20.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>interface range fa0/13 – 24</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>switchport access vlan 20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if-range)#<b>end</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Perform Test 1 to determine if the hosts can communicate between VLANs</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Issue the <b>show running-config </b>commands from the switch and verify all basic configuration</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">settings. See output at end of lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Issue the <b>show vlan brief </b>command on the switch to verify what ports are in which VLANs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which switch ports are in VLAN 1?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Fa0/1 Gi0/1, Gi0/2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which switch ports are in VLAN 10?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Fa0/2 – Fa0/12</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which switch ports are in VLAN 20?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Fa0/13 – Fa0/24</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#<b>show vlan brief</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">VLAN Name Status Ports</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 default active Fa0/1, Gi0/1, Gi0/2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10 main-net active Fa0/2, Fa0/3, Fa0/4, Fa0/5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/6, Fa0/7, Fa0/8, Fa0/9</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/10, Fa0/11, Fa0/12</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">20 voice active Fa0/13, Fa0/14, Fa0/15, Fa0/16</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/17, Fa0/18, Fa0/19, Fa0/20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/21, Fa0/22, Fa0/23, Fa0/24</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><*** output omitted ***></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. With PC1 connected to switch port 4 and PC2 attached to port 14, attempt to ping from PC1 to PC2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would you expect the ping to be successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Tidak</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why or why not?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">PC IP addresses are on different networks (PC1 is on net 10.0.10.0/24 and PC2 is on net 10.0.20.0/24 and in different VLANs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Change the IP address of PC2 to 10.0.10.5 so that the two PCs are on the same network and ping again. Would you expect the ping to be successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Tidak</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why or why not?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Alamat IP PC punya alamat jaringan yang sama tapi masih di VLAN yang berbeda</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Move the cable for PC2 to a port that is in the VLAN 10 range (Fa0/2 to Fa0/12) and ping again.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would you expect the ping to be successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why or why not?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Alamat IP PC berada pada jaringan dan VLAN yang sama</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Change the IP address for PC2 back to 10.0.20.2 and move the cable back to Fa0/14 in VLAN 20.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This test demonstrated that the PCs from the main-net cannot communicate with the PCs on the voice net without assistance from a Layer 3 device.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Configure the switch and router for VLAN routing and perform Test 2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Configure VLAN trunking on switch S1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure trunking between switch S1 and the router with 802.1 encapsulation on both devices.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#<b>int fa0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>end</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Perform basic configuration of the router.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Connect a PC to the console port of the router to perform configurations using a terminal emulation</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program. Configure router R1 with a hostname and console, Telnet, and privileged passwords according to the table diagram.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Router(config)#<b>hostname FC-CPE-1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>line con 0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>login</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>line vty 0 4</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>login</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-line)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>enable password cisco</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>enable secret class</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>no ip domain lookup</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Configure VLAN Trunking on the Router</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure router R1 Fa0/0 interface to trunk for VLAN 1, VLAN 10, and VLAN 20 with 802.1Q</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">encapsulation.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>interface fa0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<b>no shutdown</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<b>interface fa0/0.1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>encapsulation dot1Q 1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>ip address 10.0.1.1 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>interface fa0/0.10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>encapsulation dot1Q 10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>ip address 10.0.10.1 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>exit</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<b>interface fa0/0.20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>encapsulation dot1Q 20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>ip address 10.0.20.1 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-subif)#<b>end</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On the router, issue the command <b>show vlans</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What information is displayed?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The 802.1Q trunk subinterfaces, the address configured and the number of packet transmitted and received</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#show vlans</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Virtual LAN ID: 1 (IEEE 802.1Q Encapsulation)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">vLAN Trunk Interface: FastEthernet0/0.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This is configured as native Vlan for the following interface(s) :</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocols Configured: Address: Received: Transmitted:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP 10.0.1.1 21 43</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Other 0 138</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">396 packets, 67954 bytes input</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">181 packets, 51149 bytes output</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Virtual LAN ID: 10 (IEEE 802.1Q Encapsulation)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">vLAN Trunk Interface: FastEthernet0/0.10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocols Configured: Address: Received: Transmitted:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP 10.0.10.1 94 25</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Other 0 12</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">94 packets, 15324 bytes input</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">37 packets, 3414 bytes output</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Virtual LAN ID: 20 (IEEE 802.1Q Encapsulation)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">vLAN Trunk Interface: FastEthernet0/0.20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocols Configured: Address: Received:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Transmitted:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP 10.0.20.1 9781 113</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Other 0 14</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">9781 packets, 939660 bytes input</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">127 packets, 9617 bytes output</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From switch S1, issue the command <b>show interfaces trunk</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What interface on switch S1 is in trunking mode?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Fa0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which VLANs are allowed and active in the management domain?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>1, 10, 20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#show interfaces trunk</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Mode Encapsulation Status Native vlan</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 on 802.1q trunking 1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Vlans allowed on trunk</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 1-4094</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Vlans allowed and active in management domain</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 1,10,20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Vlans in spanning tree forwarding state and not pruned</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 1,10,20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Perform Test 2 to determine if the hosts can communicate between VLANs through the use of inter-vlan routing provide by a router</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Issue the <b>show running-config </b>commands from the switch and verify all basic configuration</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">settings. See output at end of lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Ping from the switch to the router default gateway for VLAN 1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Was the ping successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Telnet from the switch to the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Where you successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. With PC1 connected to switch port 4 and PC2 attached to port 14, attempt to ping from PC1 to PC2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would you expect the ping to be successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why or why not?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>PC IP addresses are on different networks (PC1 is on net 10.0.10.0/24 and PC2 is on net 10.0.20.0/24 and in different VLANs but the router is routing packet between the two independent subnets.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Telnet from PC1 to the switch and the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would you expect the Telnet to be successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why or why not?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Physical and IP connectivity has been previously verified. As long as there are no VTY restrictions or ACLs in place, each PC should be able to telnet to either the switch using the VLAN1 IP address or to the router using any of the router subinterface addresses</b>.<b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Issue the <b>show ip route </b>command on the router to display the routing table. How many subnet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">routes are there?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>3 – All directly connected to the subinterfaces defined for Fa0/0.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>(10.0.1.0, 10.0.10.0 and 10.0.20.0)</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#show ip route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">E1 – OSPF external type 1, E2 – OSPF external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">level-2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ia – IS-IS inter area, * – candidate default, U – per-user</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">static route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">o – ODR, P – periodic downloaded static route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Gateway of last resort is not set</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10.0.0.0/24 is subnetted, 3 subnets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 10.0.10.0 is directly connected, FastEthernet0/0.10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 10.0.1.0 is directly connected, FastEthernet0/0.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 10.0.20.0 is directly connected, FastEthernet0/0.20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 4: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why is it important to develop a test plan and prototype network behavior?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Sebuah rencana uji menyediakan dokumen terstruktur digunakan untuk menguji dan membutuhkan tester untuk berpikir dengan hati-hati tentang bagaimana fungsi jaringan untuk diuji dan dievaluasi. Ini membantu untuk membuktikan bahwa hasil yang diharapkan adalah nyata dan bahwa jaringan akan tampil seperti yang diharapkan. Ini berfungsi untuk mendokumentasikan hasil dari upaya pengujian.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b><br />
</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><b>Lab 7.2.2 Creating a Test Plan for the Campus Network</b></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Review the Supporting Documentation</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Refer to the proposed LAN Design Topology diagram created in Lab 5.2.4</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Make a list of all the necessary equipment and cables required to build the LAN portion of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">proposed network design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Make a list of all the VLANs required to implement the design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Review the proposed IP Address Allocation spreadsheet created in Lab 6.2.5</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine the appropriate IP addressing for the devices identified in Step 1a.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine an appropriate IP address range for each VLAN identified in Step 1b.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Create the LAN Design Test Plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The format used to create the test plans may vary. The format used for this and subsequent labs is similar to the document used by the Cisco Customer Proof-of-Concept Labs. It is divided into sections to make it easier to read and understand. The test plan is a formal document that can be included in a proposal. It verifies that the design functions as expected. Many times, customer representatives are invited to view the prototype tests. In these cases, the customer can review the design and see for themselves that the network meets the requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Review the contents of the test plan document</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Download and review the LAN Design Test Plan. Record a description of each section and what types of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">information each section requires you to enter.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Introduction:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Equipment:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Design and Topology:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test Description:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test Procedures:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test Expected Results and Success Criteria:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test Results and Conclusions:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Appendix:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Complete the Introduction section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In this example test plan, much of the information has already been entered for you.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter the purpose of the test.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Think about why you want to test the LAN portion of the design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter what functions of the LAN design you intend to test.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Three tests are entered for you to use with this test plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Test 1: Basic Connectivity</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Test 2: VLAN Configuration</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Test 3: VLAN Routing.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Complete the Equipment Section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the information you recorded in Task 1, Step 1a, fill in the chart in the equipment section. List</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">all network devices and cables. Two personal computers are already listed to assist in the testing of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the design. If your school lab does not include the required equipment for the design, discuss possible substitute models with your instructor.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Complete the Design and Topology Section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Copy the LAN topology from the diagram created previously in Lab 5.2.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter the IP addressing information recorded in Task 1, Step 2a, in the IP Address Plan chart.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter the VLAN names and IDs recorded in Task 1, Steps 1b and 2b, in the VLAN plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter any additional information that you want the technician performing the test to be aware of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">before the test begins.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 5: Complete the Test Description, Procedures, and Expected Results sections of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the Test Description section, enter the goals for each of the three tests that you plan to perform.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Test 1 is completed as an example of how to fill in the information. In the Test Procedures section, enter the steps that are necessary to perform each planned test. In the Expected Results and Success Criteria section, enter what you expect the results to be if all the steps in the Test Procedures section are followed correctly. Determine what results need to be observed for the test to be considered a success.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 7.2.5 Testing the FilmCompany Network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Build the prototype network</b></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Select the necessary equipment and cables as specified in the Equipment section of the test plan.</li>
<li>See your instructor for assistance in identifying the appropriate equipment.</li>
<li>Using the topology diagram and IP address plan contained in the Design and Topology Diagram section of the test plan, connect and configure the prototype network.</li>
<li>Following the procedures in the Test 1: Procedures section, console into one of the devices and verify that you can ping all of the other device addresses. If you are unsuccessful, verify each device configuration. Repeat the connectivity testing.</li>
<li>Copy and paste the initial device configurations into a document using Notepad or a word processing program. Save or print the document to include with the completed test plan.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Verify the functionality of the prototype network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Following the procedures in the Test 1: Procedures, execute the various commands and record the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">results of the testing.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Copy and paste the output of the various commands into a document using Notepad or a word</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">processing program. Save or print the document to include with the completed test plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Record the test results in the Results and Conclusions section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Compare the results that you observed during the testing with the expected results listed in the Test</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1: Expected Results and Success Criteria section.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the testing indicates that the network meets the success criteria. If it does, indicate that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the test is successful.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Perform Test 2: VLAN Configuration Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Step 1: Configure the prototype network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Step 2: Verify the VLAN configuration design</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Step 3: Record the test results in the Results and Conclusions section of the test plan</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Perform Test 3: VLAN Routing Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Configure the prototype network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Follow the steps you created in the Test 3: Procedures section of the test plan to configure the router</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">to route between VLANs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the topology diagram shown in the Design and Topology Diagram section of the test plan,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configure the appropriate router to route between the VLANs created in Task 2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Following the steps you listed in the Test 3: Procedures section, console into the switch that is directly</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">connected to the router. Configure the link between the switch and the router as an 802.1q trunk link</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">and permit all VLANs across the trunk.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Console into the router and configure the router interface directly connected to the switch for 802.1q</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">encapsulation.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Configure the router with the appropriate IP addresses for the various VLANs. Verify that the routes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">appear correctly in the routing table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Copy and paste the initial device configurations into a document using Notepad or a word processing</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program. Save or print the document to include with the completed test plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Verify the VLAN routing design</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Verify that the PCs are configured to be in different VLANs and that the IP address configuration on</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the PCs is correct. Configure the IP addresses assigned to the router, in Step 1e, as the default</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">gateway addresses for the PCs. Verify that the default gateway addresses are on the same networks</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">as the addresses assigned to the PCs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Following the procedures in the Test 3: Procedures, ping from PC1 to PC2. Copy and paste the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">results into a document using Notepad or a word processing program. Save or print the document to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">include with the completed test plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Execute the various <b>show </b>commands to verify that the routing is correct.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Record the results in the Test 3: Results and Conclusions section of the test plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Record the test results in the Results and Conclusions section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Compare the results that you observed during the testing with the expected results listed in the Test 3: Expected Results and Success Criteria section.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Determine if the testing indicates that the network meets the success criteria. If it does, indicate that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the test is successful.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Was the prototype testing of the FilmCompany LAN design successful? Did having a test plan to work from help you organize your testing?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 7.2.6 Analyzing Results of Prototype Tests</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Identify if weaknesses are present in the design</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is the design able to scale to meet the growth, or do budget constraints limit the types of hardware and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">infrastructure that can be included?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>S</b><b>ecara umum</b><b>, </b><b>desain</b><b> bersifat </b><b>scalable</b><b>. </b><b>Prototipe</b><b> </b><b>menggunakan</b><b> </b><b>beberapa</b><b> </b><b>switch</b><b> </b><b>dan</b><b> </b><b>link</b><b> yang </b><b>beru</b><b>lang</b><b>.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Do the IP addressing and VLAN configurations allow for the proposed growth?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Pengalamatan</b><b> </b><b>IP</b><b> </b><b>menggunakan</b><b> </b><b>skema</b><b> </b><b>swasta</b><b> </b><b>memanfaatkan</b><b> </b><b>ruang</b><b> </b><b>alamat</b><b> </b><b>192.168.0.0/22</b><b> </b><b>yang</b><b> </b><b>menyediakan</b><b> </b><b>ruang</b><b> </b><b>cukup untuk</b><b> </b><b>pertumbuhan</b><b>. </b><b>Ke-11</b><b> </b><b>VLAN</b><b> </b><b>pasti</b><b> </b><b>semua</b><b> </b><b>memungkinkan</b><b> </b><b>untuk</b><b> </b><b>alamat</b><b> </b><b>tambahan</b><b> </b><b>yang akan</b><b> </b><b>ditambahkan</b><b>. </b><b>Melakukan</b><b> </b><b>pengujian</b><b> </b><b>dengan</b><b> </b><b>dua</b><b> </b><b>PC</b><b> </b><b>dan</b><b> </b><b>dua</b><b> </b><b>VLAN</b><b> </b><b>cukup</b><b> </b><b>untuk</b><b> </b><b>mencapai</b><b> </b><b>tujuan</b><b> </b><b>pengujian</b><b>. </b><b>Jika</b><b> </b><b>bekerja</b><b> </b><b>dengan</b><b> </b><b>dua</b><b> </b><b>PC</b><b> </b><b>dan</b><b> </b><b>dua</b><b> </b><b>VLAN</b><b> </b><b>itu</b><b> </b><b>akan bekerja</b><b> </b><b>dengan</b><b> </b><b>PC</b><b> </b><b>lebih banyak</b><b> </b><b>dan</b><b> </b><b>lebih</b><b> </b><b>VLAN</b><b>, </b><b>kecuali</b><b> </b><b>kesalahan</b><b> </b><b>konfigurasi</b><b> </b><b>diperkenalkan</b><b>.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Can the selected hardware be upgraded easily without a major reconfiguration of the network?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Secara umum, ya. Stackable tetap 2960 konfigurasi switch digunakan dalam prototipe. IOS software dapat ditingkatkan dengan cukup mudah tapi upgrade perangkat keras mungkin tidak menjadi pilihan.</b><b> </b><b>Perluasan kepadatan pelabuhan dan penggunaan kecepatan link berbeda dan media yang dapat menyajikan isu-isu.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Can new Access Layer modules be integrated into the network without disrupting services to existing users?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya. Switch tambahan dapat ditambahkan untuk meningkatkan jumlah koneksi di desain dengan gangguan minimal.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Does the design provide for the smallest possible failure domains?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b><b>, </b><b>switch</b><b> </b><b>menyediakan</b><b> </b><b>segmentasi</b><b> </b><b>mikro</b><b> </b><b>dan</b><b> </b><b>VLAN</b><b> </b><b>berisi</b><b> </b><b>broadcast</b><b> </b><b>dengan</b><b> </b><b>menggunakan</b><b> </b><b>router</b><b> </b><b>dan</b><b> </b><b>subinterfaces</b><b>.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there multiple paths and redundant devices to protect against losing connectivity to important services?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya. Switch memiliki hubungan</b><b> yang berulang</b><b> untuk memberikan cadangan.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Determine what the risks are of not correcting the weaknesses</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If, in Step 1, you identify weaknesses in the proposed design, what risks do these weaknesses present to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Sejak stackable switch </b><b>dengan </b><b>konfigurasi tetap digunakan dalam prototipe, perubahan kepadatan p</b><b>ort</b><b>, jenis media atau kecepatan link dapat men</b><b>imbul</b><b>kan masalah. Selain menambahkan </b><b>lebih banyak </b><b>switch, perluasan kepadatan port tidak mudah dilakukan.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Suggest ways that the design can be improved to reduce the risk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In what ways could the proposed design be improved to reduce the areas of risk?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Document the weaknesses and risks on the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the Results and Conclusions section of the test plan, record any weaknesses, risks, and suggested</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">improvements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 5: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why do you think it is important to identify weaknesses and risks in the proposed design before presenting it to the customer? What are some reasons that weaknesses cannot be corrected?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>P</b><b>enting</b><b> </b><b>untuk mengidentifikasi</b><b> </b><b>kelemahan</b><b> </b><b>dan</b><b> </b><b>risiko</b><b> </b><b>dalam</b><b> </b><b>desain yang diusulkan</b><b> </b><b>sebelum</b><b> </b><b>menyajikannya</b><b> </b><b>kepada pelanggan</b><b> </b><b>untuk</b><b> </b><b>memastikan</b><b> </b><b>bahwa</b><b> </b><b>pelanggan</b><b> </b><b>memahami</b><b> </b><b>keterbatasan</b><b> </b><b>prototipe</b><b> </b><b>dan</b><b> </b><b>tidak</b><b> </b><b>mengarah</b><b> </b><b>pada</b><b> </b><b>memiliki</b><b> </b><b>harapan yang tidak realistis</b><b> </b><b>berdasarkan</b><b> </b><b>prototipe</b><b>. </b><b>Mungkin mustahil </b><b> </b><b>untuk</b><b> </b><b>mengimbangi</b><b> </b><b>semua</b><b> </b><b>kelemahan yang dapat diidentifikasi</b><b> </b><b>karena</b><b> masalah </b><b>waktu,</b><b> </b><b>uang</b><b> </b><b>atau</b><b> </b><b>kendala</b><b> </b><b>personil</b><b>. </b><b>Risiko</b><b> </b><b>harus</b><b> </b><b>dianalisa</b><b> </b><b>dan</b><b> </b><b>seimbang</b><b> </b><b>terhadap</b><b> </b><b>variabel-variabel</b><b> </b><b>lainnya</b><b>.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b><br />
</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><b>Lab 7.3.2 Creating a Server Farm Test Plan</b></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b><br />
</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Review the Supporting Documentation</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Before completing the Server Farm Design Test Plan, review the following materials:</b></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• The prototype topology diagram included at the top of this lab</li>
<li>• The IP Address Plan and VLAN Plan for the prototype topology in the Server Farm Design Test Plan provided with this lab</li>
<li>• The Prototype Network Installation Checklist created by the network designer and provided with this lab</li>
<li>• The partially completed Server Farm Design Test Plan provided with this lab</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Describe the functions of the network that the designer wants to test with this prototype</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Konektivitas dasar, konfigurasi VLAN, operasi VTP, VLAN routing, penyaringan ACL.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Using the topology diagram, create a list of the equipment necessary to complete the prototype tests</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List any cables that are needed to connect the devices as shown in the topology diagram. Use the information from this list to fill out the chart in the Equipment section of the test plan document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>2 Router, 3 switch, 2 PC, 1 Server, 6 Cat 5 Straight-through kabel, 6 Cat 5 crossover kabel, 1 console cable.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Determine the Testing Procedures</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the information contained on the Prototype Network Installation Checklist and the partially completed Server Farm Design Test Plan document, determine what procedures should be followed to perform each test listed on the plan. Using Test 1 as an example, fill out the procedures sections for Tests 2, 3, and 4.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Think about which commands and tools (such as <b>ping</b>, <b>traceroute</b>, and <b>show </b>commands) you can use to verify that the prototype network is functioning as designed. Decide which outputs to save to prove the results of your tests.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Document the Expected Results and Success Criteria</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Carefully identify what you expect the results of each test to show. What results would indicate that the tests were a success?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test 2: VLAN Configuration Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Show vlans, show spanning-tree, show interface, failure of ping between VLANs</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test 3: VLAN Routing Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Show vlans, show interface, show IP route, traceroute, and successful ping between VLANs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Test 4: ACL Filtering Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Show running config, show interface, show IP route, traceroute, attempts to access unauthorized resources denied.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Fill in the Expected Results and Success Criteria section for each test, using the information collected above.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b.Save the completed Server Farm Test Plan. It will be used in subsequent labs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why is it important to think about and document the expected results and success criteria for each of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">individual tests?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 7.3.3 Configuring and Testing the Rapid Spanning Tree Prototype</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Configure all devices</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Configure S1 and S2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure the host name, access, and command mode passwords on each switch.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Configure interface VLAN 1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure the VLAN1 IP address and default gateway on each switch.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Configure FC-ASW-1 for server and end user VLANs</b></div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="180"><b>VLAN Number</b></td> <td valign="top" width="168"><b>VLAN Name</b></td> </tr>
<tr> <td valign="top" width="180">10<b> </b></td> <td valign="top" width="168">Servers</td> </tr>
<tr> <td valign="top" width="180">20<b> </b></td> <td valign="top" width="168">Users</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Configure ProductionSW for server and end user VLANs</b></div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="180"><b>VLAN Number</b></td> <td valign="top" width="168"><b>VLAN Name</b></td> </tr>
<tr> <td valign="top" width="180">10<b> </b></td> <td valign="top" width="168">Servers</td> </tr>
<tr> <td valign="top" width="180">20<b> </b></td> <td valign="top" width="168">Users</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 5: Assign ports to VLANs on FC-ASW-1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#<b>configure terminal</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>interface Fa0/5</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport access VLAN10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>interface Fa0/6</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport access VLAN20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 6: Assign ports to VLANs on ProductionSW</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW#<b>configure terminal</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config)#<b>interface Fa0/5</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport access VLAN10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>interface Fa0/6</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport mode access</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport access VLAN20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 7: Configure trunk ports on FC-ASW-1 to the router and ProductionSW</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>interface Fa0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>interface Fa0/2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>interface Fa0/4</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 8: Configure trunk ports on ProductionSW to FC-ASW-1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config)#<b>interface Fa0/2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>interface Fa0/4</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config-if)#<b>switchport mode trunk</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 9: Configure VTP on both switches</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#<b>vlan database</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(vlan)#<b>vtp server</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 10: Configure ProductionSW to be a VTP client</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW#<b>vlan database</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(vlan)#<b>vtp client</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(vlan)#<b>vtp domain ServerFarm</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 11: Configure Rapid Spanning Tree Protocol</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On each switch, configure Per-VLAN Rapid Spanning Tree Protocol.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1(config)#<b>spanning-tree mode rapid-pvst</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ProductionSW(config)#<b>spanning-tree mode rapid-pvst</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 12: Perform basic router configuration</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure hostname, passwords, and line access on R1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 13: Configure Subinterface Fa0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4#<b>configure terminal</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config)#<b>interface Fa0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-if)#<b>no shut</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-if)#<b>interface Fa0/0.1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>description VLAN1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>encapsulation dot1q 1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>ip address 10.0.0.1 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>interface Fa0/0.10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>description VLAN10</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>encapsulation dot1q 10.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>ip address 10.10.10.254 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>interface Fa0/0.20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>description VLAN20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>encapsulation dot1q20</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>ip address 10.10.20.254 255.255.255.0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4(config-subif)#<b>end</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">BR4#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 14: Configure two hosts for server VLAN, and two hosts for end user VLAN</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. H1 and H3 should be given IP addresses in the Servers VLAN, with a default gateway of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10.10.10.254.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. H2 and H4 should be given IP addresses in the Users VLAN, with a default gateway of 10.10.20.254.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Perform basic connectivity tests</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Test intra-VLAN connectivity</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Ping from H1 to H3.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is the ping successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the ping fails, troubleshoot the configuration on the hosts and the VLAN configuration on the switches.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Ping from H2 to H4.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is the ping successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the ping fails, troubleshoot the configuration on the hosts and the VLAN configuration on the switches.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Test inter-VLAN connectivity</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ping from a host on the Servers VLAN to a host on the Users VLAN.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is the ping successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Ya</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the ping fails, troubleshoot the router and switch configurations.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Introduce link and device failures into the network, and observe results</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Determine the port status of the spanning tree on the server switch</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-ASW-1#<b>show span</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">VLAN0010</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Spanning tree enabled protocol ieee</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Root ID Priority 32778</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Address 0030.F2C9.90A0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Bridge ID Priority 32778 (priority 32768 sys-id-ext 10)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Address 0090.21AC.0C10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Aging Time 300</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Interface Role Sts Cost Prio.Nbr Type</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">—————- —- — ——— ——– ————————–</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 Desg FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/2 Root FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/4 Altn BLK 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/5 Desg FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">VLAN0020</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Spanning tree enabled protocol ieee</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Root ID Priority 32788</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Address 0030.F2C9.90A0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Bridge ID Priority 32788 (priority 32768 sys-id-ext 20)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Address 0090.21AC.0C10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Aging Time 300</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Interface Role Sts Cost Prio.Nbr Type</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">—————- —- — ——— ——– ————————–</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/1 Desg FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/2 Root FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/4 Altn BLK 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Fa0/6 Desg FWD 19 128.3 Shr</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which port is not currently participating in forwarding data?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Fa0/4 adalah alternatif</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Induce a link failure on the server switch</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Remove the cable from one of the forwarding ports on FC-ASW-1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: View the adjustment to the spanning-tree</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Re-issue the <b>show span </b>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How long did it take the switches to determine and utilize a backup link?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Induce a device failure on the network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Turn off the ProductionSW switch.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ping from H1 to H2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Was the ping successful?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Yes, both hosts are on the FC-ASW-1 switch and inter-VLAN</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>routing is still taking place.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 5: Reflect on the test results</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In a network with multiple branch offices, why is the use of Rapid Spanning Tree Protocol important?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>RSTP adalah penting untuk memastikan konektivitas perangkat pada layer akses di setiap kantor cabang dan bahwa sumber daya seperti server yang dapat diakses oleh pengguna di kantor-kantor lain yang bergantung pada mereka, dalam hal terjadi kegagalan switch-terkait setempat.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why is it important when implementing a server farm?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>RSTP</b><b> </b><b>akan membantu</b><b> </b><b>untuk memastikan</b><b> </b><b>bahwa</b><b> </b><b>switch</b><b> </b><b>dapat</b><b> </b><b>sembuh</b><b> </b><b>dengan cepat</b><b> </b><b>dan</b><b> </b><b>menyimpan</b><b> </b><b>server</b><b> </b><b>diakses oleh</b><b> </b><b>pengguna</b><b> </b><b>dalam</b><b> </b><b>hal</b><b> </b><b>link</b><b>, </b><b>switch</b><b> </b><b>atau</b><b> </b><b>kegagalan</b><b> </b><b>port</b><b>.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 7.3.5 Testing a Prototype Network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Assemble and connect component devices</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Review the Topology Diagram and the Equipment section of the test plan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Determine which equipment or suitable substitutes will be required to meet the objectives of the lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Modify the topology diagram as necessary to fit available equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Review the Installation Checklist provided in lab 7.3.2.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Accommodate any equipment limitations with the use of loopback addresses.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Perform Test 1: Basic Connectivity Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Using the Installation Checklist, perform the steps to connect and configure the</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>prototype network to perform Test 1.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Perform the Test 1 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Perform Test 2: VLAN Configuration Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Using the Installation Checklist, perform the steps to connect and configure the</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>prototype network to perform Test 2.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Perform the Test 2 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 4: Perform Test 3: VLAN Routing Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Using the Installation Checklist, perform the steps to connect and configure the</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>prototype network to perform Test 3.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Perform the Test 3 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 5: Perform Test 4: ACL Filtering Test</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Review security goals for the FilmCompany network</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the test plan, checklist, and other documentation to determine how ACLs can support the security goals.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Examine results of connectivity tests to determine targets for the ACLs</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Decide which devices should be permitted, which protocols should be used, and where ACLs should be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">placed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Create ACLs</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Using the Installation Checklist, perform the steps to connect and configure the</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>prototype network to perform Test 4.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 5: Perform the Test 4 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 6 Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the test results and conclusions. How this network would be affected if:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. The number of servers was doubled?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lalu lintas di S2 akan meningkat. Mungkin akan bermanfaat menambahkan saklar dan pemecahan server untuk menghindari single point of failure.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. The S2 switch had a system failure?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Akses ke server akan hilang.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3. A new branch office with 25 new hosts was added?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Beban pada router R2 atau R1 akan meningkat tergantung pada </b><b>akses </b><b>apa yang dibutuhkan pengguna </b><b>terhadap</b><b> sumber daya.</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Now that you have followed the process of prototyping from creating the plan through testing and recording results and conclusions, what are the advantages and disadvantages of using a simulation program, such as Packet Tracer, compared to building the prototype with physical devices?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Penggunaan</b><b> </b><b>program</b><b> </b><b>simulasi</b><b> </b><b>dapat</b><b> </b><b>sangat</b><b> </b><b>membantu dalam</b><b> </b><b>skenario</b><b> </b><b>pengujian</b><b> </b><b>berbagai</b><b> </b><b>koneksi</b><b>, </b><b>alamat IP</b><b> </b><b>dan</b><b> </b><b>isu-isu</b><b> </b><b>lainnya</b><b>. </b><b>Perangkat lain</b><b> </b><b>dapat</b><b> </b><b>dimasukkan ke dalam bermain</b><b> </b><b>daripada</b><b> </b><b>ketika</b><b> </b><b>membangun</b><b> </b><b>prototipe</b><b> </b><b>menggunakan</b><b> </b><b>peralatan</b><b> </b><b>yang nyata</b><b>, namun </b><b>tidak ada</b><b> </b><b>pengganti</b><b> </b><b>untuk menggunakan perlengkapan</b><b> </b><b>nyata</b><b>, </b><b>jika tersedia</b><b>.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 7.3.6 Identifying Risks and Weaknesses in the Design</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Identify areas of risk and weakness in the server farm implementation</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Analyze the physical topology</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the server farm topology as one entity and as a part of the entire FilmCompany topology. Look for each of the risks and weaknesses listed in the chart. Describe the devices, connections, and issues that you find, or record <b>None found </b>if the design appears to avoid risks in that area.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="162"><b>Weakness</b></td> <td valign="top" width="270"><b>Risk</b></td> <td valign="top" width="162"><b>Description of Location and Devices</b></td> </tr>
<tr> <td valign="top" width="162">Single point of failure</td> <td valign="top" width="270">If a device fails, a portion of the network will be inoperable.</td> <td valign="top" width="162"><br />
</td> </tr>
<tr> <td valign="top" width="162">Large failure domain</td> <td valign="top" width="270">If a device or link fails, a large portion of the network will be affected</td> <td valign="top" width="162"><br />
</td> </tr>
<tr> <td valign="top" width="162">Possible bottlenecks</td> <td valign="top" width="270">If the traffic volume increases, thereis a potential for response time to degrade.</td> <td valign="top" width="162"><br />
</td> </tr>
<tr> <td valign="top" width="162">Limited scalability</td> <td valign="top" width="270">If the network grows more rapidly than expected, a costly upgrade will be needed.</td> <td valign="top" width="162"><br />
</td> </tr>
<tr> <td valign="top" width="162">Overly-complex design</td> <td valign="top" width="270">If the design is too complex, the current staff will not be able to support it properly.</td> <td valign="top" width="162"><br />
</td> </tr>
<tr> <td valign="top" width="162">Other possibleweaknesses (specify):</td> <td valign="top" width="270"><br />
</td> <td valign="top" width="162"><br />
</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Analyze the results and conclusions of the testing</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Basic router and switch configurations were modified to support the following protocols and functions.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Evaluate the results and conclusions that were drawn from the testing. Identify any areas where modifications to the configuration would provide better results, both now and in the future.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="228"><br />
</td> <td valign="top" width="138"><b>No Change Needed</b></td> <td valign="top" width="168"><b>Modifications Possible</b></td> </tr>
<tr> <td valign="top" width="228">VLAN port assignments</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
<tr> <td valign="top" width="228">VTP client/server assignments</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
<tr> <td valign="top" width="228">Root bridge designations</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
<tr> <td valign="top" width="228">Switch security</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
<tr> <td valign="top" width="228">Traffic filtering through ACLs</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
<tr> <td valign="top" width="228">Other (specify):</td> <td valign="top" width="138"><br />
</td> <td valign="top" width="168"><br />
</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Suggest modifications to the design to address identified risks and weaknesses</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the analysis performed in Task 1, list each risk or weakness and suggest possible changes to the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">design to minimize or eliminate it.</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-17326416683672994312011-01-08T17:39:00.001-08:002011-01-08T17:39:36.600-08:00Tugas CCNA 4 Labskill Chapter 6<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><span style="text-decoration: underline;">Lab 6.1.4 Using CIDR to Ensure Route Summarization</span></strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Referring to the topology diagram, connect the console (or rollover) cable to the console port on the router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Perform basic router configurations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Establish a HyperTerminal, or other terminal emulation program, from PC1 to each of the three routers in turn and perform the following configuration functions:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Clear any existing configurations on the routers.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure the router hostname.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Disable DNS lookup.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure an EXEC mode password.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure a message-of-the-day banner.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure a password for console connections.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure a password for vty connections.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Configure the interfaces on the three routers</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure the interfaces on the three routers with the IP addresses from the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Save the running configuration to the NVRAM of the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Configure the Ethernet interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure the Ethernet interfaces of Hosts PC1, PC2, and PC3 with the IP addresses from the addressing</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">table provided under the topology diagram.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Verify connectivity of routers</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Verify that each router can ping each of the neighboring routers across the WAN links. You should</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><em>not </em>have connectivity between end devices yet. However, you can test connectivity between two</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">routers and between an end device and its default gateway. Troubleshoot if connectivity is not achieved.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Verify connectivity of Host PCs</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Verify that PC1, PC2, and PC3 can ping their respective default gateways. Troubleshoot if connectivity is not achieved.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Configure EIGRP routing on router R1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the networks that need to be included in the EIGRP updates that are sent out by the R1 router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What directly connected networks exist on R1?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.17.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.18.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.19.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What commands are required to enable EGIRP and include the connected networks in the routing updates?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>router eigrp 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.17.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.18.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.19.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any router interfaces that do not need to have EIGRP updates sent out? <strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If yes, which ones? <strong>Fa0/0 and Fa0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What command is used to disable EIGRP updates on these interfaces?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>passive-interface FastEthernet0/0 and passive-interface FastEthernet0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Configure EIGRP on router R2</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the networks that need to be included in the EIGRP updates that are sent out by the R2 router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What directly connected networks exist on R2?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.16.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.17.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.20.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What commands are required to enable EGIRP and include the connected networks in the routing updates?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>router eigrp 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.16.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.17.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.20.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any router interfaces that do not need to have EIGRP updates sent out?<strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If yes, which ones?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/0 and Fa0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What command is used to disable EIGRP updates on these interfaces?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>passive-interface FastEthernet0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 9: Configure EIGRP routing on the R3 router</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the networks that need to be included in the EIGRP updates that are sent out by the R3 router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What directly connected networks exist on R3?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.20.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>10.1.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What commands are required to enable EGIRP and include the connected networks in the routing updates?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>router eigrp 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 172.20.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>network 10.1.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any router interfaces that do not need to have EIGRP updates sent out?<strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If yes, which ones?<strong>Fa0/0 and Fa0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What command is used to disable EIGRP updates on these interfaces?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>passive-interface FastEthernet0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 10: Verify the configurations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ping between devices to confirm that each router can reach each device on the network and that there is</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">connectivity between all the PCs. If any of the above pings failed, check your physical connections and configurations. Troubleshoot until connectivity is achieved.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 11: Display the EIGRP routing table for each router</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there summary routes in any of the routing tables?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Ya, tetapi hanya untuk jaringan 10.1.0.0. Auto-summary EIGRP diaktifkan secara default dan merangkum subnetwork 10.1.0.0/16 ke jaringan 10.0.0.0 / 8 classful.</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any summary routes for the 172.x.0.0 networks?<strong>Tidak</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 12: Remove automatic summarization</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On each of the three routers, remove automatic summarization to force EIGRP to report all subnets. A sample command is given for R1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R1(config)#<strong>router eigrp 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R1(config-router)#<strong>no auto-summary</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 13: Configure manual summarization on R2</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On R2, configure manual summarization so that EIGRP summarizes the four networks 172.16.0.0/16,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">172.17.0.0/16, 172.18.0.0/16, and 172.19.0.0/16 as one CIDR route, or 172.16.0.0/14.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">You are summarizing multiple classful networks, which creates a supernet, and results in a classless (/14)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network address being advertised.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R2(config)#<strong>interface s0/0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R2(config-if)#<strong>ip summary-address eigrp 1 172.16.0.0 255.252.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 14: Confirm that R2 is advertising a CIDR summary route</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the routing table of each router using the <strong>show ip route </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R1#<strong>show ip route</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">E1 – OSPF external type 1, E2 – OSPF external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ia – IS-IS inter area, * – candidate default, U – per-user static</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">o – ODR, P – periodic downloaded static route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Gateway of last resort is not set</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.17.0.0/16 is directly connected, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.16.0.0/16 [90/2172416] via 172.17.0.2, 02:13:05, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.19.0.0/16 is directly connected, Loopback0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.18.0.0/16 is directly connected, FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.20.0.0/16 [90/2681856] via 172.17.0.2, 02:05:21, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10.0.0.0/16 is subnetted, 1 subnets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 10.1.0.0 [90/2684416] via 172.17.0.2, 00:04:25, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R2#<strong>show ip route</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">E1 – OSPF external type 1, E2 – OSPF external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ia – IS-IS inter area, * – candidate default, U – per-user static</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">o – ODR, P – periodic downloaded static route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Gateway of last resort is not set</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.17.0.0/16 is directly connected, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.16.0.0/16 is directly connected, FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.19.0.0/16 [90/2172416] via 172.17.0.1, 02:14:37, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.18.0.0/16 [90/2172416] via 172.17.0.1, 02:14:37, Serial0/0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.20.0.0/16 is directly connected, Serial0/0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10.0.0.0/16 is subnetted, 1 subnets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 10.1.0.0 [90/2172416] via 172.20.0.1, 00:05:57, Serial0/0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.16.0.0/14 is a summary, 00:11:55, Null0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">R3#<strong>show ip route</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Codes: C – connected, S – static, R – RIP, M – mobile, B – BGP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D – EIGRP, EX – EIGRP external, O – OSPF, IA – OSPF inter area</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">N1 – OSPF NSSA external type 1, N2 – OSPF NSSA external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">E1 – OSPF external type 1, E2 – OSPF external type 2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">i – IS-IS, su – IS-IS summary, L1 – IS-IS level-1, L2 – IS-IS level-2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ia – IS-IS inter area, * – candidate default, U – per-user static</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">o – ODR, P – periodic downloaded static route</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Gateway of last resort is not set</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 172.20.0.0/16 is directly connected, Serial0/0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">10.0.0.0/16 is subnetted, 1 subnets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">C 10.1.0.0 is directly connected, FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.16.0.0/14 [90/2172416] via 172.20.0.2, 00:13:32, Serial0/0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which router has a summarized route to the 172.x.0.0 networks in its routing table?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>R3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">D 172.16.0.0/14 [90/2172416] via 172.20.0.2, 00:13:32, Serial0/0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 15: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers. Disconnect and store the cabling. For PC hosts that are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In this lab, automatic summarization was used. Could route summarization still be applied if more effective use of the IPv4 address space had been made by using VLSM for those networks requiring fewer addresses, such as the serial links between routers?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 6.2.1 Determining an IP Addressing Scheme</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Consider VLAN issues</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The initial step in determining the required VLANs is to group users and services into VLANs. Each of these VLANs will represent an IP subnet.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A VLAN can be considered to be a group of switch ports assigned to a broadcast domain. Grouping the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">switch ports confines broadcast traffic to specified hosts so that bandwidth is not unnecessarily consumed in unrelated VLANs. It is therefore a recommended best practice to assign only one IP network or subnetwork to each VLAN.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">When determining how to group users and services, consider the following issues:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Flexibility</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The employees and hardware of the former AnyCompany will move into the building with the FilmCompany in the near future. The network from this newly acquired company needs to be tightly integrated with the FilmCompany network and a structure put in place to enhance the security of the network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">To support this integration, with improvements in security and performance, additional VLANs need to be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">created on the network. These VLANs will also allow the personnel to move to the buildings without additional network changes or interruption in network services.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Security can be better enforced <em>between </em>VLANs than <em>within </em>VLANs.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Access control lists can be applied to the Distribution Layer router subinterfaces that interconnect the</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">VLANs to enforce this security.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• The interfaces on the switches can be assigned to VLANs as appropriate to support the network for</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the connected device.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Additional Layer 2 security measures can also be applied to these switch interfaces.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>WANs and VPNs</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The contract with StadiumCompany adds a number of new requirements. Some FilmCompany personnel will be located at the stadium. Additional personnel and contract workers will also be present at the stadium during live events. These employees will use laptops and the wireless LAN at the FilmCompany branch as well as the wireless LAN at the stadium. To provide network connectivity for these laptops, they will be in their own VLAN. At the stadium, the FilmCompany laptop users will connect to a secure wireless VLAN and use a VPN over the Frame Relay connection between stadium and the FilmCompany branch. With this connection, the laptop users can be attached to the internal FilmCompany network regardless of physical location. To support the video feeds, FilmCompany will need resources available at the stadium. Some of the servers providing these resources will be located at the stadium. Other servers will be located at the branch office of the FilmCompany. For security and performance reasons, these servers, regardless of location, will be on secured VLANs. A separate VPN over the Frame Relay link will be created to connect the servers at the stadium to the servers located at the FilmCompany office.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What are the advantages and disadvantages of using a VPN to extend the wireless and video server</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">networks over the Frame Relay connection from FilmCompany to the stadium?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Advantages:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Memperluas VLAN melalui VPN di WAN memiliki keuntungan dari keamanan tindakan yang dilakukan</strong><strong> terhadap </strong><strong>VLAN yang juga sedang diterapkan pada semua host di manapun lokasinya.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Disadvantages:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Kerugiannya adalah bahwa semua siaran VLAN juga melintasi bandwidth sempit </strong><strong>pada </strong><strong>WAN link, yang mungkin</strong><strong> </strong><strong>mempengaruhi throughput data</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Redundancy</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The VLAN structure will support load balancing and redundancy, which are major needs of this new network design. With such a large portion of the FilmCompany operations and revenues dependent on the network operation, a network failure could be devastating. The new VLAN arrangement allows the FC-ASW1 and FCASW2 switches to share the load of the traffic and be backups for each other.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This redundancy is accomplished by sharing the RSTP primary and secondary root duties for the traffic for the different VLANs:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• FC-ASW1 will be the primary root for approximately one-half of the VLAN traffic (not necessarily one half of the VLANs) and FC-ASW2 will be the secondary root for these VLANs.</li>
<li>• The remaining VLANs will have FC-ASW2 as the primary root and FC-ASW1 as the secondary root.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Group network users and services</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the planned network topology. Applying the issues considered in Step 1, list all the possible</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">groupings of users and services that may require separate VLANs and subnets.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>default VLAN for the Layer 2 devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>voice VLAN to support Voice over IP</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for management hosts and secure peripherals (payroll printer)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for administrative hosts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for support hosts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for high performance production workstations</strong> <strong>(stationary)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for mobile production hosts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for stadium to FilmCompany mobile access VPN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for network support</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for peripherals for general use (printers, scanners)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for servers to support video services and storage</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for stadium to FilmCompany video services VPN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for servers that are publicly accessible</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for terminating unwanted or suspicious traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>VLAN for undefined future services</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Block of addresses are required for NAT pool for BR4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>DSL link to the ISP</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Addresses for the Frame Relay link to the stadium</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Tabulating the groupings</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The new addressing design needs to be scalable to allow easy inclusion of future services, such as voice.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The current addressing scheme does not allow for managed growth. Correcting this scheme will mean that most devices will be placed on new VLANs and new subnets. In some cases, a device address may not be able to be changed; for example, some of the servers have software registered to their IP addresses. In such cases, the server VLAN will keep its current addressing even though it may not be consistent with the remaining addressing scheme. Other addresses that cannot be changed are the addresses used with the WAN links and the addresses for NAT pool used to access the Internet.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This table shows a possible grouping and addressing scheme. The number of hosts required for the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany branch office, including growth, has been determined. Assigning one subnet to each VLAN, the host count for each has been rounded up to the next logical network size supported by the binary patterns used in the subnet mask. Rounding up prevents underestimating the total number of host addresses required</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="66"><strong>VLAN number</strong></td> <td valign="top" width="102"><strong>Network name</strong></td> <td valign="top" width="90"><strong>Nomor alamat host</strong></td> <td valign="top" width="132"><strong>Predetermined</strong><strong>Network Address</strong></td> <td valign="top" width="223"><strong>Deskripsi</strong></td> </tr>
<tr> <td valign="top" width="66">1<strong> </strong></td> <td valign="top" width="102">default<strong> </strong></td> <td valign="top" width="90">14<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Default VLAN for the Layer 2 devices<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">10<strong> </strong></td> <td valign="top" width="102">voice<strong> </strong></td> <td valign="top" width="90">254<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Voice VLAN to support Voice over IP<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">20<strong> </strong></td> <td valign="top" width="102">management<strong> </strong></td> <td valign="top" width="90">14<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Management hosts and secure peripherals (payroll printer)<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">30</td> <td valign="top" width="102">administrative<strong> </strong></td> <td valign="top" width="90">62<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Administrative hosts</td> </tr>
<tr> <td valign="top" width="66">40</td> <td valign="top" width="102">support<strong> </strong></td> <td valign="top" width="90">126<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Support hosts<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">50</td> <td valign="top" width="102">production<strong> </strong></td> <td valign="top" width="90">126<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">High performance production workstations (stationary)</td> </tr>
<tr> <td valign="top" width="66">60</td> <td valign="top" width="102">mobile<strong> </strong></td> <td valign="top" width="90">62<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Mobile production hosts<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">70</td> <td valign="top" width="102">net_admin<strong> </strong></td> <td valign="top" width="90">14<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Network support<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">80</td> <td valign="top" width="102">servers<strong> </strong></td> <td valign="top" width="90">65534<strong> </strong></td> <td valign="top" width="132">172.17.0.0 /16<strong> </strong></td> <td valign="top" width="223">Servers to support video servicesand storage</td> </tr>
<tr> <td valign="top" width="66">90</td> <td valign="top" width="102">peripherals<strong> </strong></td> <td valign="top" width="90">62<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">Peripherals for general use (printers,scanners)</td> </tr>
<tr> <td valign="top" width="66">100</td> <td valign="top" width="102">web_access</td> <td valign="top" width="90">14<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">VLAN for servers that are publiclyaccessible</td> </tr>
<tr> <td valign="top" width="66">120</td> <td valign="top" width="102">future<strong> </strong></td> <td valign="top" width="90">126<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">VLAN for future services<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">999</td> <td valign="top" width="102">null<strong> </strong></td> <td valign="top" width="90">126<strong> </strong></td> <td valign="top" width="132"><strong> </strong></td> <td valign="top" width="223">VLAN for terminating unwanted orsuspicious traffic</td> </tr>
<tr> <td valign="top" width="66">NA</td> <td valign="top" width="102">NAT_pool<strong> </strong></td> <td valign="top" width="90">6<strong> </strong></td> <td valign="top" width="132">209.165.200.224/29<strong> </strong></td> <td valign="top" width="223">Addresses for NAT pool for BR4 orinterface to ISP4</td> </tr>
<tr> <td valign="top" width="66">NA</td> <td valign="top" width="102">DSL_Link<strong> </strong></td> <td valign="top" width="90">2<strong> </strong></td> <td valign="top" width="132">192.0.2.40 /30<strong> </strong></td> <td valign="top" width="223">DSL link to the ISP<strong> </strong></td> </tr>
<tr> <td valign="top" width="66">NA</td> <td valign="top" width="102">Frame_Link<strong> </strong></td> <td valign="top" width="90">2<strong> </strong></td> <td valign="top" width="132">172.18.0.16/30<strong> </strong></td> <td valign="top" width="223">Address of the FR link to thestadium</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Determine the total number of hosts to be addressed</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">To determine the block of addresses to be used, count the number of hosts. To calculate the addresses,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">count only the hosts that will receive addresses from the new block. Use the information in the table in Step 3 to complete this chart to calculate the total number of hosts in the new FilmCompany network requiring addresses.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab provided a step-by-step process for determining an addressing scheme for a corporate network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Discuss and consider the issues that would arise if this planning process was not methodically used.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><span style="text-decoration: underline;">Lab 6.2.2 Determining the Number of IP Networks</span></strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><span style="text-decoration: underline;"><br />
</span></strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 1: Review Address Block Size</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Review and record the total number of hosts to be addressed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Complete this table with the information determined in Lab 6.2.1.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="174"><strong>Network/VLAN Name</strong></td> <td valign="top" width="192"><strong>#Number of host addresses</strong></td> </tr>
<tr> <td valign="top" width="174">Default</td> <td valign="top" width="192">14</td> </tr>
<tr> <td valign="top" width="174">Voice</td> <td valign="top" width="192">254</td> </tr>
<tr> <td valign="top" width="174">Management</td> <td valign="top" width="192">14</td> </tr>
<tr> <td valign="top" width="174">Administrative</td> <td valign="top" width="192">62</td> </tr>
<tr> <td valign="top" width="174">Support</td> <td valign="top" width="192">126</td> </tr>
<tr> <td valign="top" width="174">Production</td> <td valign="top" width="192">126</td> </tr>
<tr> <td valign="top" width="174">Mobile</td> <td valign="top" width="192">62</td> </tr>
<tr> <td valign="top" width="174">Peripherals</td> <td valign="top" width="192">62</td> </tr>
<tr> <td valign="top" width="174">Net_admin</td> <td valign="top" width="192">14</td> </tr>
<tr> <td valign="top" width="174">Web_access</td> <td valign="top" width="192">14</td> </tr>
<tr> <td valign="top" width="174">Future</td> <td valign="top" width="192">126</td> </tr>
<tr> <td valign="top" width="174">Null</td> <td valign="top" width="192">126</td> </tr>
<tr> <td valign="top" width="174">Total</td> <td valign="top" width="192">1000</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is the smallest address block size that can potentially satisfy the FilmCompany network needs?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1024</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 2: Choose or Obtain an Address Block</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Choose public or private addresses?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A block of addresses needs to be acquired to support the addressing scheme. This block of addresses could be private space addresses or public addresses. In most cases, the network users require only outbound connections to the Internet. Only a few hosts, such as web servers, require public addresses. These often exist on the local LAN with private addresses and have static NAT entries on the border router to translate to public addresses. Public address, however, are expensive and often difficult to justify. Can you make a justification of the use public addresses in this network?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Tidak</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If so, write this justification to forward to the ISP:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Ensure that the private space addresses do not conflict</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Although you are allowed to use private space addresses any way you choose, you must make sure that the addresses used do not conflict with another private space address to which this network will be connected. You must identify other networks to which you are connected and make sure that you are not using the same private addresses. In this case, you need to examine the addresses used by the StadiumCompany.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What address private space block does the StadiumCompany use?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.18.0.0 /16</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What address blocks are used by the WAN links?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.18.0.16/30</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>192.0.2.40 /30</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there other devices or connections that need to be excluded from use?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What types?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>servers</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What address block?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>172.17.0.0 /16</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Ensure that the private space addresses are consistent with policy</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The company should have a network policy and method of allocating addresses. This is true even when using</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">private addresses. You should contact the FilmCompany network administrators to request a block of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">addresses. In this case, ask your instructor if there is a preferred set of addresses to use.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Did your instructor assign a block of addresses? <em> </em></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If so, what block? <em> </em></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If your instructor does not assign addresses, you may choose any private space block that does not conflict.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What block of addresses are you using for this FilmCompany Branch?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>192.168.0.0 </strong><strong>/22</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 3: Allocate Addresses for the Network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">When assigning addresses to the different networks, start the assignments with the subnet that requires the largest address block and progress to the network that requires the smallest.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Order the networks from largest to smallest</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the information from Lab 6.2.1, list the networks in order of size, from the network that requires the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">largest address block to the network that requires the smallest block.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="174"><strong>Network/VLAN Name</strong></td> <td valign="top" width="186"><strong>Number of host addresses</strong></td> </tr>
<tr> <td valign="top" width="174">Voice</td> <td valign="top" width="186">254</td> </tr>
<tr> <td valign="top" width="174">support</td> <td valign="top" width="186">126</td> </tr>
<tr> <td valign="top" width="174">production</td> <td valign="top" width="186">126</td> </tr>
<tr> <td valign="top" width="174">Future</td> <td valign="top" width="186">126</td> </tr>
<tr> <td valign="top" width="174">Null</td> <td valign="top" width="186">126</td> </tr>
<tr> <td valign="top" width="174">administrative</td> <td valign="top" width="186">62</td> </tr>
<tr> <td valign="top" width="174">Mobile</td> <td valign="top" width="186">62</td> </tr>
<tr> <td valign="top" width="174">peripherals</td> <td valign="top" width="186">62</td> </tr>
<tr> <td valign="top" width="174">Web_access</td> <td valign="top" width="186">14</td> </tr>
<tr> <td valign="top" width="174">Default</td> <td valign="top" width="186">14</td> </tr>
<tr> <td valign="top" width="174">management</td> <td valign="top" width="186">14</td> </tr>
<tr> <td valign="top" width="174">Net_admin</td> <td valign="top" width="186">14</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Assign address blocks to the networks</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the address block chosen in the previous task, begin calculating and assigning the address blocks to these networks. You should use contiguous blocks of addresses when making these assignments.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="174"><strong>Network/VLAN Name</strong></td> <td valign="top" width="186"><strong>Number of host addresses</strong></td> <td valign="top" width="186"><strong>Network address</strong></td> </tr>
<tr> <td valign="top" width="174">Voice</td> <td valign="top" width="186">254</td> <td valign="top" width="186">192.168.0.0 /24</td> </tr>
<tr> <td valign="top" width="174">support</td> <td valign="top" width="186">126</td> <td valign="top" width="186">192.168.1.0 /25</td> </tr>
<tr> <td valign="top" width="174">production</td> <td valign="top" width="186">126</td> <td valign="top" width="186">192.168.1.128 /25</td> </tr>
<tr> <td valign="top" width="174">Future</td> <td valign="top" width="186">126</td> <td valign="top" width="186">192.168.2.0 /25</td> </tr>
<tr> <td valign="top" width="174">Null</td> <td valign="top" width="186">126</td> <td valign="top" width="186">192.168.2.128 /25</td> </tr>
<tr> <td valign="top" width="174">administrative</td> <td valign="top" width="186">62</td> <td valign="top" width="186">192.168.3.0 /26</td> </tr>
<tr> <td valign="top" width="174">Mobile</td> <td valign="top" width="186">62</td> <td valign="top" width="186">192.168.3.64 /26</td> </tr>
<tr> <td valign="top" width="174">Peripherals</td> <td valign="top" width="186">62</td> <td valign="top" width="186">192.168.3.128 /26</td> </tr>
<tr> <td valign="top" width="174">web_access</td> <td valign="top" width="186">14</td> <td valign="top" width="186">192.168.3.192 /28</td> </tr>
<tr> <td valign="top" width="174">Default</td> <td valign="top" width="186">14</td> <td valign="top" width="186">192.168.3.208 /28</td> </tr>
<tr> <td valign="top" width="174">management</td> <td valign="top" width="186">14</td> <td valign="top" width="186">192.168.3.224 /28</td> </tr>
<tr> <td valign="top" width="174">net_admin</td> <td valign="top" width="186">14</td> <td valign="top" width="186">192.168.3.240 /28</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Complete the address planning table</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the addresses you calculated in the previous step, complete this table from Lab 6.2.1. This plan will be used in future labs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="67"><strong>VLAN #</strong></td> <td valign="top" width="108"><strong>Network/VLAN Name</strong></td> <td valign="top" width="114"><strong>Number of host addresses</strong> </td> <td valign="top" width="133"><strong>Network Address</strong></td> <td valign="top" width="216"><strong>Description</strong></td> </tr>
<tr> <td valign="top" width="67">1</td> <td valign="top" width="108">default</td> <td valign="top" width="114">14</td> <td valign="top" width="133">192.168.3.208 /28</td> <td valign="top" width="216">Default VLAN for the Layer 2 devices</td> </tr>
<tr> <td valign="top" width="67">10</td> <td valign="top" width="108">voice</td> <td valign="top" width="114">254</td> <td valign="top" width="133">192.168.0.0 /24</td> <td valign="top" width="216">Voice VLAN to support Voice over IP</td> </tr>
<tr> <td valign="top" width="67">20</td> <td valign="top" width="108">management</td> <td valign="top" width="114">14</td> <td valign="top" width="133">192.168.3.224 /28</td> <td valign="top" width="216">Management hosts and secureperipherals (payroll printer)</td> </tr>
<tr> <td valign="top" width="67">30</td> <td valign="top" width="108">administrative</td> <td valign="top" width="114">62</td> <td valign="top" width="133">192.168.3.0 /26</td> <td valign="top" width="216">Administrative hosts</td> </tr>
<tr> <td valign="top" width="67">40</td> <td valign="top" width="108">support</td> <td valign="top" width="114">126</td> <td valign="top" width="133">192.168.1.0 /25</td> <td valign="top" width="216">Support hosts</td> </tr>
<tr> <td valign="top" width="67">50</td> <td valign="top" width="108">production</td> <td valign="top" width="114">126</td> <td valign="top" width="133">192.168.1.128 /25</td> <td valign="top" width="216">High performance productionworkstations (stationary)</td> </tr>
<tr> <td valign="top" width="67">60</td> <td valign="top" width="108">mobile</td> <td valign="top" width="114">62</td> <td valign="top" width="133">192.168.3.64 /26</td> <td valign="top" width="216">Mobile production hosts.</td> </tr>
<tr> <td valign="top" width="67">70</td> <td valign="top" width="108">net_admin</td> <td valign="top" width="114">14</td> <td valign="top" width="133">192.168.3.240 /28</td> <td valign="top" width="216">Network support</td> </tr>
<tr> <td valign="top" width="67">80</td> <td valign="top" width="108">servers</td> <td valign="top" width="114">65534</td> <td valign="top" width="133">172.17.0.0 /16</td> <td valign="top" width="216">Servers to support video services and storage.</td> </tr>
<tr> <td valign="top" width="67">90</td> <td valign="top" width="108">peripherals</td> <td valign="top" width="114">62</td> <td valign="top" width="133">192.168.3.128 /26</td> <td valign="top" width="216">Peripherals for general use (printers, scanners)</td> </tr>
<tr> <td valign="top" width="67">100</td> <td valign="top" width="108">web_access</td> <td valign="top" width="114">14</td> <td valign="top" width="133">192.168.3.192 /28</td> <td valign="top" width="216">VLAN for server that are publiclyaccessible</td> </tr>
<tr> <td valign="top" width="67">120</td> <td valign="top" width="108">future</td> <td valign="top" width="114">126</td> <td valign="top" width="133">192.168.2.0 /25</td> <td valign="top" width="216">VLAN for future services</td> </tr>
<tr> <td valign="top" width="67">999</td> <td valign="top" width="108">null</td> <td valign="top" width="114">126</td> <td valign="top" width="133">192.168.2.128 /25</td> <td valign="top" width="216">VLAN for terminating unwanted orsuspicious traffic</td> </tr>
<tr> <td valign="top" width="67">NA</td> <td valign="top" width="108">NAT_pool</td> <td valign="top" width="114">6</td> <td valign="top" width="133">209.165.200.224/29</td> <td valign="top" width="216">Addresses for NAT pool for BR4 or interface to ISP4</td> </tr>
<tr> <td valign="top" width="67">NA</td> <td valign="top" width="108">DSL_Link</td> <td valign="top" width="114">2</td> <td valign="top" width="133">192.0.2.40 /30</td> <td valign="top" width="216">DSL link to the ISP</td> </tr>
<tr> <td valign="top" width="67">NA</td> <td valign="top" width="108">Frame_link</td> <td valign="top" width="114">2</td> <td valign="top" width="133">172.18.0.16/30</td> <td valign="top" width="216">Address of the FR link to the stadium</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab specifically used private IPv4 addresses. Discuss the issues to be considered if it was decided to use public IP addresses throughout the network. Are there any situations that would require this?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Alamat IP versi 4</strong> (sering disebut dengan <strong>Alamat IPv4</strong>) adalah sebuah jenis pengalamatan jaringan yang digunakan di dalam protokol jaringan TCP/IP yang menggunakan <a href="http://id.wikipedia.org/wiki/Protokol_Internet" title="Protokol Internet">protokol IP versi 4</a>. Panjang totalnya adalah 32-bit, dan secara teoritis dapat mengalamati hingga 4 miliar host komputer atau lebih tepatnya 4.294.967.296 host di seluruh dunia, jumlah host tersebut didapatkan dari 256 (didapatkan dari 8 bit) dipangkat 4(karena terdapat 4 oktet) sehingga nilai maksimal dari alamt IP versi 4 tersebut adalah 255.255.255.255 dimana nilai dihitung dari nol sehingga nilai nilai host yang dapat ditampung adalah 256x256x256x256=4.294.967.296 host. Alamat publik adalah alamat-alamat yang telah ditetapkan oleh <a href="http://id.wikipedia.org/w/index.php?title=InterNIC&action=edit&redlink=1" title="InterNIC (halaman belum tersedia)">InterNIC</a> dan berisi beberapa buah <em>network identifier</em> yang telah dijamin unik (artinya, tidak ada dua host yang menggunakan alamat yang sama) jika intranet tersebut telah terhubung ke Internet. Ketika beberapa alamat publik telah ditetapkan, maka beberapa rute dapat diprogram ke dalam sebuah <a href="http://id.wikipedia.org/wiki/Router" title="Router">router</a> sehingga lalu lintas data yang menuju alamat publik tersebut dapat mencapai lokasinya.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 6.2.5 Creating an Address Allocation Spreadsheet</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Record the network address block</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the first column, record the address block used for the entire FilmCompany network chosen in the previous lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2</strong><strong>: </strong><strong>Define the 254-host networks</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Based on the requirements for the FilmCompany network, the address block is divided into twelve separate networks using four different masks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the second column of the table above, record the network blocks that will support 254 hosts per</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network. In the last column, record the names of the networks that need to be assigned to these blocks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The CIDR notation mask for the 254-host network is /24. What is the dotted decimal equivalent mask?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>255.255.255.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Define the 126-host networks</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the third column of the table above, choose the first unused 254 host address block to subdivide</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">into 126-host networks. In the last column, record the names of the networks assigned to these 126-host blocks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The CIDR notation mask for the 126-host network is /25. What is the dotted decimal equivalent mask?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>255.255.255.128</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Define the 62-host networks</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the fourth column of the table above, choose the first unused 126-host address block to subdivide</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">into 62-host networks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the last column, record the names of the networks assigned to these 62-host blocks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The CIDR notation mask for the 62-host network is /26. What is the dotted decimal equivalent mask?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>255.255.255.192</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Define the 14-host networks</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the fifth column of the table above, choose the first unused 62-host address block to subdivide into</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">14-host networks. In the last column, record the names of the networks assigned to these 14-host blocks.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The CIDR notation mask for the 14-host network is /28. What is the dotted decimal equivalent mask?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>255.255.255.240</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 2: Define the Host Address Assignments</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For each network, determine and document the host addresses and broadcast addresses. Use the table</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">below to document these networks and host information.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Record the network names and addresses in the addressing table</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the table below, record the network names for the FilmCompany in the first column and the corresponding network address in the second column.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Calculate the lowest host address in the addressing table</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The lowest address for a network is one greater than the address of the network. Therefore, to calculate the lowest host address, add a 1 to the network address. For each of these networks, calculate and record the lowest host address in the second column of the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Calculate the broadcast address in the addressing table</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The broadcast address uses the highest address in the network range. This is the address in which the bits in the host portion are all 1s. To calculate the broadcast for each of the networks listed, convert the last octet of the network address into binary. Then fill the remaining host bits with 1s. Finally, convert the binary back to decimal. For each of these networks, calculate and record the broadcast address in the last column.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Calculate the highest host address in the addressing table</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The highest address for each address is the network address is one less than the broadcast address for that network. Therefore, to calculate the highest host address, subtract a 1 from the broadcast address. For each of these networks, calculate and record the highest host address in the second column.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="114"><strong>Network Names</strong></td> <td valign="top" width="128"><strong>Network Address</strong></td> <td valign="top" width="128"><strong>Lowest Host</strong><strong>Address</strong></td> <td valign="top" width="128"><strong>Highest Host</strong><strong>Address</strong></td> <td valign="top" width="128"><strong>Broadcast Address</strong></td> </tr>
<tr> <td valign="top" width="114">voice</td> <td valign="top" width="128">192.168.0.0 /24</td> <td valign="top" width="128">192.168.0.1</td> <td valign="top" width="128">192.168.1.254</td> <td valign="top" width="128">192.168.1.255</td> </tr>
<tr> <td valign="top" width="114">support</td> <td valign="top" width="128">192.168.1.0 /25</td> <td valign="top" width="128">192.168.1.1</td> <td valign="top" width="128">192.168.1.126</td> <td valign="top" width="128">192.168.1.127</td> </tr>
<tr> <td valign="top" width="114">production</td> <td valign="top" width="128">192.168.1.128 /25</td> <td valign="top" width="128">192.168.1.129</td> <td valign="top" width="128">192.168.1.254</td> <td valign="top" width="128">192.168.1.255</td> </tr>
<tr> <td valign="top" width="114">future</td> <td valign="top" width="128">192.168.2.0 /25</td> <td valign="top" width="128">192.168.2.1</td> <td valign="top" width="128">192.168.2.126</td> <td valign="top" width="128">192.168.2.127</td> </tr>
<tr> <td valign="top" width="114">null</td> <td valign="top" width="128">192.168.2.128 /25</td> <td valign="top" width="128">192.168.2.129</td> <td valign="top" width="128">192.168.2.254</td> <td valign="top" width="128">192.168.2.255</td> </tr>
<tr> <td valign="top" width="114">administrative</td> <td valign="top" width="128">192.168.3.0 /26</td> <td valign="top" width="128">192.168.3.1</td> <td valign="top" width="128">192.168.3.62</td> <td valign="top" width="128">192.168.3.63</td> </tr>
<tr> <td valign="top" width="114">mobile</td> <td valign="top" width="128">192.168.3.64 /26</td> <td valign="top" width="128">192.168.3.65</td> <td valign="top" width="128">192.168.3.126</td> <td valign="top" width="128">192.168.3.127</td> </tr>
<tr> <td valign="top" width="114">peripherals</td> <td valign="top" width="128">192.168.3.128 /26</td> <td valign="top" width="128">192.168.3.129</td> <td valign="top" width="128">192.168.3.190</td> <td valign="top" width="128">192.168.3.191</td> </tr>
<tr> <td valign="top" width="114">Web_access</td> <td valign="top" width="128">192.168.3.192 /28</td> <td valign="top" width="128">192.168.3.193</td> <td valign="top" width="128">192.168.3.206</td> <td valign="top" width="128">192.168.3.207</td> </tr>
<tr> <td valign="top" width="114">default</td> <td valign="top" width="128">192.168.3.208 /28</td> <td valign="top" width="128">192.168.3.209</td> <td valign="top" width="128">192.168.3.222</td> <td valign="top" width="128">192.168.3.223</td> </tr>
<tr> <td valign="top" width="114">management</td> <td valign="top" width="128">192.168.3.224 /28</td> <td valign="top" width="128">192.168.3.225</td> <td valign="top" width="128">192.168.3.238</td> <td valign="top" width="128">192.168.3.239</td> </tr>
<tr> <td valign="top" width="114">net_admin</td> <td valign="top" width="128">192.168.3.240 /28</td> <td valign="top" width="128">192.168.3.241</td> <td valign="top" width="128">192.168.3.254</td> <td valign="top" width="128">192.168.3.255</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 3: Examine Address Blocks for Overlapping Addresses</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">One of the major issues of planning network addresses is overlapping addresses. This is especially true when using VLSM addressing. Examine the table in the previous step to ensure that each network has a unique address range.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any overlapping addresses in the networks?<strong>Tidak</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If there are any overlapping addresses, recalculate the addressing plan for the FilmCompany network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 6.2.6 Diagramming the Network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify the appropriate VLAN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the previous labs, you identified VLANs and subnets to be used in the FilmCompany network expansion. For each device listed in the table in the final section of this lab, assign each host the appropriate VLAN based on its description. Record these VLAN assignments in the third column of the table in Step 5.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Assign addresses to the devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the previous lab, an address range was established for each subnet and VLAN. Using these established ranges and the VLAN assignments to the devices in the previous step, assign a host address to each of the selected hosts. Record this information in the last column of the table in Step 5 of this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Define the codes for device naming</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the device information, develop and apply a naming convention for the hosts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A good naming scheme follows these guidelines:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Keep the names as short as possible; using fewer than twelve characters is recommended.</li>
<li>• Indicate the device type, purpose, and location with codes, rather than words or abbreviations.</li>
<li>• Maintain a consistent scheme. Consistent naming makes it easier to sort and report on the devices,</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">and to set up management systems.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Document the names in the IT department files and on the network topology diagrams.</li>
<li>• Avoid names that make it easy to find protected resources.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For each naming criteria, assign a code for type. You will use these codes in different combinations to create device names. In the tables below, create codes for the elements of the device names. Use as many or as few codes as needed.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="97"><strong>Device Type</strong></td> <td valign="top" width="84"><strong>Type code</strong></td> <td valign="top" width="120"><strong>Device Purpose</strong></td> <td valign="top" width="108"><strong>Purpose code</strong></td> <td valign="top" width="120"><strong>Device Location</strong></td> <td valign="top" width="109"><strong>Location code</strong></td> </tr>
<tr> <td valign="top" width="97">Laptop</td> <td valign="top" width="84">LT</td> <td valign="top" width="120">Management</td> <td valign="top" width="108">MGMT</td> <td valign="top" width="120">Stadium</td> <td valign="top" width="109">STAD</td> </tr>
<tr> <td valign="top" width="97">Desktop PC</td> <td valign="top" width="84">PC</td> <td valign="top" width="120">Production</td> <td valign="top" width="108">PROD</td> <td valign="top" width="120">1st Floor</td> <td valign="top" width="109">1FLR</td> </tr>
<tr> <td valign="top" width="97">Workstation</td> <td valign="top" width="84">WS</td> <td valign="top" width="120">Netadmin</td> <td valign="top" width="108">NETA</td> <td valign="top" width="120">3rd Floor</td> <td valign="top" width="109">3FLR</td> </tr>
<tr> <td valign="top" width="97">Printer</td> <td valign="top" width="84">PT</td> <td valign="top" width="120"><br />
</td> <td valign="top" width="108"><br />
</td> <td valign="top" width="120">ServerRoom</td> <td valign="top" width="109">SVRM</td> </tr>
<tr> <td valign="top" width="97">Scanner</td> <td valign="top" width="84">SC</td> <td valign="top" width="120"><br />
</td> <td valign="top" width="108"><br />
</td> <td valign="top" width="120"><br />
</td> <td valign="top" width="109"><br />
</td> </tr>
<tr> <td valign="top" width="97">Server</td> <td valign="top" width="84">SV</td> <td valign="top" width="120"><br />
</td> <td valign="top" width="108"><br />
</td> <td valign="top" width="120"><br />
</td> <td valign="top" width="109"><br />
</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Establish the naming convention</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the spaces below, indicate the order and the number of letters to be used in the device naming. Again, use as many or as few letters as necessary. List the criteria in the blanks and draw a line to indicate the number of letters used. You may also choose to use hyphens (-) or underscores (_) to separate fields.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Apply a naming convention</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For each of the twelve devices shown in this table, apply the naming convention. Then add these device</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">names in the appropriate boxes in the topology at the beginning of the lab.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="66"><strong>Number</strong></td> <td valign="top" width="102"><strong>Device Name</strong></td> <td valign="top" width="78"><strong>VLAN</strong></td> <td valign="top" width="221"><strong>Description</strong></td> <td valign="top" width="85"><strong>IP Address</strong></td> </tr>
<tr> <td valign="top" width="66">1</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">servers<strong> </strong></td> <td valign="top" width="221">Server for capturing raw video feeds from stadium</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">2</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">servers<strong> </strong></td> <td valign="top" width="221">Server for storing finished (postproduction) video<strong> </strong></td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">3</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">web_access<strong> </strong></td> <td valign="top" width="221">Public web server for on demand video access</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">4</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">management<strong> </strong></td> <td valign="top" width="221">Branch manager’s computer<strong> </strong></td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">5</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">production<strong> </strong></td> <td valign="top" width="221">Live event production worker (switched)</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">6</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">support<strong> </strong></td> <td valign="top" width="221">Human resource clerk<strong> </strong></td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">7</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">support<strong> </strong></td> <td valign="top" width="221">Payroll Manager<strong> </strong></td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">8</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">mobile<strong> </strong></td> <td valign="top" width="221">Live event mobile worker (audio producer)</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">9</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">mobile<strong> </strong></td> <td valign="top" width="221">Live event mobile worker (camera coordinator)</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">10</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">support<strong> </strong></td> <td valign="top" width="221">Receptionist’s computer</td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">11</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">management<strong> </strong></td> <td valign="top" width="221">Financial Manager’s computer<strong> </strong></td> <td valign="top" width="85"><strong> </strong></td> </tr>
<tr> <td valign="top" width="66">12</td> <td valign="top" width="102"><strong> </strong></td> <td valign="top" width="78">net_admin<strong> </strong></td> <td valign="top" width="221">Information Technology manager’s computer</td> </tr>
</tbody></table>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-71720604131433390272011-01-08T17:37:00.001-08:002011-01-08T17:37:34.926-08:00Tugas CCNA 4 Labskill Chapter 5<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 5.1.1.4 Applying Design Constraints</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify possible project constraints</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new Project Constraints document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. The identified constraints that set limits or boundaries on the network upgrade project should be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">entered into the Gathered Data field of the constraints document. Brainstorm ideas with other</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">students to identify additional constraints.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Classify each constraint as one of the following four types:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Budget</li>
<li>• Policy</li>
<li>• Schedule</li>
<li>• Personnel</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Tabulate comments based on the identified constraints</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Using the list of constraints discovered from the FilmCompany case study, apply appropriate</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">comments on how the constraints affect the design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Enter the comments into a table</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="213"><strong>FILM </strong></td> <td valign="top" width="213"><strong>COMPANY</strong></td> <td valign="top" width="213"><strong>CONSTRAINTS</strong></td> </tr>
<tr> <td valign="top" width="213"><strong>CONSTRAINT</strong></td> <td valign="top" width="213"><strong>GATHERED DATA</strong></td> <td valign="top" width="213"><strong>COMMENTS</strong></td> </tr>
<tr> <td valign="top" width="213"><strong> </strong></td> <td valign="top" width="213">to IT personnel <ul><li>• Training needed for new hires on company security policy</li>
</ul></td> <td valign="top" width="213">of a failure.<strong> </strong></td> </tr>
<tr> <td valign="top" width="213"><strong>Schedule</strong><strong> </strong></td> <td valign="top" width="213"> <ul><li>• Project must be completed within 4 months of project start.</li>
<li>• Maintenance windows are between 2am and 6am Monday through Friday.</li>
</ul><strong> </strong></td> <td valign="top" width="213"> <ul><li>• Less than 4 months to get the project completed.</li>
</ul><strong> </strong></td> </tr>
<tr> <td valign="top" width="213"><strong>Personnel</strong></td> <td valign="top" width="213"> <ul><li>• Looking to hire 6 temporary and parttime production staff and at least 1 IT technician.</li>
<li>• Training on new equipment for IT personnel is needed.</li>
</ul><strong> </strong></td> <td valign="top" width="213"> <ul><li>• Will new personnel affect security policy?</li>
<li>• Do the new personnel need training on the equipment?</li>
<li>• Do existing personnel need training?</li>
</ul><strong> </strong></td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your Project Constraints checklist.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Identify trade-offs</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Project Constraints document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. The identified constraints that set limits or boundaries on the network upgrade project will require</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">potential trade-offs. Discuss ideas with other students regarding trade-offs for proposed designs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Mungkin</strong><strong> tidak mendapatkan peralatan baru karena keterbatasan anggaran, sehingga peralatan yang ada mungkin perlu upgrade. Layanan ISP mungkin tidak optimal untuk jenis lalu lintas yang dihasilkan, sehingga sebuah ISP baru mungkin diperlukan. Anggaran tidak dapat mendukung p</strong><strong>engganti</strong><strong>an </strong><strong>infrastruktur</strong><strong> yang ada; alternatif perlu dikembangkan untuk ekspansi masa depan.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Record the trade-offs in your Project Constraints checklist.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Project Constraints checklist.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The constraints imposed on this network design project are determined by the internal requirements of the FilmCompany. Consider and discuss the identified constraints and potential trade-offs. Do the trade-offs pose a significant obstacle to the design? Are there alternate methods that can be employed to achieve the success criteria without a significant budget?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Kurang dari empat bulan untuk menyelesaikan proyek akan membutuhkan alokasi personel lebih banyak.<br />
• Pelatihan personil mungkin perlu dilakukan secara bertahap.<br />
• Tidak tersedianya peralatan atau kabel dari spesifikasi teknis yang diperlukan<br />
• Kurangnya akomodasi ke rumah usaha yang </strong><strong>diperluas</strong><strong> dan infrastruktur jaringannya sejak </strong><strong>proyek</strong><strong> dapat mengkonsolidasikan ke dalam satu lokasi.<br />
• keterbatasan ISP mungkin memerlukan perubahan dalam desain. Haruskah ISP lain digunakan?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 5.1.2.4 Identifying Design Strategies for Scalability</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify the areas that will be used for designing a strategy that facilitates scalability</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “Design Strategies.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified constraints that set limits or boundaries on the network upgrade project and the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">potential trade-offs to assist in the discussion with other students.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The strategy should cover the following areas:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Access Layer modules that can be added</li>
<li>• Expandable, modular equipment or clustered devices that can be easily upgraded</li>
<li>• Choosing routers or multilayer switches to limit broadcasts and filter traffic</li>
<li>• Planned redundancy</li>
<li>• An IP address strategy that is hierarchal and that supports summarization</li>
<li>• Identification of VLANs needed</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Create an Access Layer module design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the list developed from the group discussion, create an Access Layer module (design only).</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Create your design using the existing equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>The FilmCompany network equipment includes:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 x 1841 Routers (FC-CPE-1, FC-CPE-2)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3 x 2960 Switches (FC-ASW-1, FC-ASW-2, ProductionSW)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Several servers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x Linksys WRT300N Wireless Router (FC-AP)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x ADSL Modem for Internet Access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify modules that can be added to the existing equipment to support</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">new features and devices without requiring major equipment upgrades.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your Design Strategies documentation.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Select Distribution Layer devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Design Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified Access Layer module diagram to create the Distribution Layer design. Equipment</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">selected must include existing equipment. Use Layer 3 devices at the Distribution Layer to filter and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reduce traffic to the network core.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. With a modular Layer 3 Distribution Layer design, new Access Layer modules can be connected</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">without requiring major reconfiguration. Using your documentation, identify what modules can be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">added to increase bandwidth.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Design Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The constraints and trade-offs identified for the FilmCompany pose many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified strategies. Do all of the strategies designed accomplish the task the same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Mengembangkan skema pengalamatan IP menggunakan jaringan 10.xxx benar-benar menantang.<br />
• Memisahkan VLAN<br />
• Rancangan ACL </strong><strong>unik</strong><strong> mengingat</strong><strong> penyaringan tidak diidentifikasi oleh klien.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 5.1.3.5 Identifying Availability Strategies</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify the areas that will be used for designing a strategy that facilitates availability</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “Availability Strategies.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified constraints that set limits or boundaries on the network upgrade project and the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">potential trade-offs to assist in brainstorming ideas with other students.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The strategy should cover the following areas:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Availability strategies for switches:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Redundant power supplies and modules</li>
<li>• Hot-swappable cards and controllers</li>
<li>• Redundant links</li>
<li>• UPS and generator power</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Availability strategies for routers:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Redundant power supplies, UPS, and generator power</li>
<li>• Redundant devices</li>
<li>• Redundant links</li>
<li>• Out-of-band management</li>
<li>• Fast converging routing protocols</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Availability strategies for Internet/Enterprise Edge:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Dual ISP providers or dual connectivity to a single provider</li>
<li>• Co-located servers</li>
<li>• Secondary DNS servers</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Create availability strategies for switches</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Using the list developed from the brainstorming session, create a list of equipment that will be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">incorporated into the availability strategy.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The FilmCompany network equipment includes:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 x 1841 Routers (FC-CPE-1, FC-CPE-2)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3 x 2960 Switches (FC-ASW-1, FC-ASW-2, ProductionSW)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Several servers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x Linksys WRT300N Wireless Router (FC-AP)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x ADSL Modem for Internet Access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify modules and redundant power supplies that will increase</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">availability for the switches.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Identify potential hot swappable cards and controllers that can be used. Create a list that identifies</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">each with cost and features.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Develop a diagram that shows potential redundant links that can be incorporated into the network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Identify at least two possible UPS devices that can be incorporated into the design. Create a list that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">identifies the cost and features of each.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Save your Availability Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Create availability strategies for routers</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Availability Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify redundant power supplies that will increase availability for the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">switches.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Identify potential redundant devices and links that can be used. Create a list that identifies each with</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">cost and features.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Create a diagram that displays the redundant connections.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Develop a list of potential routing protocols that will facilitate fast convergence times.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Save your Availability Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create availability strategies for Internet/Enterprise Edge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Availability Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Identify options available that would allow for dual ISP or dual connectivity to a single provider.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Create a design that will co-locate the servers to allow for redundancy and ease of maintenance.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Availability Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The creation of availability strategies poses many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified strategies. Do all of the strategies designed accomplish the task the same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Berbagai modul dapat dibeli dengan berbagai fitur dan biaya.<br />
• Berbagai perangkat UPS dapat dibeli dengan berbagai fitur dan biaya.<br />
• Beberapa protokol routing dapat dipilih, tetapi mana yang paling sesuai desain?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 5.1.5.2 Identifying Security Requirements</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify potential security weaknesses within the FilmCompany topology</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “Security Strategies.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the documents created in previous labs and the existing topology; identify potential</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">weaknesses in the existing design. (No firewalls, no VPNs)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Create a list of recommended security practices that should be employed in the FilmCompany</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Security Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Create a security practices list</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Using the list developed from the brainstorming session, create a finalized list of recommended</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">security practices for the FilmCompany.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Recommended security practices include:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Use firewalls to separate all levels of the secured corporate network from other unsecured</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">networks, such as the Internet. Configure firewalls to monitor and control the traffic, based on</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a written security policy.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Create secured communications by using VPNs to encrypt information before it is sent</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">through third-party or unprotected networks.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Prevent network intrusions and attacks by deploying intrusion prevention systems. These</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">systems scan the network for harmful or malicious behavior and alert network managers.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Control Internet threats by employing defenses to protect content and users from viruses,</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">spyware, and spam.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Manage endpoint security to protect the network by verifying the identity of each user before</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">granting access.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Ensure that physical security measures are in place to prevent unauthorized access to</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network devices and facilities.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Secure wireless Access Points and deploy wireless management solutions.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Identify what devices and software will need to be purchased to facilitate the recommended security</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">practices. (Hardware firewalls, intrusion detection systems etc.)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your Security Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Create a security strategy</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Security Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of identified equipment, develop a chart of costs and features of the recommended</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">devices.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Using the list of identified software needed, develop a chart of costs and features of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">recommended software.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Security Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create a security design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Securities Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Identify which types of access to the network should be secured by incorporating VPNs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Identify methods for controlling physical security at the FilmCompany building and at the stadium.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Identify potential ACLs that can be created to filter unwanted traffic from entering the network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(Standard ACLS or Extended need to be identified.)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Identify methods for securing the wireless Access Points. Determine the best method for the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany network. (128 bit encryption etc.)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Save your Security Strategies document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The creation of a security strategy creates many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified challenges. Do all of the proposed strategies accomplish the task the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How could implementing a physical security plan into an existing company be difficult?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Berbagai perangkat keras dapat dibeli dengan berbagai fitur dan biaya.<br />
• Berbagai software keamanan dapat dibeli dengan berbagai fitur dan biaya.<br />
• karyawan yang ada mungkin tidak menerima perubahan kebijakan keamanan mereka, jadi siapa yang perlu </strong><strong>memastikan</strong><strong> bahwa rencana itu ditegakkan?<br />
• ACL dapat menyaring lalu lintas, tapi apa dampaknya pada arus lalu lintas yang akan mereka miliki? Apakah ACL diterapkan pada Akses </strong><strong>Layer</strong><strong> atau Pembagian Layer atau keduanya?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 5.2.3.3 Designing the Core Layer</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify Core Layer Requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “Core Layer Diagram.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified topology and associated equipment to determine Core Layer design requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Design requirements for the Core Layer network include:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High-speed connectivity to the Distribution Layer switches</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">24 x 7 availability</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Routed interconnections between Core devices</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High-speed redundant links between Core switches and between the Core and Distribution Layer</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">devices</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Brainstorm with other students to identify areas that may have been missed in the initial requirements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Create an Access Layer module design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the list developed from the group discussion, create an Access Layer module (design only).</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Create your design using the existing equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>The FilmCompany network equipment includes:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 x 1841 Routers (FC-CPE-1, FC-CPE-2)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3 x 2960 Switches (FC-ASW-1, FC-ASW-2, ProductionSW)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x ADSL Modem for Internet Access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify modules that can be added to the existing equipment to support</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">new features, such as redundancy.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your Core Layer Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Select Core Layer devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Core Layer Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. The identified Core Layer module diagram will be used to adjust the Distribution Layer design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Equipment selected must include existing equipment. Use Layer 3 devices at the Core Layer in a</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">redundant configuration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your Core Layer Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Design Redundancy</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the Core Layer Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Design a redundancy plan that combines multiple Layer 3 links to increase available bandwidth.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Create a design that incorporates redundancy</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your Core Layer Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The design strategies for the FilmCompany pose many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified strategies. Do all of the strategies designed accomplish the task the same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Apakah peralatan yang ada mampu menangani lalu lintas jaringan yang diusulkan? Jika demikian, bagaimana? Jika tidak, mengapa?<br />
• Apa perangkat yang </strong><strong>dapat</strong><strong> digunakan sebagai pengganti Layer 3 switch? Dapatkah perangkat tersebut </strong><strong>memberikan</strong><strong> kinerja yang sama?<br />
• Apa kelemahan potensial untuk diagram yang diusulkan?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 5.2.4.2 Creating a Diagram of the FilmCompany LAN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify LAN Requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “LAN Diagram.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified topology and associated equipment to determine LAN design requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Design requirements for the LAN include:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High-speed connectivity to the Access Layer switches 24 x 7 availability</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High-speed redundant links between switches on the LAN and the Access Layer devices</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Identifying available hardware for the LAN</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The current network has two VLANs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. General VLAN consisting of:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12 Office PCs</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 Printers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This VLAN serves the general office and managers, including reception, accounts and administration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Addressing:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Network 10.0.0.0/24</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Gateway 10.0.0.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Hosts (dynamic) 10.0.0.200 – 10.0.0.254</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Hosts (static) 10.0.0.10 – 10.0.0.20</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. Production VLAN consisting of:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">9 High Performance Workstations</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">5 Office PCs</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 Printers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Brainstorm with other students to identify areas that may have been missed in the initial requirements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Determine equipment features</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the list developed from the brainstorming session create a LAN based on technical requirements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(design only).</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Create your design using the existing equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>The FilmCompany network equipment includes:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 x 1841 Routers (FC-CPE-1, FC-CPE-2)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3 x 2960 Switches (FC-ASW-1, FC-ASW-2, ProductionSW)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x ADSL Modem for Internet Access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify modules that can be added to the existing equipment to support</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">new features, such as redundancy.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your LAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Select LAN devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the LAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. The identified LAN diagram will be used to adjust the Access Layer design. Equipment selected must</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">include existing equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save your LAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Design Redundancy</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the LAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Design a redundancy plan that combines multiple Layer 2 links to increase available bandwidth.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Create a design that incorporates redundancy.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your LAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The design strategies for the FilmCompany LAN pose many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified strategies. Do all of the strategies designed accomplish the task the same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would the chosen LAN design allow for future growth and the addition of the WLAN?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Apakah peralatan yang ada mampu menangani lalu lintas jaringan yang diusulkan? Jika demikian, bagaimana? Jika tidak, mengapa?<br />
• Apa perangkat yang </strong><strong>dapat</strong><strong> digunakan sebagai pengganti Layer 2 switch? </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Apa kelemahan potensial untuk diagram yang diusulkan? </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 5.4.2.2 Selecting Access Points</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Identify WLAN requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create a new document called “WLAN Diagram.”</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use the identified topology and associated equipment to determine WLAN design requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Design requirements for the WLAN include:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Scalability</li>
<li>• Availability</li>
<li>• Security</li>
<li>• Manageability</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Brainstorm with other students to identify areas that may have been missed in the initial requirements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Determine equipment features</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the list developed from the brainstorming session create a WLAN based on technical requirements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(design only).</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Begin by creating your design using the existing equipment.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Network equipment includes:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 x 1841 Routers (FC-CPE-1, FC-CPE-2)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3 x 2960 Switches (FC-ASW-1, FC-ASW-2, ProductionSW)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x Network and Business Server</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x Linksys WRT300N Wireless Router (FC-AP)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 x ADSL Modem for Internet Access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Using the list of equipment, identify the model of wireless router. Identify the features and range of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">device. Identify whether there are upgrades that can be made to extend the range, security, and existing features.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Create a list of features and potential upgrades and compare them to other models of wireless router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine the device that can easily meet the technical requirements of the WLAN. (Standalone</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Access Points for ease of installation or wireless controllers for security and management)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. With the previous list estimate the range of coverage available with the existing wireless router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Determine if the wireless router can provide thorough coverage of the work area. Determine if standalone access points or wireless controllers are needed for the design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Save your WLAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Select WLAN devices</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the WLAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. The identified WLAN diagram will be used to determine the type of wireless device that will be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">included into the proposed network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Ensure that the chosen wireless equipment meets the following requirements:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Design requirements for the WLAN include:</strong></div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Scalability</li>
<li>• Availability</li>
<li>• Security</li>
<li>• Manageability</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save your WLAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Design the WLAN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Use word processing software to create an addition to the WLAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Design a WLAN that provides scalability. Annotate on the WLAN Diagram document how the design</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">provides scalability.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(<strong>Scalability </strong>– New lightweight Access Points can be added easily and managed centrally)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Design a WLAN that provides availability. Annotate on the WLAN Diagram document how the design</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">provides availability.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(<strong>Availability </strong>– Access Points can automatically increase their signal strength if one Access Point fails)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Design a WLAN that provides security. Annotate on the WLAN Diagram document how the design</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">provides security.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(<strong>Security </strong>– Enterprise-wide security policies apply to all layers of a wireless network, from the radio</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">layer through the MAC Layer and into the Network Layer. This solution makes it easier to provide</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">uniformly enforced security, QoS, and user policies. These policies address the specific capabilities of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">different classes of devices, such as handheld scanners, PDAs, and notebook computers.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Security policies also provide discovery and mitigation of DoS attacks, and detection and denial of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">rogue Access Points. These functions occur across an entire managed WLAN.)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Design a WLAN that provides manageability. Annotate on the WLAN Diagram document how the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">design provides manageability.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(<strong>Manageability </strong>– The solution provides dynamic, system-wide radio frequency (RF) management,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">including features that aid smooth wireless operations, such as dynamic channel assignment,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">transmit power control, and load balancing. The single graphical interface for enterprise-wide policies</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">includes VLANs, security, and QoS.)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Save your WLAN Diagram document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The design strategies for the FilmCompany WLAN pose many challenges for the designer. What were a few of the more difficult challenges you encountered?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss the identified strategies. Do all of the strategies designed or hardware identified</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">accomplish the task the same way?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would one be less expensive or less time-consuming than the other?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Would the current topology allow for future growth and the addition of the WLAN?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Apakah keterbatasan throughput WLAN?<br />
• Apakah peralatan yang ada mampu menangani lalu lintas jaringan yang diusulkan? Jika demikian, bagaimana? Jika tidak, mengapa?<br />
• Apa perangkat dapat digunakan sebagai pengganti akses poin mandiri?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Apa kelemahan potensial untuk diagram yang diusulkan?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 5.5.3 Developing ACLs to Implement Firewall Rule Set</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and connect the network as shown in the topology diagram</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>NOTE: </strong>If the PCs used in this lab are also connected to your Academy LAN or to the Internet, ensure that you record the cable connections and TCP/IP settings so that these can be restored at the conclusion of the lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Connect and configure the devices in accordance with the given topology and configuration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Routing will have to be configured across the serial links to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Configure Telnet access on each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Ping between Host1, Host2, and Production Server to confirm network connectivity.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Troubleshoot and establish connectivity if the pings or Telnet fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Perform basic router configurations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Configure the network devices according to the following guidelines:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Configure the hostnames on each device.</li>
<li>• Configure an EXEC mode password of <strong>class.</strong></li>
<li>• Configure a password of <strong>cisco </strong>for console connections.</li>
<li>• Configure a password of <strong>cisco </strong>for vty connections.</li>
<li>• Configure IP addresses on all devices.</li>
<li>• Enable EIGRP on all routers and configure each to advertise all of the connected networks.</li>
<li>• Verify full IP connectivity using the <strong>ping </strong>command.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Confirm Application Layer connectivity by telneting to all routers.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Create firewall rule set and access list statements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the security policy information for the FilmCompany remote access, create the firewall rules that must be implemented to enforce the policy. After the firewall rule is documented, create the access list statement that will implement the firewall rule. There may be more than one statement necessary to implement a rule.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 1: </strong>Remote users must be able to access the Production Server to view their schedules</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">over the web and to enter new orders.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Permit users on the 10.1.1.0/24 access to the Production Server (172.17.1.1) on TCP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port 80.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 80</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1 (remember that extended ACLs should be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">placed close as possible to the source of the traffic). For each of the following security policies:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Create a firewall rule.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Create an access list statement.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Determine the access list placement to implement the firewall rule.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 2: </strong>Remote users must be able to FTP files to and from the Production Server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Permit users on the 10.1.1.0/24 access to the Production Server (172.17.1.1) on TCP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ports 20 and 21.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 range</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">20 21 or two separate access-list statements, each permitting one of the ports.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1 (remember that extended ACLs should be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">placed close as possible to the source of the traffic)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 3: </strong>Remote users can use the Production Server to send and retrieve email using IMAP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">and SMTP protocols.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Permit users on the 10.1.1.0/24 access to the Production Server (172.17.1.1) on TCP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ports 143 and 25</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s):</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 25</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 143</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1 (remember that extended ACLs should be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">placed close as possible to the source of the traffic)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 4: </strong>Remote users must not be able to access any other services available on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Production Server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Deny all other IP protocols between users on the 10.1.1.0/24 network to the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Production Server (172.17.1.1)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>deny ip 10.1.1.0 0.0.0.255 host 172.17.1.1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 5: </strong>No traffic is permitted from individual workstations at the main office to remote worker</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">workstations. Any files that need to be transferred between the two sites must be stored on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Production Server and retrieved via FTP.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Deny all IP protocols from users on the 10.3.1.0/24 to the 10.1.1.0/24 network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>deny ip 10.3.1.0 0.0.0.255 10.1.1.0 0.0.0.255</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router BR4 Fa0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 6: </strong>No traffic is permitted from workstations at the remote site to workstations at the main</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">site.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Deny all IP protocols from users on the 10.1.1.0/24 to the 10.3.1.0/24 network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>deny ip 10.1.1.0 0.0.0.255 10.3.1.0 0.0.0.255</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Security Policy 7: </strong>No Telnet traffic is permitted from the remote site workstations to any devices,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">except their local switch.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Firewall Rule: </strong>Deny all TCP traffic from users on the 10.1.1.0/24 network on port 23.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List statement(s): </strong>deny tcp 10.1.1.0 0.0.0.255 any eq 23</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Access List placement: </strong>Inbound on router SR1 Fa0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create Extended ACLs</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Review the access list placement information that you created to implement each of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany security policies. List all of the different access list placements that you noted above.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inbound on router SR1 Fa0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inbound on router BR4 Fa0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Based on the placement information, how many access lists do you have to create?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On Router SR1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On Router Edge2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On Router BR4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Based on the access list statements you developed in Task 3, create each access list that is needed</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">to implement the security policies. When creating access lists, remember the following principles:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Only one access list can be applied per protocol, per direction on each interface.</li>
<li>• Access list statements are processed in order.</li>
<li>• Once an access list is created and applied on an interface, all traffic that does not match any access</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">list statement will be dropped.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Use a text file to create the access lists, or write them here. Evaluate each access list statement to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ensure that it will filter traffic as intended.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Access list to be placed on SR1 Fa0/1 inbound:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 80</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 range 20 21</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 25</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit tcp 10.1.1.0 0.0.0.255 host 172.17.1.1 eq 143</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">deny ip 10.1.1.0 0.0.0.255 host 172.17.1.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">deny ip 10.1.1.0 0.0.0.255 10.3.1.0 0.0.0.255</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">deny tcp 10.1.1.0 0.0.0.255 any eq 23</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit ip any any</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Access list to be placed on BR4 Fa0/1 inbound:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">deny ip 10.3.1.0 0.0.0.255 10.1.1.0 0.0.0.255</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">permit ip any any</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Why is the order of access list statements so important?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">untuk mengurangi beban prosesor router dan menurunkan latency</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-10394304649487144162011-01-08T17:33:00.001-08:002011-01-08T17:33:12.182-08:00Tugas CCNA 4 Labskill Chapter 4<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.1.2 Characterizing Network Applications</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Connect and configure the devices in accordance with the topology and configuration given.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For this lab, a PC workstation can substitute for a Discovery Server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Ping between Host 1 and Discovery Server to confirm network connectivity.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Troubleshoot and establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on the interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">NetFlow is configured to monitor data flows in or out of specific router interfaces. <strong>Ingress </strong>captures traffic that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">is being received by the interface. <strong>Egress </strong>captures traffic that is being transmitted by the interface. In this lab,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the traffic will be monitored on both router interfaces and in both directions from within the console session.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the global configuration mode, issue the following commands:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the two options available:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">egress Enable outbound NetFlow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ingress Enable inbound NetFlow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which option captures traffic that is being received by the interface? ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which option captures traffic that is being transmitted by the interface? egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Complete the NetFlow configuration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>exit</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode, issue the <strong>show running-configuration </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For each FastEthernet interface, what statement from the running-configuration denotes that NetFlow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">is configured?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface FastEthernet0/0:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface FastEthernet0/1:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the command:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the three options available:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">export Display export</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Statistics</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface Display flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configuration on Interfaces</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">top-talkers Display top talkers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. The captured data flow can be examined using the <strong>show ip cache flow </strong>command issued from</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the privileged EXEC mode.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Issuing this command before any data traffic has flowed should produce output similar to the example</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">shown here.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP packet size distribution (0 total packets):</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Flow Switching Cache, 0 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 active, 0 inactive, 0 added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 ager polls, 0 flow alloc failures</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Active flows timeout in 30 minutes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Inactive flows timeout in 15 seconds</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">last clearing of statistics never</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Total Flows Packets Bytes Packets Active(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Idle(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Pkts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. List the seven highlighted column headings and consider what use this information may be in</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">characterizing the network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total Flows</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Flows per Second</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Packets per Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Bytes per Packet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Packets per Second</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Seconds of active flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Seconds of no flow (idle)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. To ensure that flow cache statistics are reset, from privileged EXEC mode issue the command:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1# <strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Ping the Business Server from Host 1 to generate a data flow.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the command line of Host 1, issue the command <strong>ping 172.17.1.1 -n 200</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. At the conclusion of the data flow, the details of the flow can be viewed. From privileged EXEC mode,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">issue the command:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output similar to that shown below will be displayed. Some values and details may be different in</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">your lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP packet size distribution (464 total packets):</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .900 .096 .000 .000 .000 .000 .002 .000 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Flow Switching Cache, 278544 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">5 active, 4091 inactive, 48 added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1168 ager polls, 0 flow alloc failures</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Active flows timeout in 30 minutes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Inactive flows timeout in 15 seconds</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Sub Flow Cache, 17416 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 active, 1024 inactive, 0 added, 0 added to flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 alloc failures, 0 force free</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 chunk, 1 chunk added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">last clearing of statistics never</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Total Flows Packets Bytes Packets Active(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Idle(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">——– Flows /Sec /Flow /Pkt /Sec /Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">/Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-DNS 31 0.0 1 72 0.0 0.0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">15.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-other 10 0.0 2 76 0.0 4.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">15.2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ICMP 2 0.0 200 60 0.3 198.9</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">15.3</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total: 43 0.0 10 61 0.3 10.2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">15.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Pkts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">< output omitted ></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Examine your output and list details that indicate data flow.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total Flows</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Flows per Second</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Packets per Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Bytes per Packet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Packets per Second</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Seconds of active flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Seconds of no flow (idle)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Stop the NetFlow capture</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. To deactivate NetFlow capture, issue the <strong>no ip flow </strong>command at the interface configuration</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">prompt.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>no ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>no ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>no ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>no ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. To verify that NetFlow is deactivated, issue the <strong>show ip flow interface </strong>command from the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">privileged EXEC mode.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">No output is displayed if NetFlow is off.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the possible range of data flow types across a network and how a tool like NetFlow could be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">implemented to assist in analyzing those flows.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List of data flow categories and types: Client to Client, Client to Server, Server to Client, and Server to Server</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Email, intranet web, database flows, document file flows</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Number of separate flows of each type, size (bytes) of each flow, time each flow is on the network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Daftar kategori dan jenis aliran data: Client untuk Klien, Klien ke Server, Server untuk Client, dan Server ke Server<br />
Email, web intranet, aliran database, file dokumen arus<br />
Jumlah arus yang terpisah masing-masing jenis, ukuran (bytes) dari setiap aliran, waktu setiap aliran pada jaringan</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Final Configurations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>version 12.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>service timestamps debug datetime msec</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>service timestamps log datetime msec</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no service password-encryption!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>hostname FC-CPE-1!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>boot-start-marker</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>boot-end-marker!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>enable password cisco!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no aaa new-model</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip cef!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface FastEthernet0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip address 10.0.0.1 255.255.255.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>duplex auto</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>speed auto</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface FastEthernet0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip address 172.17.0.1 255.255.0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>duplex auto</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>speed auto</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface Serial0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no ip address</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>shutdown</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no fair-queue</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>clock rate 2000000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>!</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>interface Serial0/1/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no ip address</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>shutdown</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>clock rate 2000000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ip http server</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>no ip http secure-server</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>control-plane</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>line con 0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>password cisco</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>login</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>line aux 0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>line vty 0 4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>password cisco</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>login</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>scheduler allocate 20000 1000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.2.3 Analyzing Network Traffic</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 1: Design Network Access to FTP and Email Services</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: FTP network considerations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">File transfer traffic can put high-volume traffic onto the network. This traffic can have a greater effect on</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">throughput than interactive end-to-end connections. Although file transfers are throughput-intensive, they</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">typically have low response-time requirements. As part of the initial characterization of the network, it is important to identify the level of FTP traffic that will be generated. From this information, the network designers can decide on throughput and redundancy requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. List possible file transfer applications that would generate traffic on the FilmCompany network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Document sharing</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Video production file transfer</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. List these applications by priority based on response time.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. Video production file transfer</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. Document sharing</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. List these applications by priority based on bandwidth requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. Video production file transfer</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. Document sharing</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Email network considerations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Although customers expect immediate access to their emails, they usually do not expect emails to have</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network priority over files that they are sharing or updating. Emails are expected to be delivered reliably and accurately. Generally, emails are not throughput-intensive, except when there are enterprise-wide mail-outs or there is a denial of service attack.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List some email policies that could control the volume of email data and the bandwidth used.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Membatasi ukuran lampiran email</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Membatasi nomor penerima pesan email</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Memastikan spam terfilter sebelum menjangkau LAN</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Configure and connect the host PCs</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Set the IP addresses for PC1 and PC2 as shown in the configuration table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a terminal session to router R1 from one of the PCs, and configure the interfaces and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">hostname as shown in the configuration table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 2: Configure NBAR to Examine Network Traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Enable NBAR Protocol Discovery</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">NBAR can determine which protocols and applications are currently running on a network. NBAR includes the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Discovery feature, which identifies the application protocols operating on an interface so that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">appropriate QoS policies can be developed and applied. To enable Protocol Discovery to monitor selected</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">protocols on a router interface, issue the following commands from the global configuration mode:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip nbar protocol-discovery</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Confirm that Protocol Discovery is configured</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the privileged EXEC mode, issue the <strong>show running-config </strong>command and confirm that the following</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">output appears under interface FastEthernet 0/0:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip address 10.0.0.1 255.255.255.0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip nbar protocol-discovery</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If protocol-discovery is not confirmed, reissue the configuration commands for interface FastEthernet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0/0.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 3: Generate and Identify Network Traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Generate FTP traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The Mozilla Thunderbird email client program will be downloaded from Discovery Server as an example of FTP.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On PC1, launch a web browser and enter the URL <strong>ftp://server.discovery.ccna</strong>,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Alternatively, from the command line, enter <strong>ftp server.discovery.ccna</strong>. If DNS is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured the IP address 172.17.1.1 must be used instead of the domain name.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Locate the file <strong>thunderbird_setup.exe </strong>in the <strong>pub </strong>directory, download the file, and save it on PC1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Repeat this step for PC2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Generate Email traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the Thunderbird email client has been installed and email accounts set up on both PC1 and PC2, proceed</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">to Step 2d. Otherwise, install and set up the email client on PC1 and PC2 as described in Steps 2a through 2c.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Install the Thunderbird email client on PC1 and PC2 by double-clicking the downloaded</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>thunderbird_setup.exe </strong>file and accepting the default settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. When the installation has completed, launch the program.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Configure email account settings as shown in this table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1) On the <strong>Tools </strong>menu, click <strong>Account Settings</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Complete the required Thunderbird Account Settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In the left pane of the Account Settings screen, click <strong>Server Settings </strong>and complete the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">necessary details.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">4) In the left pane, click <strong>Outgoing Server (SMTP) </strong>and complete the proper configuration for the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Outgoing Server (SMTP).</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Send and receive two emails between accounts on each PC.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Display the NBAR results</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">With Protocol Discovery enabled, any protocol traffic supported by NBAR, as well as the statistics associated</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">with that protocol, can be discovered.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. To display the traffic identified by NBAR, issue the <strong>show ip nbar protocol-discovery</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command from the privileged EXEC mode.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip nbar protocol-discovery</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. List each protocol identified and the Input and Output information.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ftp 18 16</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1295 1288</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Although the data traffic in this lab may not be sufficient to generate values for the <strong>5min Bit rate</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>(bps) </strong>and <strong>5min Max Bit Rate (bps) </strong>fields, consider and discuss how these values would be applied</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">to designing an FTP and email network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Dapat membantu menentukan </strong><strong>rata-rata dan puncak </strong><strong>kebutuhan bandwidth jaringan.</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Use NBAR to monitor other data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">NBAR can identify and monitor a range of network application traffic protocols.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the privileged EXEC mode of the router, issue the command <strong>show ip nbar port-map </strong>and note the output displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip nbar port-map</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List some protocols that you consider should be monitored and policies applied to.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map bgp udp 179</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map bgp tcp 179</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map bittorrent tcp 6881 6882 6883 6884 6885 6886</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">6887 6888 6889</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map citrix udp 1604</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map citrix tcp 1494</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map cuseeme udp 7648 7649 24032</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map cuseeme tcp 7648 7649</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map dhcp udp 67 68</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map directconnect tcp 411 412 413</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map dns udp 53</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map dns tcp 53</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map edonkey tcp 4662</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map exchange tcp 135</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map fasttrack tcp 1214</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map finger tcp 79</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ftp tcp 21</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map gnutella udp 6346 6347 6348</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map gnutella tcp 6346 6347 6348 6349 6355 5634</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map gopher udp 70</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map gopher tcp 70</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map h323 udp 1300 1718 1719 1720 11720</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map h323 tcp 1300 1718 1719 1720 11000 – 11999</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map http tcp 80</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map imap udp 143 220</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map imap tcp 143 220</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map irc udp 194</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map irc tcp 194</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map kerberos udp 88 749</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map kerberos tcp 88 749</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map l2tp udp 1701</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ldap udp 389</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ldap tcp 389</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map mgcp udp 2427 2727</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map mgcp tcp 2427 2428 2727</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map netbios udp 137 138</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map netbios tcp 137 139</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map netshow tcp 1755</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map nfs udp 2049</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map nfs tcp 2049</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map nntp udp 119</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map nntp tcp 119</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map notes udp 1352</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map notes tcp 1352</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map novadigm udp 3460 3461 3462 3463 3464 3465</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map novadigm tcp 3460 3461 3462 3463 3464 3465</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ntp udp 123</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ntp tcp 123</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map pcanywhere udp 22 5632</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map pcanywhere tcp 65301 5631</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map pop3 udp 110</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map pop3 tcp 110</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map pptp tcp 1723</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map printer udp 515</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map printer tcp 515</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map rcmd tcp 512 513 514</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map rip udp 520</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map rsvp udp 1698 1699</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map rtsp tcp 554</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-ftp tcp 990</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-http tcp 443</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-imap udp 585 993</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-imap tcp 585 993</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-irc udp 994</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-irc tcp 994</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-ldap udp 636</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-ldap tcp 636</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-nntp udp 563</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-nntp tcp 563</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-pop3 udp 995</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-pop3 tcp 995</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map secure-telnet tcp 992</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sip udp 5060</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sip tcp 5060</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map skinny tcp 2000 2001 2002</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map smtp tcp 25</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map snmp udp 161 162</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map snmp tcp 161 162</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map socks tcp 1080</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sqlnet tcp 1521</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sqlserver tcp 1433</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map ssh tcp 22</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map streamwork udp 1558</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sunrpc udp 111</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map sunrpc tcp 111</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map syslog udp 514</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map telnet tcp 23</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map tftp udp 69</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map vdolive tcp 7000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map winmx tcp 6699</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">port-map xwindows tcp 6000 6001 6002 6003</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab considered only the volume of FTP and email data traffic and its impact on network design. Reliable</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">access to servers is also important. In the space below, sketch a revised topology for this lab that would</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">provide redundancy for these services.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.3.3 Prioritizing Traffic</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Gather the data traffic information</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Read through the StadiumCompany case study curriculum.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List the current types of data traffic carried by the StadiumCompany network as well as the types</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">planned for the future.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Refer to the topology diagram and the stadium network diagram information<a href="http://monavathia.files.wordpress.com/2011/01/gb4-3-33.png"><img alt="" height="206" src="http://monavathia.files.wordpress.com/2011/01/gb4-3-33.png?w=300&h=206&h=206" title="gb4.3.3" width="300" /></a></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List the possible data sources and destinations on the StadiumCompany network. For example, there</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">is likely to be data communications between the stadium management and the vendor management,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">but not between Team A and Team B.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Prioritize the data traffic</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>List the source, destination, and traffic type that will be assigned the High priority queue.</li>
<li>List the source, destination, and traffic type that will be assigned the Medium priority queue.</li>
<li>List the source, destination, and traffic type that will be assigned the Normal priority queue</li>
<li>List the source, destination, and traffic type that will be assigned the Low priority queue.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Finalize the Data Priorities</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Discuss and review your data priority assignments with another student to ensure that it addresses allnpossible data. Modify your priorities as necessary.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Highlight on the StadiumCompany topology diagram the device or devices where data traffic priority policies are likely to be configured.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ideally, it may seem that all data traffic should be given a priority and queued accordingly. Consider and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">discuss the potential for network performance to be negatively affected if this policy were implemented</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">everywhere on the network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Delay data sensitif akan melihat prioritas yang sama sebagai non-delay data sensitif. Suara, video, diberi prioritas yang sama sebagai lalu lintas lainnya, dll</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.3.4 Exploring Network QoS</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Connect and configure the devices in accordance with the given topology and configuration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Routing will have to be configured across the serial WAN link to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configure Telnet access on each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Ping between Host1 and Discovery Server to confirm network connectivity.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1) Confirm Application Layer connectivity by telnetting from R2 to R1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2) Troubleshoot and establish connectivity if the pings or Telnet fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. After confirming the initial configurations, maintain a console terminal session connection with R2.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Examine priority queue commands</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Configuring Priority Queueing</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Configuring priority queueing (PQ) has two required steps and an optional third step:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. Define the priority list (Required)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. Assign the priority list to an Interface (Required)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">3. Monitor priority queueing lists (Optional)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A priority list contains the definitions for a set of priority queues. The priority list specifies which queue a</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">packet will be placed in and, optionally, the maximum length of the different queues. To perform queueing</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">using a priority list, you must assign the list to an interface. The same priority list can be applied to multiple interfaces. Alternatively, you can create many different priority policies to apply to different interfaces.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Defining the Priority List</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The priority list is defined by:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1. Assigning packets to priority queues</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2. Specifying the maximum size of the priority queues (Optional)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Packets are assigned to priority queues based on the protocol type and the interface where the packets enter the router. The <strong>priority-list </strong>commands are read in order of appearance until a matching protocol or interface type is found. When a match is found, the packet is assigned to the appropriate queue and the search ends. Packets that do not match other assignment rules are assigned to the default queue. The following global configuration mode commands are used to specify in which queue a packet is placed. The command format is <strong>priority-list </strong><em>list-number</em> Use a list-number of <em>1 </em>and note the options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Enter the following command and note the options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">default Set priority queue for</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">unspecified datagrams</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface Set priorities for packets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">from a named interface</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">protocol priority queueing by protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">queue-limit Set queue limits for</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">priority queues</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Note some of the protocol options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">arp IP ARP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">bridge Bridging</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">cdp Cisco Discovery Protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">compressedtcp Compressed TCP (VJ)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">http HTTP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip IP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">llc2 llc2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">pad PAD links</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">pppoe PPP over Ethernet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">snapshot Snapshot routing support</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Note the IP protocol options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ip ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">high</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">medium</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">normal</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">low</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Note the HTTP protocol options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol http ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">high</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">medium</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">normal</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">low</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Note the IP protocol high priority options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ip high ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">fragments Prioritize fragmented IP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">packets</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">gt Prioritize packets greater</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">than a specified size</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">list To specify an access list</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">lt Prioritize packets less than a</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">specified size</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">tcp Prioritize TCP packets ‘to’ or</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">‘from’ the specified port</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">udp Prioritize UDP packets ‘to’ or</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">‘from’ the specified port<cr></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Note the IP protocol high priority TCP options available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ip high tcp ?</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><0-65535> Port number</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">domain Domain Name Service (53)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">echo Echo (7)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ftp File Transfer Protocol (21)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ftp-data FTP data connections (20)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">irc Internet Relay Chat (194)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">nntp Network News Transport Protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(119)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">pop3 Post Office Protocol v3 (110)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">smtp Simple Mail Transport Protocol</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(25)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">telnet Telnet (23)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">www World Wide Web (HTTP, 80)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Over 30 port/service options are available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Configure an example priority queue</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol http high</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ip normal tcp ftp</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>priority-list </strong><em>1 </em><strong>protocol ip medium tcp telnet</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What do these commands establish?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Sebuah</strong><strong> daftar prioritas (nomor “1″) yang menetapkan paket HTTP yang akan ditandai sebagai prioritas tinggi, paket FTP rendah </strong><strong>prioritas</strong><strong>, dan Telnet paket sebagai prioritas menengah.</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Assign the priority list to an interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the global configuration mode, issue the following commands to assign the priority list to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface serial 0/1/0.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>int s0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>priority-group 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Confirm the priority list configuration. From the privileged EXEC mode, issue the <strong>show runningconfig</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which statements in the configuration show that the priority list has been configured and applied</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">correctly?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip address 10.10.0.2 255.255.255.252</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>priority-group 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>priority-list 1 protocol http high</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>priority-list 1 protocol ip normal tcp ftp</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>priority-list 1 protocol ip medium tcp telnet</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Confirm that issuing the <strong>show queueing priority </strong>command from the privileged EXEC mode</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">produces the following output:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show queueing priority</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Current DLCI priority queue configuration:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Current priority queue configuration:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List Queue Args</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 high protocol http</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 normal protocol ip tcp port ftp</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 medium protocol ip tcp port telnet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Examine the priority queues operation</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On Host1, launch a web browser and enter the URL <strong>http://172.17.1.1 </strong>to access the web</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">services configured on the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use FTP to download a file. On Host1, launch a new web browser window and enter the URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ftp://172.17.1.1</strong>, or from the command line issue <strong>ftp 172.17.1.1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Download a large file from the server; for example, the Thunderbird setup program file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. From the privileged EXEC mode, issue the following command:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show queueing interface s0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output similar to this should be displayed:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Interface Serial0/1/0 queueing strategy: priority</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output queue utilization (queue/count)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">high/94 medium/0 normal/106759 low/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the packet count for each queue:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Medium</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Normal</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Low</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Initiate a Telnet session from R2 to R1 and issue some <strong>show </strong>commands on R1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Close the Telnet session.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">g. Issue the following command from the R2 privileged EXEC mode:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show queueing interface s0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the packet count for each queue:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">High</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Medium</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Normal</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Low</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is the significant difference when compared to the previous output form this command in</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Step 5d?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Antrian Menengah sekarang memiliki jumlah paket, ini adalah prioritas </strong><strong>yang </strong><strong>ditugaskan untuk paket Telnet.</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Determine the priority queue requirements for the case study</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Using the FilmCompany case study, what would you expect the priority queue requirements to be?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Discuss and compare your priorities with other students.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Amend your priority list statements to include traffic associated with the proposed network upgrade.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The following privileged EXEC command displays the contents of packets inside a queue for a particular</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">interface:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>show queue </strong><em>interface-type interface-number</em></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">However, in this lab, it is not likely that sufficient data traffic was generated at one time for the interface</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">queues to hold packets long enough to be inspected. Discuss how a network has to be load tested to ensure that all traffic priorities are met.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.4.4 Investigating Video Traffic Impact on a Network</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong><br />
</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Connect and configure the devices in accordance with the given topology and configuration.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Set clock rate on the serial link to 56000.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Routing will have to be configured across the serial WAN link to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Observe data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In this step, you will generate concurrent data traffic and observe the time the flows take.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From Host1 command line, issue the command <strong>ping 172.17.1 1 –n 500 </strong>to generate a large</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">number of pings to Discovery Server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. While the pings are being generated on Host1, launch a web browser and enter the URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>http://server.discovery.ccna </strong>or <strong>http://172.17.1.1 </strong>to access the web services</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Use FTP to download a file. On Host1, launch a new web browser window and enter the URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ftp://server.discovery.ccna</strong>, or issue <strong>ftp server.discovery.ccna </strong>from the command</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">line. If DNS is not configured, the IP address 172.17.1.1 must be used instead of the domain name.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Download a large file from the server; for example, the Thunderbird setup program file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the total time taken to complete the pings, access the web page, and download the file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Stream the video file</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Before beginning to stream the video ensure that QuickTime Player is installed on Host1, and that the video streaming service has been enabled on Discovery Server. See your instructor for advice if you are unsure. Launch QuickTime Player. Under <strong>File </strong>menu, go to <strong>Open URL</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Enter URL <strong>rtsp://172.17.1.1/MWO.sdp</strong>, or a URL as provided by the instructor.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note rate at which it plays back and the video and sound quality.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Video Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Sound Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Observe both video and data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From Host1 command line, issue the command <strong>ping 172.17.1 1 –n 500 </strong>to generate a large</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">number of pings to Discovery Server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. While the pings are being generated, use QuickTime Player to access the streaming video URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">again.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. While the video is being played, launch a new web browser window on Host1 and enter the URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>http://server.discovery.ccna </strong>or <strong>http://172.17.1.1 </strong>to access the web services</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. On Host1, launch another web browser window and enter the URL</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ftp://server.discovery.ccna</strong>, or issue <strong>ftp server.discovery.ccna </strong>from the command</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">line. If DNS is not configured, the IP address 172.17.1.1 must be used instead of the domain name.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Download a large file from the server; for example, the Thunderbird setup program file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the total time taken to complete the pings, access the web page, and download the file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note rate at which it plays back and the video and sound quality.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Video Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Sound Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Observe the data flows with a different serial link clock rate</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Change the serial link clock rate to 250000 on the router with the DCE interface.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Repeat Step 4 and record your observations.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the total time taken to complete the pings, access the web page, and download the file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note rate at which it plays back and the video and sound quality.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Video Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Sound Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Change the serial link clock rate to 2000000 on the router with the DCE interface.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Repeat Step 4 and record your observations.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note the total time taken to complete the pings, access the web page, and download the file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note rate at which it plays back and the video and sound quality.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Video Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Sound Quality</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Instructor Note: The Cisco 1841 router with WIC 2T Serial interfaces can support clock rates up to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">4 000 0000 bits per second (4Mbps); other platforms and WIC 2A/S Serial interfaces may have a lower maximum clock rate.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Record your general observations</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Compare the different download times and video quality.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider and discuss how video and other data traffic can share network resources while maintaining</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">acceptable performance.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Video dan lalu lintas data dapat berbagi sumber daya jaringan yang sama jika bandwidth yang memadai tersedia atau jika lalu lintas yang diprioritaskan. Data lalu lintas dapat ditunda sedikit untuk memungkinkan lebih banyak waktu trafik video sensitif untuk memanfaatkan bandwidth yang tersedia.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.5.1 Identifying Traffic Flows</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program to the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. From the command prompt on Host1, ping between Host1 and Discovery Server to confirm network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">connectivity. Troubleshoot and establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on the interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode, issue the <strong>show ip flow interface </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A range of network application data flows is to be generated and captured. Generate as many of the data</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">flows shown below as is possible in your lab. Your instructor will advise you of the particular applications that are available to be used in this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Ping the Discovery Server from Host1 to generate a data flow.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the command line of Host1, issue the command <strong>ping 172.17.1.1 -n 200</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Telnet to the Discovery Server from Host1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is being used, issue the command <strong>telnet server.discovery.ccna </strong>from the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command prompt of Host1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is not being used, DNS is not configured , or if a terminal program such as</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">HyperTerminal or TeraTerm is being used, telnet from Host1 to 172.17.1.1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. On Host1, launch a web browser and enter the URL http://server.discovery.ccna</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is not being used or DNS is not configured, then use http://172.17.1.1 to access</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the web services configured on that server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Use FTP to download a file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On Host1, launch a web browser and enter the URL <strong>ftp://server.discovery.ccna</strong>, or issue</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ftp server.discovery.ccna </strong>from the command line. If DNS is not configured use the IP</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">address 172.17.1.1 instead of the domain name.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Download a file from the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. If email accounts have been configured using the POP3 and SMTP services on Discovery Server,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">send an email using one of these accounts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">At the conclusion of the data flow, view the details by issuing the <strong>show ip cache flow </strong>command from privileged EXEC mode.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output similar to this will be displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP packet size distribution (3969 total packets):</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .351 .395 .004 .011 .001 .005 .009 .001 .002 .005 .001 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .000 .013 .000 .195 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Flow Switching Cache, 278544 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 active, 4094 inactive, 1368 added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">22316 ager polls, 0 flow alloc failures</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Active flows timeout in 30 minutes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Inactive flows timeout in 15 seconds</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Sub Flow Cache, 17416 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 active, 1024 inactive, 0 added, 0 added to flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 alloc failures, 0 force free</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 chunk, 0 chunks added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">last clearing of statistics 02:50:15</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-Telnet 9 0.0 13 47 0.0 5.2 10.8</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-FTP 28 0.0 7 62 0.0 0.8 10.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-WWW 64 0.0 7 138 0.0 0.3 2.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-other 16 0.0 75 840 0.1 0.0 4.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-DNS 878 0.0 1 72 0.0 0.0 15.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-other 347 0.0 3 88 0.1 4.5 15.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ICMP 26 0.0 1 70 0.0 0.8 15.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total: 1368 0.1 2 318 0.3 1.2 14.6</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">< output omitted ></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From your output, list the name of each protocol with the number of flows. Answers vary. Examples shown.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Telnet 9 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FTP 28 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>WWW 64 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>DNS 878 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ICMP 26 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP other 16 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP other 347 flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What was the total number of packets generated? <strong>3969 packets</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which protocol generated the most packets? <strong>TCP other (75 x 16 = 1200)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which protocol produced the most bytes per flow? <strong>TCP other (75 x 840 = 63000)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which protocol’s flows were on the network the longest time? <strong>Telnet 5.2 sec</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which protocol used the longest amount of network time? <strong>UDP other (4.5 x 347 = 1561.5 sec)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Create a projected applications document listing the applications planned to use the network.</div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="126"><strong>Application Type</strong></td> <td valign="top" width="126"><strong>Application</strong></td> <td valign="top" width="96"><strong>Protocol</strong></td> <td valign="top" width="77"><strong>Prioritas</strong></td> <td valign="top" width="126"><strong>Comments</strong></td> </tr>
<tr> <td valign="top" width="126">Email</td> <td valign="top" width="126">MS Outlook</td> <td valign="top" width="96">SMTP</td> <td valign="top" width="77">Menengah</td> <td valign="top" width="126">Semua pengguna</td> </tr>
<tr> <td valign="top" width="126">Voice</td> <td valign="top" width="126">Call Manager/SIP</td> <td valign="top" width="96">VRTP</td> <td valign="top" width="77">Tinggi</td> <td valign="top" width="126">Semua pengguna</td> </tr>
<tr> <td valign="top" width="126">Web</td> <td valign="top" width="126">Apache Server</td> <td valign="top" width="96">HTTP</td> <td valign="top" width="77">Rendah</td> <td valign="top" width="126">Semua pengguna</td> </tr>
<tr> <td valign="top" width="126">Database</td> <td valign="top" width="126">SQL Server</td> <td valign="top" width="96">TCP</td> <td valign="top" width="77">Menengah</td> <td valign="top" width="126">Restricted user</td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.5.2 Diagramming Intranet Traffic Flows</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">router and the other cable end to the PC1 computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program to the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Ping between Host1 and Host2 and between the hosts and Discovery Server to confirm network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">connectivity. Troubleshoot and establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on the interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode, issue the <strong>show ip flow interface </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A range of network application data flows between the Host1, Host2, and the server is to be generated and captured. Generate as many of the data flows shown below as is possible in your lab. Your instructor will advise you of the particular applications that are available to be used in this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On Host1, launch a web browser and enter the URL <strong>http://server.discovery.ccna</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. On Host2, launch a web browser and enter the URL <strong>http://server.discovery.ccna</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is not being used, then use <strong>http://172.17.1.1 </strong>to access the web services</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on that server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Use FTP to download a file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On Host1 and Host2, launch a web browser and enter the URL <strong>ftp://server.discovery.ccna</strong>,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">or issue <strong>ftp server.discovery.ccna </strong>from the command line. If DNS is not configured, use the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP address 172.17.1.1 instead of the domain name.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Download a file from the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. If email accounts have been configured using the POP3 and SMTP services on Discovery Server,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">send two emails between users on Host1 and Host2 using these accounts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Set up Windows file sharing between Host1 and Host2 and copy a file from one to the other.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">At the conclusion of the data flow, view the details by issuing the <strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command from privileged EXEC mode.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache verbose flow</strong></div><table border="1" cellpadding="0" cellspacing="0" style="font-family: Georgia,"Times New Roman",serif;"><tbody>
<tr> <td valign="top" width="160"><strong>Application Type</strong></td> <td valign="top" width="160"><strong>Source</strong></td> <td valign="top" width="160"><strong>Destination</strong></td> <td valign="top" width="104"><strong>Comments</strong></td> </tr>
<tr> <td valign="top" width="160">Web<strong> </strong></td> <td valign="top" width="160">Intranet Web Server<strong> </strong></td> <td valign="top" width="160">Host1<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">Web<strong> </strong></td> <td valign="top" width="160">Intranet Web Server<strong> </strong></td> <td valign="top" width="160">Host2<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">File Transfer<strong> </strong></td> <td valign="top" width="160">Intranet File Server<strong> </strong></td> <td valign="top" width="160">Host1<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">File Transfer<strong> </strong></td> <td valign="top" width="160">Intranet File Server<strong> </strong></td> <td valign="top" width="160">Host2<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">Email<strong> </strong></td> <td valign="top" width="160">Host1<strong> </strong></td> <td valign="top" width="160">Email Server<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">Email<strong> </strong></td> <td valign="top" width="160">Host2<strong> </strong></td> <td valign="top" width="160">Email Server<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
<tr> <td valign="top" width="160">File Share<strong> </strong></td> <td valign="top" width="160">Host1<strong> </strong></td> <td valign="top" width="160">Host2<strong> </strong></td> <td valign="top" width="104"><strong> </strong></td> </tr>
</tbody> </table><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab simulates LAN data traffic. The LAN data flows of a production network would be much more</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">extensive and recorded over a greater period of time, perhaps a full working week.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On the FilmCompany initial current network topology shown on the next page, add PC host and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">printer icons as listed for each VLAN. Draw a circle that encloses the local LAN segments.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Then, using the data flows recorded in this lab as a starting point, use different colors to mark the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">different LAN data flows between hosts and the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.5.3 Diagramming Traffic Flows to and from Remote Sites</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Cable the topology given in the diagram. Ensure that power has been applied to both the host</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program to the routers and configure the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">hostname and interfaces shown in the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Set a clock rate on the DCE interface of the serial link between R2 and R3. Routing will have to be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on the three routers to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. From PC1, ping and PC2 and Discovery Server to confirm network connectivity. Troubleshoot and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on the router FC-CPE-1 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-1, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Configure NetFlow on the router FC-CPE-2 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface serial 0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-2, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Configure NetFlow on the router ISP interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router ISP:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>interface serial 0/0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router ISP, issue the <strong>show ip flow interface </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A range of network application data flows between the remote site, the FilmCompany LAN, and the network server is to be generated and captured. Generate as many of the data flows shown below as is possible in your lab. Your instructor will advise you of the particular applications that are available to be used in this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On both PCs launch a web browser and enter the URL <strong>http://server.discovery.ccna</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is not being used, or DNS is not configured, then use <strong>http://172.17.1.1 </strong>to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">access the web services configured on that server..</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use FTP to download a file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On both PCs, launch a web browser and enter the URL <strong>ftp://server.discovery.ccna</strong>, or issue</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ftp server.discovery.ccna </strong>from the command line. If DNS is not configured use 172.17.1.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">instead of the domain name. Download a file from the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. If email accounts have been configured using the POP3 and SMTP services on Discovery Server,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">send two emails in each direction between the user on the LAN and the Remote User using these</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">accounts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. To simulate data traffic between the two PCs, ping between them. Attempt to establish a Telnet</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">session between the two PCs. If file sharing has been enabled, copy a file in both directions between</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the two.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 9: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. At the conclusion of the data flow, view the details by issuing the <strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command from privileged EXEC mode on each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 1 – Sample Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP packet size distribution (1050 total packets):</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .672 .278 .015 .000 .007 .000 .000 .000 .000 .000 .000 .001 .003 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.001 .000 .003 .011 .003 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Flow Switching Cache, 278544 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 active, 4095 inactive, 150 added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2280 ager polls, 0 flow alloc failures</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Active flows timeout in 30 minutes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Inactive flows timeout in 15 seconds</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Sub Flow Cache, 21640 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 active, 1023 inactive, 27 added, 27 added to flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 alloc failures, 0 force free</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 chunk, 0 chunks added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">last clearing of statistics 00:12:31</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-FTP 8 0.0 7 54 0.0 3.7 12.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-WWW 8 0.0 5 196 0.0 0.2 1.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-SMTP 16 0.0 15 72 0.3 15.8 1.7</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-other 32 0.0 11 77 0.5 2.2 1.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-DNS 49 0.0 5 67 0.3 6.1 15.6</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-other 38 0.0 1 83 0.0 0.0 15.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total: 151 0.2 6 77 1.4 4.3 10.2</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Msk AS Port Msk AS NextHop B/Pk Active</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 2 – Sample Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-2#show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP packet size distribution (982 total packets):</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .665 .164 .016 .000 .008 .000 .000 .000 .000 .000 .000 .002 .004 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.002 .000 .004 .128 .004 .000 .000 .000 .000 .000 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Flow Switching Cache, 278544 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>3 active, 4093 inactive, 145 added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>2617 ager polls, 0 flow alloc failures</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Active flows timeout in 30 minutes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inactive flows timeout in 15 seconds</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Sub Flow Cache, 21640 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>2 active, 1022 inactive, 50 added, 50 added to flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 alloc failures, 0 force free</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1 chunk, 0 chunks added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>last clearing of statistics 00:11:43</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-Telnet 6 0.0 3 45 0.0 3.6 10.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-FTP 8 0.0 7 54 0.0 3.7 11.8</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-WWW 8 0.0 5 196 0.0 0.2 1.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-SMTP 16 0.0 15 72 0.3 15.8 1.6</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-other 32 0.0 11 77 0.5 2.2 1.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-DNS 8 0.0 1 69 0.0 0.1 15.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-other 59 0.0 1 55 0.0 0.0 15.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ICMP 9 0.0 4 60 0.0 4.3 15.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Total: 146 0.2 5 76 1.2 2.8 9.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Port Msk AS Port Msk AS NextHop B/Pk Active</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 0.0.0.0 Null 255.255.255.255 11 00 10 120</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0044 /0 0 0043 /0 0 0.0.0.0 604 729.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.10.10.2 Null 224.0.0.9 11 C0 10 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0208 /0 0 0208 /0 0 0.0.0.0 52 0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IPM: 0 0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-2#</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 3 – Sample Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP packet size distribution (502 total packets):</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.000 .709 .225 .015 .000 .007 .000 .001 .000 .000 .000 .000 .000 .007 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">.003 .000 .003 .015 .007 .000 .000 .000 .000 .000 .000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Flow Switching Cache, 278544 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 active, 4095 inactive, 90 added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1274 ager polls, 0 flow alloc failures</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Active flows timeout in 30 minutes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Inactive flows timeout in 15 seconds</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IP Sub Flow Cache, 21640 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 active, 1023 inactive, 25 added, 25 added to flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0 alloc failures, 0 force free</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1 chunk, 0 chunks added</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">last clearing of statistics 00:11:21</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-Telnet 6 0.0 3 45 0.0 3.6 10.7</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-WWW 8 0.0 5 196 0.0 0.2 1.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-SMTP 8 0.0 18 70 0.2 21.3 1.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">TCP-other 16 0.0 12 83 0.2 4.3 1.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-DNS 8 0.0 1 69 0.0 0.1 15.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">UDP-other 33 0.0 1 87 0.0 0.0 15.4</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ICMP 10 0.0 4 60 0.0 5.4 15.5</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Total: 89 0.1 5 85 0.7 3.6 10.1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Msk AS Port Msk AS NextHop B/Pk Active</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Se0/1/0 10.10.10.1 Null 224.0.0.9 11 C0 10 1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0208 /0 0 0208 /0 0 0.0.0.0 92 0.0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">IPM: 0 0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Examine the output and record the different data flows for each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Discuss and compare the data flows for each router. Particularly consider how recording these flows</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">can assist in understanding which network devices and resources are used for particular flows.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 10: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab simulates the flow of traffic to and from FilmCompany remote sites. These data flows for a production network would be much more extensive and recorded over a greater period of time, perhaps a full working week. Additionally, remote access would most likely be established using VPNs (Virtual Private Networks) across the Internet or a WAN. On the FilmCompany initial current network topology shown on the next page, add two remote site hosts attached to the “far” side of the cloud icon. Draw a circle that encloses the remote access links to the FilmCompany network and server. In this case study initially, the FilmCompany remote sites access its network across the Internet.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">One of the objects of this analysis is to establish the benefits of using a dedicated WAN link using Frame</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Relay for the stadium-based remote sites to access the FilmCompany network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Using the data flows recorded in this lab as a starting point, use different colors to mark on the diagram the different data flows between the remote hosts and devices on the FilmCompany network.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><span style="text-decoration: underline;"><strong>Lab 4.5.4 Diagramming External Traffic Flows</strong></span></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Cable the topology given in the diagram. Ensure that power has been applied to both the host</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program to the routers and configure the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">hostname and interfaces shown in the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Set a clock rate on the DCE interface of the serial link between R2 and R3. Routing will have to be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on the three routers to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. From PC1 ping both PC2 and Discovery Server to confirm network connectivity. Troubleshoot and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on router FC-CPE-1 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-1, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Configure NetFlow on router FC-CPE-2 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-2:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>interface serial 0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-2, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Configure NetFlow on router ISP interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router ISP:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>interface serial 0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router ISP, issue the <strong>show ip flow interface </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A range of Internet application data flows between PC2 (the Internet) and the FilmCompany network is to be generated and captured. Generate as many of the data flows shown below as it is possible in your lab. Your instructor will advise you of the particular applications that are available and to be used in this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. On PC2, launch a web browser and enter the URL <strong>http://server.discovery.ccna</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If Discovery Server is not being used, or DNS is not configured, then use <strong>http://172.17.1.1 </strong>to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">access the web services configured on that server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use FTP to download a file.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On PC2, launch a web browser and enter the URL <strong>ftp://server.discovery.ccna</strong>, or issue <strong>ftp</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>server.discovery.ccna </strong>from the command line. If DNS is not configured use the IP address</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">172.17.1.1 instead of the domain name. (example: http://172.17.1.1 )</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Download a file from the server.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. If email accounts have been configured using the POP3 and SMTP services on Discovery Server,</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">send two emails from PC2 using these accounts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 9: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. At the conclusion of the data flow, view the details by issuing the <strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command from privileged EXEC mode on each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Examine the output and record the different data flows for each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Discuss and compare the data flows for each router. Particularly consider how these flows differ from</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Lab 4.5.3 and the implications this has in understanding which network devices and resources are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">used for particular flows.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 10: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab simulates the flow of traffic to and from FilmCompany network and the Internet. These data flows for a production network would be much more extensive and recorded over a greater period of time, perhaps a full working week. On the FilmCompany initial current network topology shown on the next page, highlight the network Internet link. Using the data flows recorded in this lab as a starting point, use different colors to mark on the diagram the different possible data flows between the hosts and devices on the FilmCompany network to and from the Internet.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 4.5.5 Diagramming Extranet Traffic Flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Cable and configure the current network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Cable the topology given in the diagram. Ensure that power has been applied to both the host</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program to the routers and configure the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">hostname and interfaces shown in the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Set a clock rate on the DCE interface of the serial link between R2 and R3. Routing will have to be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configured on the three routers to establish data communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. From PC1, ping PC2 and Discovery Server to confirm network connectivity. Troubleshoot and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">establish connectivity if the pings fail.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Configure NetFlow on router FC-CPE-1 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-1.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-1, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Configure NetFlow on router FC-CPE-2 interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router FCCPE-2:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config)#<strong>interface fastethernet 0/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>interface serial 0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router FC-CPE-2, issue the <strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Configure NetFlow on router ISP interfaces</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">From the global configuration mode, issue the following commands to configure NetFlow on the router ISP:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config)#<strong>interface fastethernet 0/1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>interface serial 0/1/0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow ingress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>ip flow egress</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP(config-if)#<strong>end</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 7: Verify the NetFlow configuration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC mode on router ISP, issue the <strong>show ip flow interface </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip flow interface</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FastEthernet0/1</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Serial0/1/0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow ingress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ip flow egress</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Confirm that the output shown above is displayed. Troubleshoot your configuration if this output is not</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From the privileged EXEC mode, issue the following command to ensure that flow cache statistics are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">reset:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>clear ip flow stats</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 8: Create network data traffic</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ideally, a range of network application data flows between the trusted extranet host PC2 and PC1 on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany LAN should be generated and captured. Generate as many of the data flows shown below as is possible in your lab. Your instructor will advise you of the particular applications that are available and to be used in this lab.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">To simulate data traffic between the two PCs:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Ping between them.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Attempt to establish a Telnet session between the two PCs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. If you have rights, enable file sharing and copy a file in both directions between the two PCs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 9: View the data flows</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. At the conclusion of the data flow, view the details by issuing the <strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">command from privileged EXEC mode on each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-1#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FC-CPE-2#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ISP#<strong>show ip cache verbose flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 1 – Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-1#</strong>show ip cache verbose flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP packet size distribution (12 total packets):</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .000 1.00 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Flow Switching Cache, 278544 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 active, 4096 inactive, 12 added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>192 ager polls, 0 flow alloc failures</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Active flows timeout in 30 minutes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inactive flows timeout in 15 seconds</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Sub Flow Cache, 21640 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 active, 1024 inactive, 8 added, 8 added to flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 alloc failures, 0 force free</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1 chunk, 0 chunks added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>last clearing of statistics 00:03:38</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-DNS 2 0.0 1 70 0.0 0.0 15.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-other 10 0.0 1 87 0.0 0.0 15.5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Total: 12 0.0 1 84 0.0 0.0 15.5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Port Msk AS Port Msk AS NextHop B/Pk Active</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-1#</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 2 – Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-2#</strong>show ip cache verbose flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP packet size distribution (5223 total packets):</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .303 .030 .142 .031 .034 .001 .002 .001 .000 .000 .004 .000 .075 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .000 .000 .020 .351 .000 .000 .000 .000 .000 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Flow Switching Cache, 278544 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>9 active, 4087 inactive, 62 added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1970 ager polls, 0 flow alloc failures</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Active flows timeout in 30 minutes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inactive flows timeout in 15 seconds</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Sub Flow Cache, 21640 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 active, 1024 inactive, 20 added, 20 added to flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 alloc failures, 0 force free</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1 chunk, 0 chunks added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>last clearing of statistics 00:04:31</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-Telnet 18 0.0 3 45 0.2 3.6 10.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-other 4 0.0 1 40 0.0 0.0 15.5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-DNS 2 0.0 1 70 0.0 0.0 15.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-other 22 0.0 1 53 0.0 0.0 15.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ICMP 8 0.0 14 60 0.4 13.9 15.2</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Total: 54 0.2 3 54 0.7 3.2 13.8</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Port Msk AS Port Msk AS NextHop B/Pk Active</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 0.0.0.0 Null 255.255.255.255 11 00 10 222</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0044 /0 0 0043 /0 0 0.0.0.0 604 1356.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 10.0.0.200 Se0/1/0 10.20.0.200 06 00 18 1368</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>01BD /0 0 06AA /0 0 0.0.0.0 970 184.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 10.0.0.200 Se0/1/0* 10.20.0.200 06 00 18 1368</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>01BD /0 0 06AA /0 0 0.0.0.0 970 184.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.20.0.200 Fa0/0 172.17.1.1 11 00 10 5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0404 /0 0 0035 /0 0 0.0.0.0 62 4.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.20.0.200 Fa0/0* 172.17.1.1 11 00 10 5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0404 /0 0 0035 /0 0 0.0.0.0 62 4.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/0 172.17.1.1 Se0/1/0* 10.20.0.200 11 00 10 5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0035 /0 0 0404 /0 0 0.0.0.0 62 4.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/0 172.17.1.1 Se0/1/0 10.20.0.200 11 00 10 5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0035 /0 0 0404 /0 0 0.0.0.0 62 4.3</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.20.0.200 Fa0/1 10.0.0.200 06 00 18 1152</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Port Msk AS Port Msk AS NextHop B/Pk Active</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>06AA /0 0 01BD /0 0 0.0.0.0 71 184.9</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.20.0.200 Fa0/1* 10.0.0.200 06 00 18 1210</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>06AA /0 0 01BD /0 0 0.0.0.0 71 194.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/0 10.10.0.1 Null 224.0.0.9 11 C0 10 1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0208 /0 0 0208 /0 0 0.0.0.0 52 0.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IPM: 0 0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FC-CPE-2#</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Router 3 – Output</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ISP#</strong>show ip cache verbose flow</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP packet size distribution (6724 total packets):</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .306 .029 .138 .031 .032 .001 .001 .001 .000 .000 .003 .000 .080 .001</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>512 544 576 1024 1536 2048 2560 3072 3584 4096 4608</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>.000 .000 .000 .008 .362 .000 .000 .000 .000 .000 .000</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Flow Switching Cache, 278544 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>5 active, 4091 inactive, 54 added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1881 ager polls, 0 flow alloc failures</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Active flows timeout in 30 minutes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Inactive flows timeout in 15 seconds</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>IP Sub Flow Cache, 21640 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1 active, 1023 inactive, 12 added, 12 added to flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>0 alloc failures, 0 force free</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>1 chunk, 0 chunks added</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>last clearing of statistics 00:05:44</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>——– Flows /Sec /Flow /Pkt /Sec /Flow /Flow</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-Telnet 18 0.0 3 45 0.1 3.6 10.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>TCP-other 4 0.0 1 40 0.0 0.0 15.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-DNS 4 0.0 3 63 0.0 2.1 15.5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>UDP-other 16 0.0 1 77 0.0 0.0 15.4</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ICMP 8 0.0 14 60 0.3 13.4 15.5</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Total: 50 0.1 4 58 0.6 3.6 13.7</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>SrcIf SrcIPaddress DstIf DstIPaddress Pr TOS Flgs Pkts</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Port Msk AS Port Msk AS NextHop B/Pk Active</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.0.0.200 Fa0/1 10.20.0.200 06 00 18 1794</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>01BD /0 0 06AA /0 0 0.0.0.0 989 245.1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Se0/1/0 10.0.0.200 Fa0/1* 10.20.0.200 06 00 18 1794</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>01BD /0 0 06AA /0 0 0.0.0.0 989 245.1</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 10.20.0.200 Se0/1/0 10.0.0.200 06 00 18 1502</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>06AA /0 0 01BD /0 0 0.0.0.0 69 245.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Fa0/1 10.20.0.200 Se0/1/0* 10.0.0.200 06 00 18 1502</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>06AA /0 0 01BD /0 0 0.0.0.0 69 245.0</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>FFlags: 01</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>ISP#</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Examine the output and record the different data flows for each router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Discuss and compare the data flows for each router. Particularly consider how these flows differ from</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the previous Labs and the implications this has in understanding which network devices and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">resources are used for particular flows.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 10: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This lab simulates the flow of traffic to and from FilmCompany and from selected trusted partners and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">customers. These data flows for a production network would be much more extensive and recorded over a greater period of time, perhaps a full working week. Additionally, remote access from trusted sites would most likely be established using VPNs (Virtual Private Networks) across the Internet or a WAN.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">On the FilmCompany initial current network topology shown on the next page, add two trusted remote site</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">hosts attached to the “far” side of the cloud icon. Draw a circle that encloses the remote access links to the FilmCompany network and server. In this case study, initially the FilmCompany remote sites access its network across the Internet. One of the objects of this analysis is to establish the benefits of using a dedicated WAN link using Frame Relay for the stadium-based remote sites to access the FilmCompany network. Then, using the data flows recorded in this lab as a starting point, use different colors to mark on the diagram the different extranet data flows between the trusted remote hosts and devices on the FilmCompany network. Diagram traffic flows to and from selected trusted partners, customers, and vendors.</div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-74928771988630155182011-01-08T17:27:00.001-08:002011-01-08T17:27:24.635-08:00Tugas CCNA 4 Lab 3.5.5 Analyzing an Existing Network<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 3.5.5 Analyzing an Existing Network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Document and confirm existing network topology, addressing, and naming schemes</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Examine the existing network topology diagram.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record the current addressing scheme in a table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Associate device names with addresses on the table.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Highlight any inconsistencies in the naming and addressing schemes.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For example:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Naming some devices by location and others by function</li>
<li>• Inconsistent or confusing use of abbreviations</li>
<li>• Some gateway addresses as the first address of a subnet, others as the last address</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Use word processing software to create a Current Network document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Identify those parts of the existing network that currently meet the project technical requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Examine the network topology and specifications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record which current features meet the technical requirements of the proposed network upgrade.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Capacity (bandwidth, address ranges, VLANs)</li>
<li>• Redundant links</li>
<li>• Router and switch interfaces and ports</li>
<li>• Router and switch feature sets, memory, and processing capability</li>
<li>• WAN</li>
<li>• Wireless</li>
<li>• QoS</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Include these strengths and capabilities in your Current Network document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Potential strengths may include:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• New wiring and adequate communications closets</li>
<li>• Adequate space for a new data center</li>
<li>• Servers and PCs are current models and will not need replacement</li>
<li>• Some existing network switches and routers can be used in the new design</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Identify those parts of the existing network that can be scaled to meet the project</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>technical requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Examine the network topology and specifications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record which current features do not meet the technical requirements of the proposed network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">upgrade but can be scaled within the capacity of the network to do so.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Capacity (bandwidth, address ranges, VLANs)</li>
<li>• Redundant links</li>
<li>• Router and switch interfaces and ports</li>
<li>• Router and switch feature sets, memory, and processing capability</li>
<li>• WAN</li>
<li>• Wireless</li>
<li>• QoS</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Include these scalable features and capabilities in your Current Network document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Identify those parts of the existing network that do not to meet the project technical requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Examine the network topology and specifications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record which current features do not meet the technical requirements of the proposed network</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">upgrade and what additional networking resources are required.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Capacity (bandwidth, address ranges, VLANs)</li>
<li>• Redundant links</li>
<li>• Router and switch interfaces and ports</li>
<li>• Router and switch feature sets, memory, and processing capability</li>
<li>• WAN</li>
<li>• Wireless</li>
<li>• QoS</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Include these weaknesses and shortfalls in your Current Network document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Possible weaknesses include:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Flat network design</li>
<li>• Insufficient bandwidth at Distribution Layer, no true Core Layer</li>
<li>• Servers poorly located</li>
<li>• Multiple networks, difficult to maintain</li>
<li>• Poor IP addressing structure</li>
<li>• No dedicated bandwidth for WAN connectivity</li>
<li>• Limited wireless implementation</li>
<li>• Limited security implementations</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Obtain agreement and authorization from the company to continue with the network upgrade design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Finalize the Current Network document so that the strengths and shortfalls are clearly and precisely</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">presented.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Discuss and review your Current Network document with another student to ensure that it clearly</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">states which parts of the network meet the technical requirements of the upgrade project and which</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">parts do not. Amend the document as necessary to clarify any areas that could be misunderstood. At</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">this stage of the network design process, a meeting with the FilmCompany management would be</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">held to obtain their agreement and authorization to continue with the design of the upgrade.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Save and retain your Current Network document so that it can be incorporated with the previous</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">documents to complete this network design case study.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the resources and information that will facilitate the task of analyzing a current network.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Having up-to-date documentation showing such information as addressing, device names,</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">VLAN allocations, switch port assignments</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Systematic and consistent host names, descriptions, and addressing schemes</li>
<li>• Software tools that record data flows and device identification</li>
<li>• Efficient and accurate fault and incidence reporting and clearance documentation to highlight</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">and record problems</div><strong style="font-family: Georgia,"Times New Roman",serif;">•</strong><strong style="font-family: Georgia,"Times New Roman",serif;"> sistematis dan nama host yang </strong><strong style="font-family: Georgia,"Times New Roman",serif;">konsisten</strong><strong style="font-family: Georgia,"Times New Roman",serif;">, deskripsi, dan skema pengalamatan<br />
• Software tools yang merekam aliran</strong><strong style="font-family: Georgia,"Times New Roman",serif;"> data dan identifikasi perangkat</strong>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-57582150777947260552011-01-08T17:26:00.001-08:002011-01-08T17:26:26.868-08:00Tugas CCNA 4 Lab 3.5.4 Developing Network Requirements<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 3.5.4 Developing Network Requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Record the company business goals and constraints that will influence the network design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">As the network designer, you need to identify and prioritize the business goals of FilmCompany as defined in the Project Goals document. Develop your understanding of what these goals are from the FilmCompany case study information.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. List these goals in order of priority.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Expand and consider the details of how these goals can be achieved using the network as a platform.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Note any constraints that these expanded goals may impose on the network design, such as retaining</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the current number of IT and network support staff.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Use word processing software to create a Network Requirements document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Clearly state the business goals and constraints in the document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Record the technical requirements that will influence the network design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Evaluate each of the business goals and determine the technical requirements to meet the goals.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">List these technical requirements under the headings of:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Scalability</li>
<li>• Availability and Performance</li>
<li>• Security</li>
<li>• Manageability</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Initially, list all technologies that may be able to meet these technical requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Include these requirements in your Network Requirements document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Record the user requirements that will influence the network design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Consider the types of users that will influence the network design. These users may be onsite, in the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">office, in the video editing room, offsite (at the stadium), or mobile. Which types of users generate the heaviest amount of network traffic? Which types generate the lightest traffic?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How might different types of users be grouped for Access Layer purposes?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Include these requirements in your Network Requirements document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Record the application requirements that will influence the network design</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Consider the type of applications that will influence the network design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What applications are essentially device-based, with minimal network requirements?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which applications are network-intensive?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which applications and services are delivered onsite, in the offices, and which may need to be delivered offsite over the WAN or to mobile users?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Include these requirements in your Network Requirements document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Develop the network requirements</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Refine the technical requirements of the network to match user and application requirements.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What compromises may have to be made to ensure that the project remains within the business</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">constraints?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Finalize the technical requirements of the network that will meet the project goals.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Discuss and review your Technical Requirements document with another student to ensure it addresses all the business, user, and application requirements within the Project Scope and does not unnecessarily address out-of-scope requirements. Modify the document as necessary.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Save and retain your Technical Requirements document for the next stage of this network design</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">case study.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 6: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Developing the technical requirements of a network that meets the project goals, while remaining within</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">scope, requires knowledge of the available and appropriate technologies and services.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Discuss strategies that will ensure that a network design team is up-to-date with networking technologies and their applications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>•</strong><strong> Berlangganan ke jurnal teknis dan industri (baik hardcopy dan online)<br />
• Menghadiri pe</strong><strong>luncuran</strong><strong> dan demonstrasi </strong><strong>produk</strong><strong><br />
• Menghadiri seminar pelatihan dan kursus<br />
• M</strong><strong>enyusun</strong><strong> dan melaksanakan rencana pengembangan diri profesional<br />
• Memelihara industri saat ini dan sertifikasi vendor</strong></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-18137239405405043982011-01-08T17:25:00.001-08:002011-01-08T17:25:14.413-08:00Tugas CCNA 4 Lab 3.1.2 Creating a Logical Network Diagram<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 3.1.2 Creating a Logical Network Diagram</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 1: Use Cisco IOS Commands to Obtain Information about the Network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Discover and document the first device</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>NOTE: </strong>If the PCs used in this lab are also connected to your Academy LAN or to the Internet, ensure that you record the cable connections and TCP/IP settings so that these can be restored at the conclusion of the lab.</div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Your instructor will advise you as to which PC is configured for Administrator access to the network. Access this Admin PC and issue the <strong>ipconfig </strong>command from the command prompt to discover the default gateway.</li>
<li>Telnet from the command prompt (or use a terminal program such as HyperTerminal or TeraTerm) to the IP address of the gateway device and enter privileged EXEC mode using the passwords given above.</li>
<li>Issue Cisco IOS commands, such as those shown here as well as others you choose to use, to learn about the device.</li>
<li>Issue Cisco IOS commands such as those shown here to discover information about connected devices.</li>
<li>Close the Telnet session by issuing the <strong>exit </strong>command.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Discover the remaining devices</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Telnet to the IP address of a device connected to the first device interrogated, and repeat the process in Step 1. Document this new device in an appropriate Device Table.</li>
<li>Repeat this process until all devices in the network are discovered and documented. As you work through the network devices, record the details of each and sketch a diagram of the network devices and their interconnections.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">When IP address information has been recorded, what other commands could be used to confirm</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">connectivity and trace interconnections between devices?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">________________________________________________ <strong>ping</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">________________________________________________ <strong>tracert </strong>and <strong>traceroute</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Can a connectivity trace be relied upon to return details of all the pathways between devices? Give reasons for your response.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Jawaban: No, all pathways will not be returned because routing at Layer 3 and STP at Layer 2 will cause only one pathway between devices to be shown if redundant or alternate connections exist.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 2: Use Cisco Network Assistant to Obtain Information about the Network</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Launch Cisco Network Assistant</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Launch the Cisco Network Assistant program on the PC connected to the network.</li>
<li>Network devices can be accessed for monitoring and information gathering. From the <strong>Applications</strong> menu, click <strong>Connect</strong>.</li>
<li>In the Connect dialog box, select the <strong>Connect To: </strong>option and enter the default gateway of the Admin PC in the field, as shown.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Record the network topology</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Record the displayed topology. The display will look similar to this sample.</li>
<li>Continue to connect to each known device. Record the topology displayed and compare it with the diagram that you created from the results of Task 1.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Collate the network information</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Assemble your completed network Device Tables and Topology Diagrams into your FilmCompany case study portfolio for use in later labs.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 3: Reflection</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>These techniques were used to discover and document an enterprise LAN. Would the same techniques work for an enterprise network that included WAN links?</li>
<li>Could these techniques be used in a network that included routers and switches from a manufacturer other than Cisco? Why or why not? <strong>Jawaban: Cisco Network Assistant only supports devices listed in the FAQ of the program. Other types of software can be used for multi-brand networks.</strong></li>
</ol>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-42171535061233670202011-01-08T17:24:00.001-08:002011-01-08T17:24:31.644-08:00Tugas CCNA 4 Lab 3.2.2 Using show version to Create an Inventory List<div class="post_content" style="font-family: Georgia,"Times New Roman",serif;"> <div style="text-align: justify;"><strong>Lab 3.2.2 Using show version to Create an Inventory List</strong></div><div style="text-align: justify;"><strong><br />
</strong></div><div style="text-align: justify;"><strong>Task 1: Determine the Capabilities of the IOS of a Cisco 1841 ISR</strong></div><div style="text-align: justify;"><strong>Step 1: Inspect the installed IOS</strong></div><div style="text-align: justify;"><strong>NOTE: </strong>If the PC used in this lab is also connected to your Academy LAN or to the Internet, ensure that you record the cable connections and TCP/IP settings so that these can be restored at the conclusion of the lab.</div><ol style="text-align: justify;"><li>Referring to Topology 1, connect the console (or rollover) cable to the console port on the router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port. Ensure that power has been applied to both the host computer and router.</li>
<li>Establish a HyperTerminal or other terminal emulation program connection to the router.</li>
<li>From the privileged EXEC mode prompt of the terminal, issue the <strong>show version </strong>command. Record the following details:</li>
</ol><div style="text-align: justify;">Results will vary; examples shown.</div><div style="text-align: justify;">IOS version ______________________________ Version 12.4(1c)</div><div style="text-align: justify;">Name of the system image (IOS) file ___________________________ 1841-ipbase-mz.124-1c.bin</div><div style="text-align: justify;">IOS Feature Set ___________________________ IP BASE</div><div style="text-align: justify;">Date of code build __________________________ Compiled Tue 25-Oct-05</div><div style="text-align: justify;">Where the router IOS image booted from ____________________________________ ROM: System</div><div style="text-align: justify;">Bootstrap, Version 12.4(13r)T</div><div style="text-align: justify;">Type of processor board ________________________________ Processor board ID FTX1118X09K</div><div style="text-align: justify;">Amount of DRAM __________________________ 128 MB</div><div style="text-align: justify;">Number of Ethernet interfaces _____________________ 2</div><div style="text-align: justify;">Number of serial interfaces _______________________ 2</div><div style="text-align: justify;">Amount of NVRAM _____________________________ 191K bytes of NVRAM</div><div style="text-align: justify;">Amount of flash memory ________________________ 31360K bytes of ATA CompactFlash</div><div style="text-align: justify;">Configuration register ___________________________ 0×2102</div><ol style="text-align: justify;"><li>Issue the <strong>show flash </strong>command. Record the following details:</li>
</ol><div style="text-align: justify;">Results will vary; examples shown.</div><div style="text-align: justify;">The amount of flash memory available and used _______________________________________</div><div style="text-align: justify;">126976 bytes available (31805440 bytes used)</div><div style="text-align: justify;">The size of the IOS file _____________________________ 13937472 bytes</div><ol style="text-align: justify;"><li>Issue the <strong>show running-configuration </strong>command. Record features that indicate what the router is capable of. <strong>Jawaban: Results will vary; examples include ip subnet-zero, ip cef, ip classless</strong></li>
</ol><div style="text-align: justify;"><strong>Step 2: Examine the IOS feature set on Cisco.com (1)</strong></div><ol style="text-align: justify;"><li>Go to the website <a href="http://www.cisco.com/">http://www.cisco.com</a>.</li>
<li>Remember that the Cisco main website changes frequently. The steps listed here representative of the procedure for accessing the resources. If the options do not appear as listed, please check with your instructor or use the cisco.com search functions to find the IOS Software Selector.</li>
<li>Roll over the <strong>Support </strong>tab and select <strong>Support</strong>.</li>
<li>On the Support page, under Frequently Used Resources, click <strong>Tools & Resources</strong>.</li>
<li>At the bottom of the Tools & Resources page, click the <strong>Show All Tools </strong>button to display tools by category.</li>
<li>Scroll to the <strong>Software </strong>section.</li>
<li>Click Cisco <strong>IOS Software Selector</strong>.</li>
</ol></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-27921482298369984662011-01-08T17:22:00.001-08:002011-01-08T17:22:27.632-08:00Tugas CCNA 4 Lab 3.2.3 Using Feature Navigator<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 1: Create a Cisco.com Guest Registration</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Access the Cisco.com registration service</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Using a computer with Internet access, go the website <a href="http://www.cisco.com/">http://www.cisco.com</a>.</li>
<li>On the top right of the page, click <strong>Register</strong>. The page that opens is Step 1 of 4 in the registration process.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Complete the registration process</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Complete the registration information required for Step 1.</li>
<li>On the next page, Step 2 of 4, select <strong>Home Address </strong>and enter either your academy address details or your personal address, and a telephone number. Click <strong>Submit</strong>.</li>
<li>At the Your Interest and Preferences screen under Step 3 of 4, click <strong>Skip This Step </strong>if you are not employed. Completing this information is optional.</li>
<li>At Step 4 of 4, the Complete Registration screen appears. You will be directed to your email account to activate your registration with Cisco.com.</li>
<li>Check the email account you registered with for an email with the subject “Cisco.com Registration: Action required.” In the body of the email, click the Cisco.com account activation link, or copy and paste it into a browser address window.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1) You will see the Successful Registration screen.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2) You will receive a Cisco.com Registration Confirmation email with your User ID.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">You can now access Cisco.com by clicking <strong>Log In </strong>at the top of the screen and entering your User ID and password.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Test your Cisco.com Guest registration</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Using a computer with Internet access, go the website <a href="http://www.cisco.com/">http://www.cisco.com</a>.</li>
<li>At the top right of the page, click <strong>Log In </strong>and log in using your Cisco.com username and password.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 2: Access Cisco.com Feature Navigator</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Access and log in to Cisco.com</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Using a computer with Internet access, go the website <a href="http://www.cisco.com/">http://www.cisco.com</a>.</li>
<li>At the top right of the page, click <strong>Log In </strong>and log in using your Cisco.com username and password.</li>
<li>Click <strong>Products and Services</strong>.</li>
<li>Under <strong>Product Research Tools</strong>, click the <strong>Cisco Feature Navigator </strong>link.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 3</strong><strong>: </strong><strong>Examine 1841 Router IOS Features</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>NOTE: </strong>It is important to distinguish between an IOS feature and a Feature Set.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>An IOS feature is a specific facility that an IOS supports. Examples include support for a particular routing protocol (EIGRP or BGP), a WAN service (Frame Relay), or a VPN facility (IPSec).</li>
<li>A Feature Set is a group of features that differentiates one IOS image from another. Feature Sets have generalized names such as IP BASE, ADVANCED IP SERVICES, and ADVANCED ENTERPISE SERVICES.</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Search by feature</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">This assumes that you know which features you want your upgraded network to have.</div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>From the Cisco Feature Navigator page, click the <strong>Search by Feature </strong>link.</li>
<li>From <strong>Available Features </strong>list, select the following features:</li>
</ol><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>CallManager Express (CME) 3.0</li>
<li>IPv6 (Internet Protocol Version 6)</li>
<li>Mobile IP</li>
<li> Videoconferencing for the Cisco Multiservice IP-to-IP Gateway Feature</li>
<li>Voice Over IP (VoIP)</li>
</ul><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Click the <strong>Add </strong>button for each feature selected. When done, click <strong>Continue</strong>.</li>
<li>On the next screen, from the <strong>Platform </strong>drop-down menu, select <strong>1841</strong>. From the <strong>Feature Set </strong>dropdown menu, select <strong>ADVANCED IP SERVICES</strong>.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output similar to this will be displayed:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Release Image Name DRAM Flash</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(14)YT1 c1841-advipservicesk9-mz.123-14.YT1.bin 192 48</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(14)YT c1841-advipservicesk9-mz.123-14.YT.bin 192 48</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(8)YG4 c1841-advipservicesk9-mz.123-8.YG4.bin 192 64</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(8)YG3 c1841-advipservicesk9-mz.123-8.YG3.bin 192 64</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(8)YG2 c1841-advipservicesk9-mz.123-8.YG2.bin 192 64</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">12.3(8)YG c1841-advipservicesk9-mz.123-8.YG.bin 192 64</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">5. Note the DRAM and flash requirements for each image.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Search by platform</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>From the Cisco Feature Navigator page, click the <strong>Search by Platform </strong>link.</li>
<li>List the four search objectives available:</li>
<li>From the <strong>Platform </strong>drop-down menu, select <strong>1841</strong>. Click <strong>Continue</strong>.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Search by feature set</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>From the <strong>Feature Set </strong>drop-down menu, select <strong>IP BASE</strong>.</li>
<li>Examine the list of features.</li>
<li>From the <strong>Feature Set </strong>drop-down menu, select <strong>ADVANCED IP SERVICES</strong>.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Note that the extra features listed include such features as:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Analog Centralized Automatic Message Accounting E911 Trunk</li>
<li>• Analog DID (Direct Inward Dial)</li>
<li>• Call Admission Control for H.323 VoIP Gateways</li>
<li>• Caller ID</li>
<li>• Caller ID on Analog Voice Interfaces</li>
<li>• CallManager Express (CME) 3.1</li>
<li>• Cisco IOS Telephony Service (ITS) Version 2.1</li>
<li>• And various features for:</li>
<li>• H323</li>
<li>• MGCP – Media Gateway Control Protocol</li>
<li>• Mobile IP</li>
<li>• SIP (Session Initiation Protocol)</li>
<li>• Videoconferencing for the Cisco Multiservice IP-to-IP Gateway Feature</li>
<li>• VoIP (Voice over IP)</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Compare images</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">In this step, it is assumed that you know some release and version details about the IOS images but not the exact features of each.</div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Click the <strong>Compare Images </strong>tab on the current page or the <strong>Compare Images </strong>link on the Cisco Feature Navigator page.</li>
<li>Under <strong>Select First Image Parameters</strong>, make a selection from each drop-down list, for example: Software: IOS, Major Release: 12.4, Release Number: 12.4(1a), Platform: 1841, Feature Set: IP BASE</li>
<li>Under <strong>Select Second Image Parameters</strong>, make a selection from each drop-down list, for example: Software: IOS, Major Release: 12.4, Release Number: 12.4(10b), Platform: 1841, Feature Set: ADVANCED IP SERVICES</li>
<li>Note the information displayed:</li>
</ol><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Image information for each IOS</li>
<li>• Features unique to each image</li>
<li>• Common features in both images (scroll half-way down the page)</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">_____________________________________________________________________________</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 4: Examine 2960 Switch IOS Features</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Search by platform</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>Return to the Cisco Feature Navigator page and click the <strong>Search by Platform </strong>link.</li>
<li>From the <strong>Platform </strong>drop-down menu, select <strong>CAT2960 </strong>and click <strong>Continue</strong>.</li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Search by feature set</strong></div><ol style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>From the <strong>Feature Set </strong>drop-down menu, select <strong>LAN BASE</strong>.<strong> </strong></li>
<li>Examine the list of features.<strong></strong></li>
<li>Examine some of the features listed by clicking on the links.<strong></strong></li>
<li>Select various Major Release and Release values from those respective menus. Note the IOS image filenames and memory requirements.<strong></strong></li>
<li>Return to the Cisco Feature Navigator. From the <strong>Platform </strong>drop-down menu, select <strong>CAT3560 </strong>and<strong> </strong>click <strong>Continue</strong>.<strong></strong></li>
<li>Examine the list of features.<strong></strong></li>
</ol><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which significant Layer 3 protocol family is included in the feature set? <strong>Jawaban: IP and IPv6</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is the significance of this difference between 2960 and 3560 switches? <strong>Jawaban: A 2960 is an Access Layer switch that operates at OSI Layer 2, whereas a 3560 has OSI Layer 3 switching capability for use in the Core Layer of the network.</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Task 5: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The recording and documentation of network features and services, and the devices that provide them, are important features of network management. Consider and explore the Cisco.com resources and information that can facilitate this task.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Jawaban: the students should be able to demonstrate that they can effectively search and retrieve technical information from the Cisco.com website.</strong></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-21530573765936184222011-01-08T17:21:00.001-08:002011-01-08T17:21:12.161-08:00Tugas CCNA 4 Lab 3.2.4 Installing a Cisco IOS Software Imagez<div style="font-family: Georgia,"Times New Roman",serif;"><strong>Lab 3.2.4 Installing a Cisco IOS Software Image</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Task 1: Run and Configure the TFTP Server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 1: Configure network connectivity</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif;">router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif;">Use a crossover cable to connect PC1 NIC interface to Router interface Fa0/1. Ensure that power</div><div style="font-family: Georgia,"Times New Roman",serif;">has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Using the IP address information from the table, configure computer PC1.</div><div style="font-family: Georgia,"Times New Roman",serif;">c. On PC1 establish a console session to the router using HyperTerminal or TeraTerm.</div><div style="font-family: Georgia,"Times New Roman",serif;">d. Configure the router hostname and interface as given in the table.</div><div style="font-family: Georgia,"Times New Roman",serif;">e. Ping PC1 from the CLI prompt to verify connectivity between the router and the PC. Troubleshoot the</div><div style="font-family: Georgia,"Times New Roman",serif;">configuration of the router and PC if connectivity is not verified.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 2: Start the TFTP server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Check that a TFTP Server such as Solarwinds is installed on PC1. If not, see your instructor to</div><div style="font-family: Georgia,"Times New Roman",serif;">arrange the installation. This software must be installed and running before the any file transfer can</div><div style="font-family: Georgia,"Times New Roman",serif;">be initiated from the router.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Start the TFTP program (Solarwinds). The active TFTP Server window will appear as shown.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 3: Configure the TFTP server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Go to the <strong>File </strong>menu and select <strong>Configure</strong>.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Verify the following settings in the TFTP Server Configuration window by clicking the appropriate</div><div style="font-family: Georgia,"Times New Roman",serif;">tabs</div><div style="font-family: Georgia,"Times New Roman",serif;">c. When finished, click <strong>OK</strong>.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Task 2: Back up the Current IOS</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 1: Collect information to document the router</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">It is important to document the features and information about the router before transferring the IOS file, in case any recovery action has to be taken.</div><div style="font-family: Georgia,"Times New Roman",serif;">a. Issue the <strong>show flash </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif;">Is there an IOS image file stored in flash?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Exact name of that file:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>c1841-ipbase-mz.124-1c.bin</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Size of that file:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>14 MB</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Amount of flash that is available or unused?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>8679422 bytes available</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">What attributes can be identified from codes in the Cisco IOS filename?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Hardware platform, </strong><strong>pengaturan</strong><strong> fitur, format file, dan nomor versi</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Output:</div><div style="font-family: Georgia,"Times New Roman",serif;">ACC-CPE-1# <strong>show flash:</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">-#- –length– —–date/time—— path</div><div style="font-family: Georgia,"Times New Roman",serif;">1 13937472 May 05 2007 21:13:20 +00:00 c1841-ipbase-mz.124-1c.bin</div><div style="font-family: Georgia,"Times New Roman",serif;">2 1821 May 05 2007 21:29:36 +00:00 sdmconfig-18xx.cfg</div><div style="font-family: Georgia,"Times New Roman",serif;">3 4734464 May 05 2007 21:30:14 +00:00 sdm.tar</div><div style="font-family: Georgia,"Times New Roman",serif;">4 833024 May 05 2007 21:30:42 +00:00 es.tar</div><div style="font-family: Georgia,"Times New Roman",serif;">5 1052160 May 05 2007 21:31:10 +00:00 common.tar</div><div style="font-family: Georgia,"Times New Roman",serif;">6 1038 May 05 2007 21:31:36 +00:00 home.shtml</div><div style="font-family: Georgia,"Times New Roman",serif;">7 102400 May 05 2007 21:32:02 +00:00 home.tar</div><div style="font-family: Georgia,"Times New Roman",serif;">8 491213 May 05 2007 21:32:30 +00:00 128MB.sdf</div><div style="font-family: Georgia,"Times New Roman",serif;">9 1684577 May 05 2007 21:33:16 +00:00 securedesktop-ios-3.1.1.27-k9.pkg</div><div style="font-family: Georgia,"Times New Roman",serif;">10 398305 May 05 2007 21:33:50 +00:00 sslclient-win-1.1.0.154.pkg</div><div style="font-family: Georgia,"Times New Roman",serif;">8679424 bytes available (23252992 bytes used)</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Issue the <strong>show version </strong>command and record the following information:</div><div style="font-family: Georgia,"Times New Roman",serif;">Configuration-register value:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>0x 2102</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Size of flash memory:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>32 MB</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Is there at least 16 MB of flash?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Version number of boot ROM:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>12.4(13r)</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Is the boot ROM version 5.2 or later?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Ya</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Output:</div><div style="font-family: Georgia,"Times New Roman",serif;">ACC-CPE-1#<strong>show version</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Cisco IOS Software, 1841 Software (C1841-IPBASE-M), Version 12.4(1c),</div><div style="font-family: Georgia,"Times New Roman",serif;">RELEASE SO</div><div style="font-family: Georgia,"Times New Roman",serif;">FTWARE (fc1)</div><div style="font-family: Georgia,"Times New Roman",serif;">Technical Support: http://www.cisco.com/techsupport</div><div style="font-family: Georgia,"Times New Roman",serif;">Copyright (c) 1986-2005 by Cisco Systems, Inc.</div><div style="font-family: Georgia,"Times New Roman",serif;">Compiled Tue 25-Oct-05 17:10 by evmiller</div><div style="font-family: Georgia,"Times New Roman",serif;">ROM: System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)</div><div style="font-family: Georgia,"Times New Roman",serif;">R1 uptime is 2 days, 12 hours, 29 minutes</div><div style="font-family: Georgia,"Times New Roman",serif;">System returned to ROM by reload at 21:21:02 UTC Fri Aug 24 2007</div><div style="font-family: Georgia,"Times New Roman",serif;">System image file is “flash:c1841-ipbase-mz.124-1c.bin”</div><div style="font-family: Georgia,"Times New Roman",serif;">Cisco 1841 (revision 7.0) with 114688K/16384K bytes of memory.</div><div style="font-family: Georgia,"Times New Roman",serif;">Processor board ID FTX1118X0AB</div><div style="font-family: Georgia,"Times New Roman",serif;">2 FastEthernet interfaces</div><div style="font-family: Georgia,"Times New Roman",serif;">2 Serial(sync/async) interfaces</div><div style="font-family: Georgia,"Times New Roman",serif;">2 Low-speed serial(sync/async) interfaces</div><div style="font-family: Georgia,"Times New Roman",serif;">DRAM configuration is 64 bits wide with parity disabled.</div><div style="font-family: Georgia,"Times New Roman",serif;">191K bytes of NVRAM.</div><div style="font-family: Georgia,"Times New Roman",serif;">31360K bytes of ATA CompactFlash (Read/Write)</div><div style="font-family: Georgia,"Times New Roman",serif;">Configuration register is 0×2102</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 2: Copy IOS image to the TFTP server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Before copying the files, verify that the TFTP server is running.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Record the IP address of the TFTP server</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>10.0.0.254</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">c. From the privileged EXEC mode, issue the <strong>copy flash tftp </strong>command. At the prompt, enter the</div><div style="font-family: Georgia,"Times New Roman",serif;">filename for your system as reported in Step 1. To ensure accuracy, select the filename as shown in</div><div style="font-family: Georgia,"Times New Roman",serif;">the <strong>show flash: </strong>output and copy and paste it at the source filename prompt. Then enter the IP</div><div style="font-family: Georgia,"Times New Roman",serif;">address of the TFTP server. At the destination filename, press <strong>Enter </strong>to accept the name displayed.</div><div style="font-family: Georgia,"Times New Roman",serif;">Output:</div><div style="font-family: Georgia,"Times New Roman",serif;">ACC-CPE-1#<strong>copy flash tftp</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Source filename []? <strong>c1841-ipbase-mz.124-1c.bin</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Address or name of remote host []? <strong>10.0.0.254</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Destination filename [c1841-ipbase-mz.124-1c.bin]?</div><div style="font-family: Georgia,"Times New Roman",serif;">!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div><div style="font-family: Georgia,"Times New Roman",serif;">!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div><div style="font-family: Georgia,"Times New Roman",serif;">13937472 bytes copied in 37.627 secs (370412 bytes/sec)</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 3: Verify the transfer to the TFTP server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Verify a successful upload transfer. Open Log file c:\Program Files\SolarWinds\Free Tools\TFTPServer.</div><div style="font-family: Georgia,"Times New Roman",serif;">txt. Contents should be similar to the following example:</div><div style="font-family: Georgia,"Times New Roman",serif;">3/25/2007 12:29 :Receiving c1841-ipbase-mz.124-1c.bin from 10.0.0.1)</div><div style="font-family: Georgia,"Times New Roman",serif;">3/25/2007 12:29 :Received c1841-ipbase-mz.124-1c.bin from (10.0.0.1),</div><div style="font-family: Georgia,"Times New Roman",serif;">13937472 bytes</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Verify the flash image size in the TFTP server directory. Using Windows Explorer or My Computer,</div><div style="font-family: Georgia,"Times New Roman",serif;">locate the TFTP root directory. Display file details and record the file size:</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>13937472 bytes</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">The file size shown in the <strong>show flash: </strong>command output should be the same as the file size of the</div><div style="font-family: Georgia,"Times New Roman",serif;">file stored on the TFTP server. If the file sizes are not identical, check with your instructor.</div><div style="font-family: Georgia,"Times New Roman",serif;">Instructor Note: Troubleshoot and repeat the above steps if the downloaded file size and IOS image</div><div style="font-family: Georgia,"Times New Roman",serif;">size differ.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Task 3: Restore or Upgrade the Current IOS</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 1: Prepare to restore or update the IOS image</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Before copying the files, verify that the TFTP server is running and that the required IOS image file is</div><div style="font-family: Georgia,"Times New Roman",serif;">in the TFTP root directory. Note the exact filename.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Ping PC1 to confirm that connectivity between the router and the PC has been maintained.</div><div style="font-family: Georgia,"Times New Roman",serif;">c. Confirm that the flash memory capacity is of sufficient size to hold the IOS image.</div><div style="font-family: Georgia,"Times New Roman",serif;">Which command is issued to confirm flash memory size?</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>show flash: </strong>or <strong>show version</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 2: Copy the IOS image from the TFTP server</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. From the privileged EXEC mode, issue the <strong>copy tftp flash </strong>command.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. At the prompt, enter the IP address of the TFTP server.</div><div style="font-family: Georgia,"Times New Roman",serif;">c. Enter the filename for your system, as noted in Step 1.</div><div style="font-family: Georgia,"Times New Roman",serif;">d. At the destination filename, press <strong>Enter </strong>to accept the name displayed.</div><div style="font-family: Georgia,"Times New Roman",serif;">Output:</div><div style="font-family: Georgia,"Times New Roman",serif;">ACC-CPE-1#<strong>copy tftp flash</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Address or name of remote host []? <strong>10.0.0.254</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Source filename []? <strong>c1841-ipbase-mz.124-1c.bin</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Destination filename [c1841-ipbase-mz.124-1c.bin]?</div><div style="font-family: Georgia,"Times New Roman",serif;">%Warning:There is a file already existing with this name</div><div style="font-family: Georgia,"Times New Roman",serif;">Do you want to over write? [confirm]</div><div style="font-family: Georgia,"Times New Roman",serif;">Accessing tftp://10.0.0.254/ c1841-ipbase-mz.124-1c.bin…</div><div style="font-family: Georgia,"Times New Roman",serif;">Loading c1700-y-mz.122-11.T.bin from 10.0.0.254 (via FastEthernet0/0):</div><div style="font-family: Georgia,"Times New Roman",serif;">!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div><div style="font-family: Georgia,"Times New Roman",serif;">!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div><div style="font-family: Georgia,"Times New Roman",serif;">!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div><div style="font-family: Georgia,"Times New Roman",serif;">[OK - 13937472 bytes]</div><div style="font-family: Georgia,"Times New Roman",serif;">Verifying checksum… OK (0x9C8A)</div><div style="font-family: Georgia,"Times New Roman",serif;">13937472 bytes copied in 37.627 secs (370412 bytes/sec)</div><div style="font-family: Georgia,"Times New Roman",serif;">If successful, the checksum OK output is displayed. If the checksum fails, the IOS upload steps will</div><div style="font-family: Georgia,"Times New Roman",serif;">need to be repeated.</div><div style="font-family: Georgia,"Times New Roman",serif;">Some older systems may require that flash be erased. If the Erase flash: before copying?</div><div style="font-family: Georgia,"Times New Roman",serif;">prompt is confirmed, all files in flash will be removed. In contrast, other systems have sufficient</div><div style="font-family: Georgia,"Times New Roman",serif;">capacity to store multiple files. If the router prompts to erase flash, output similar to below will occur</div><div style="font-family: Georgia,"Times New Roman",serif;">before the new image is uploaded to flash.</div><div style="font-family: Georgia,"Times New Roman",serif;">Sample Output:</div><div style="font-family: Georgia,"Times New Roman",serif;">Erase flash: before copying? [confirm]<strong>[Enter]</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Erasing the flash filesystem will remove all files! Continue? [confirm]</div><div style="font-family: Georgia,"Times New Roman",serif;">Erasing device…</div><div style="font-family: Georgia,"Times New Roman",serif;">eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee</div><div style="font-family: Georgia,"Times New Roman",serif;">eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee</div><div style="font-family: Georgia,"Times New Roman",serif;">…erased</div><div style="font-family: Georgia,"Times New Roman",serif;">Erase of flash: complete</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 3: Test the restored IOS image</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Verify that the router IOS image is correct. Power cycle the router power and observe the startup</div><div style="font-family: Georgia,"Times New Roman",serif;">process to confirm that there were no flash errors. If there are none, the router IOS should have</div><div style="font-family: Georgia,"Times New Roman",serif;">started correctly.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Further verify the IOS image in flash by issuing the <strong>show version </strong>command, which will show an</div><div style="font-family: Georgia,"Times New Roman",serif;">output similar to this:</div><div style="font-family: Georgia,"Times New Roman",serif;">System image file is “flash: c1841-ipbase-mz.124-1c.bin”</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 4: Clean up</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">Erase the configurations and reload the router. Disconnect and store the cabling. For PC hosts that are</div><div style="font-family: Georgia,"Times New Roman",serif;">normally connected to other networks (such as the school LAN or to the Internet), delete the IOS image file from the TFTP directory, reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Task 3: Reflection / Challenge</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 1: Switch IOS Upgrade</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">As a challenge lab, research and list the steps required to back up the Cisco IOS image file from a switch to a TFTP server. In addition, list how to restore or upgrade the IOS image from the TFTP server to the switch.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Pengaturan server TFTP dan perintah CLI yang digunakan untuk melakukan backup dan upgrade switch IOS sama seperti untuk router. Perbedaan yang signifikan adalah pengaturan dari alamat IP pada interface 1 VLAN dari sakelar</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Step 2: Non-operational Device</strong></div><div style="font-family: Georgia,"Times New Roman",serif;">The performance of IOS image backup and upgrade for routers and switches as described in this lab</div><div style="font-family: Georgia,"Times New Roman",serif;">presumes that the device has a current, fully operational IOS to allow the configuration of IP connectivity prior to copying the image file. However, there may be cases where the current IOS is corrupt or for some other reason the device will not boot with an operational IOS.</div><div style="font-family: Georgia,"Times New Roman",serif;">a. Research and record the ROMMON process that enables a router to be configured and its IOS uploaded if the device has this problem.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Research and record the X-Modem or similar process that enables the IOS of a switch to be uploaded using the serial (console) connection if the device has this problem.</div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>The following documents are typical Cisco.com resources describing these recovery processes:</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Typical router ROMMON IOS loading:</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>http://www.cisco.com/warp/public/471/76.pdf</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Example X-modem Console Download Procedure Using ROMMON:</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>http://www.cisco.com/warp/public/130/xmodem_generic.pdf</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>Recovering Catalyst Switches from a Corrupted or Missing Image:</strong></div><div style="font-family: Georgia,"Times New Roman",serif;"><strong>http://www.cisco.com/warp/public/473/192.pdf</strong></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-51271105650566874962011-01-08T17:19:00.001-08:002011-01-08T17:19:58.197-08:00Tugas CCNA 4 Lab 3.2.5 Observing the Router Startup Process<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 3.2.5 Observing the Router Startup Process</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b><br />
</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Observe and Examine the Router Startup Process</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Connect and set up the router</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program connection to the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Restart the router and observe the output</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. From the privileged EXEC prompt, issue the <b>reload </b>command. Confirm the reload when prompted.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Observe the output as the router restarts.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Output similar to this will be displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">POST information:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Technical Support: http://www.cisco.com/techsupport</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Copyright (c) 2006 by cisco Systems, Inc.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">PLD version 0×10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">GIO ASIC version 0×127</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c1841 platform with 131072 Kbytes of main memory</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Main memory is configured to 64 bit mode with parity disabled</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Locating and Loading information:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Readonly ROMMON initialized</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program load complete, entry point: 0x8000f000, size: 0xcb80</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program load complete, entry point: 0x8000f000, size: 0xcb80</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">program load complete, entry point: 0x8000f000, size: 0xd4a9a0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Self decompressing the image :</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">#################################################</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">#######################################################################</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">################# [OK]</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Smart Init is enabled</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">smart init is sizing iomem</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">ID MEMORY_REQ TYPE</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0X003AA110 public buffer pools</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0X00211000 public particle pools</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0X0013 0X00035000 Card in slot 0</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">0X000021B8 Onboard USB</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If any of the above Memory Requirements are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">“UNKNOWN”, you may be using an unsupported</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configuration or there is a software problem and</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">system operation may be compromised.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Allocating additional 7692243 bytes to IO Memory.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">PMem allocated: 117440512 bytes; IOMem allocated: 16777216 bytes</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Restricted Rights Legend</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Use, duplication, or disclosure by the Government is</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">subject to restrictions as set forth in subparagraph</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(c) of the Commercial Computer Software – Restricted</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Rights clause at FAR sec. 52.227-19 and subparagraph</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">(c) (1) (ii) of the Rights in Technical Data and Computer</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Software clause at DFARS sec. 252.227-7013.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">cisco Systems, Inc.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">170 West Tasman Drive</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">San Jose, California 95134-1706</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Cisco IOS Software, 1841 Software (C1841-IPBASE-M), Version 12.4(1c),</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">RELEASE SO</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FTWARE (fc1)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Technical Support: http://www.cisco.com/techsupport</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Copyright (c) 1986-2005 by Cisco Systems, Inc.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Compiled Tue 25-Oct-05 17:10 by evmiller</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Image text-base: 0x6007ECA0, data-base: 0×61480000</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Port Statistics for unclassified packets is not turned on.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Cisco 1841 (revision 7.0) with 114688K/16384K bytes of memory.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Processor board ID FTX1118X0BN</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 FastEthernet interfaces</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">2 Low-speed serial(sync/async) interfaces</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">DRAM configuration is 64 bits wide with parity disabled.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">191K bytes of NVRAM.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">31360K bytes of ATA CompactFlash (Read/Write)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Examine the router startup output</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The startup process has three stages:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>a. Performing the POST and loading the bootstrap program</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the output displayed. Look at the highlighted section in the sample output in this lab that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">relates to the POST. Mark any differences between your observed output and this sample.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What are possible reasons for these differences?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>OS yang berbeda file, perangkat yang berbeda, dll</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What does the POST test in the router?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Hardware</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the POST is successful, what is loaded into RAM?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>The bootstrap program</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is the purpose of what is loaded into RAM?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Locate the Cisco IOS and load it into RAM</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What would happen if the POST is unsuccessful, and what could this mean?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>IOS tidak akan memuat dan router tidak akan berjalan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>b. Locating and loading the IOS software</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the displayed output. Look at the sample output in this lab that relates to the IOS loading.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Mark any differences between your observed output and this sample.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What are possible reasons for these differences?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>OS yang berbeda file, perangkat yang berbeda, dll</b><b> </b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What are the three possible locations of the IOS?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Flash memory, TFTP server, </b><b>lokasi yang ditentukan di file konfigurasi startup (lokasi jaringan)</b><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How is the IOS location to be used specified?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Konfigurasi nilai register</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The <b>confreg </b>program is available to decode configuration register values. It can be downloaded from</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Academy Connection Tools. From Tools, select the CCNA Curriculum (not CCNA Discovery or CCNA</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Exploration), and then select any v3.1 course. Click Cisco Configuration Register Decoder to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">download the program.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">After it is installed and executed, the program displays the binary and hexadecimal values of the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">register that set the different router startup sequences and console communications.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What will be the result if an IOS image cannot be located and loaded?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Modus</b><b> </b><b>ROMON</b><b> </b><b>dimasukkan</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>c. Locating and executing the startup configuration file or entering setup mode</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the displayed output. Look at the sample output in this lab that relates to the startup</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">configuration loading. Mark any differences between your observed output and this sample.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What are possible reasons for these differences?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>OS yang berbeda file, perangkat yang berbeda, dll.</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is the output if the router does not have a configuration to load?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>— System Configuration Dialog —</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Continue with configuration dialog? [yes/no]:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">What is displayed if a startup configuration is loaded?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>User EXEC prompt</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Clean up</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase the configurations and reload the router. Disconnect and store the cabling. For PC hosts that are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">normally connected to other networks (such as the school LAN or to the Internet), delete the IOS image file from the TFTP directory, reconnect the appropriate cabling, and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Reflection / Challenge</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Prepare a troubleshooting checklist based on the router startup stages and the hardware and software</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">features associated with each stage. Format the checklist so that if it is noted that a stage was unsuccessful, the possible problems can be readily identified. For example, for “IOS not loaded” enter “ROMON prompt displayed.” Prepare a second checklist listing possible router faults or problems. For example, “no cooling fan sound,” “LEDs not illuminated or showing unusual behavior,” or “unexpected ROMON prompt displayed.” For each problem listed, enter the stage of the router startup process that failed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Lab 3.3.2 Determining the Router Hardware Options</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 1: Inspect a Cisco 1841 ISR</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Physically inspect the external features of the router</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Examine the router. In the table below, identify and match each item number in the figure with the description. In addition, record the number of each interface and port on the router with the description.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is a module installed in Slot 0? <b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">How many Fast Ethernet interfaces does the router have?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>2</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">WIC-2T two serial interfaces</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Is a module installed in Slot 1?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Which of the modules and ports have the potential to be upgraded to improve the router’s</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">capabilities?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Slot 0 dan Slot 1, flash card slot</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Use IOS show commands to inspect the router</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Establish a HyperTerminal or other terminal emulation program connection to the router.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. From the privileged EXEC mode prompt of the terminal, issue <b>show run </b>and <b>show flash:</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">commands.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record the number and type of interfaces. Typical results are shown.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>interface FastEthernet 0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>interface FastEthernet 0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>interface Serial 0/0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>interface Serial 0/0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>interface VLAN1</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Record the details of the memory (DRAM, flash) modules.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Flash 32 MB</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>SDRAM 128 MB</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Compare the physical and IOS inspections</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Are there any differences between the physical and IOS inspections?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Observed differences could be due to the IOS having features implemented in the software that do not have the hardware module installed, or loopback interfaces may be configured.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If an installed hardware interface does not appear in the configuration, it may be faulty or may not be correctly installed. In some cases, slots must be filled consecutively; in other cases, certain module types can only be installed into specified slots.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 2: Examine 1841 Router Hardware Options</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">After establishing the current hardware status of the router, examine the technical documentation to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">determine the potential for upgrading and growth.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 1: Access the Cisco.com documentation</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Go to the website http://www.cisco.com.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. In the Quick Links pane on the right, select <b>Documentation</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Under <b>Select a category</b>, click <b>Routers</b>. Under <b>Select a product</b>, click the <b>Cisco 1800 Series</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Integrated Services Routers </b>link.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Review the documentation links displayed.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Under Product Literature, click the <b>Data Sheets </b>link. Note the range of data sheet documentation</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">available.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">f. Click <b>Cisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)</b>.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 2: Record the router hardware information</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Read through the <i>Cisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)</i></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">document, noting the structure and format of the information.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. From <b>Table 1, Architecture Features and Benefits of Cisco 1841 Router, </b>record the following</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">information:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The number of different modules and interface cards that are supported: >30</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Default memory capacity:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>32 MB of flash and 128</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>MB of synchronous dynamic RAM (SDRAM)</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Cisco IOS versions supported:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>12.3T, 12.4, 12.4T</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Feature Sets and Beyond</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. From <b>Table 5, Product Specifications of Cisco 1841 Router</b>, locate and record the following</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">specifications from the Architecture section.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. From the <b>Table 6, Modules and Interface Cards the Cisco 1841 Router Supports</b>, list the 10</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">different categories of interface card (WIC) supported by the 1841 platform.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. From Table 6, what feature does the Advanced Integration Module (AIM) enable to be installed in an</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">1841 router?</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>VPN encryption</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 3: Consider possible hardware options</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The 1841 ISR has removable and interchangeable modules. Various optional modules can be installed in the router to provide specific capabilities. These modules are installed either by inserting them into slots on the chassis, or by opening the chassis and plugging them into connectors inside.Flash memory and interface cards fit into slots on the chassis and are installed and removed without opening the chassis.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">There are three types of interface cards for the 1800 series modular routers:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• WAN interface cards (WICs)</li>
<li>• Voice WAN interface cards (VWICs – in data mode only on the Cisco 1841)</li>
<li>• High-speed WAN interface cards (HWICs)</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The following components plug into connectors inside the chassis and are installed and removed only by</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">opening the chassis:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Advanced Integration Module (AIM)</li>
<li>• Synchronous dynamic RAM (SDRAM) small-outline dual in-line memory module (SODIMM</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Summarize the changes that are possible for this router. This information is important to have and consider when planning and designing the network upgrade.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">If the router is not at its limit of these features, candidates for upgrading could include:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Flash memory</b> (if larger IOS required)</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>SDRAM</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Slot 1 Ethernet switch 4-port module</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Slot 1 WIC-2T – 2 serial interfaces</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Slot 1 Other WAN technology DSL/ISDN</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Step 4: Clean up</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Erase any configurations and reload the router. Disconnect and store the cabling. For PC hosts that are</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><b>Task 3: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Network device capabilities are continuously developing. Consider the advantages of a modular platform over that of a device with a fixed hardware platform.</div><b style="font-family: Georgia,"Times New Roman",serif;">Modularitas memfasilitasi kustomisasi perangkat untuk memenuhi kebutuhan jaringan lokal.<br />
Peningkatan dan penggantian modul mengurangi biaya dan waktu dari layanan.<br />
Perangkat Modular menyediakan desain jaringan yang fleksibel dan scalable.</b>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-14323315068592073232011-01-08T17:18:00.001-08:002011-01-08T17:18:00.342-08:00Tugas CCNA 4 Lab 3.3.2 Determining the Router Hardware Options<div style="font-family: Georgia,"Times New Roman",serif;"><b>Lab 3.3.2 Determining the Router Hardware Options</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Task 1: Inspect a Cisco 1841 ISR</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 1: Physically inspect the external features of the router</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Examine the router. In the table below, identify and match each item number in the figure with the description. In addition, record the number of each interface and port on the router with the description.</div><div style="font-family: Georgia,"Times New Roman",serif;">Is a module installed in Slot 0? <b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif;">How many Fast Ethernet interfaces does the router have?</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>2</b></div><div style="font-family: Georgia,"Times New Roman",serif;">WIC-2T two serial interfaces</div><div style="font-family: Georgia,"Times New Roman",serif;">Is a module installed in Slot 1?</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Which of the modules and ports have the potential to be upgraded to improve the router’s</div><div style="font-family: Georgia,"Times New Roman",serif;">capabilities?</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Slot 0 dan Slot 1, flash card slot</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 2: Use IOS show commands to inspect the router</b></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Referring to the topology diagram, connect the console (or rollover) cable to the console port on the</div><div style="font-family: Georgia,"Times New Roman",serif;">router and the other cable end to the host computer with a DB-9 or DB-25 adapter to the COM 1 port.</div><div style="font-family: Georgia,"Times New Roman",serif;">Ensure that power has been applied to both the host computer and router.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. Establish a HyperTerminal or other terminal emulation program connection to the router.</div><div style="font-family: Georgia,"Times New Roman",serif;">c. From the privileged EXEC mode prompt of the terminal, issue <b>show run </b>and <b>show flash:</b></div><div style="font-family: Georgia,"Times New Roman",serif;">commands.</div><div style="font-family: Georgia,"Times New Roman",serif;">Record the number and type of interfaces. Typical results are shown.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>interface FastEthernet 0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>interface FastEthernet 0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>interface Serial 0/0/0</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>interface Serial 0/0/1</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>interface VLAN1</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Record the details of the memory (DRAM, flash) modules.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Flash 32 MB</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>SDRAM 128 MB</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 3: Compare the physical and IOS inspections</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Are there any differences between the physical and IOS inspections?</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>No</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Observed differences could be due to the IOS having features implemented in the software that do not have the hardware module installed, or loopback interfaces may be configured.</div><div style="font-family: Georgia,"Times New Roman",serif;">If an installed hardware interface does not appear in the configuration, it may be faulty or may not be correctly installed. In some cases, slots must be filled consecutively; in other cases, certain module types can only be installed into specified slots.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Task 2: Examine 1841 Router Hardware Options</b></div><div style="font-family: Georgia,"Times New Roman",serif;">After establishing the current hardware status of the router, examine the technical documentation to</div><div style="font-family: Georgia,"Times New Roman",serif;">determine the potential for upgrading and growth.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 1: Access the Cisco.com documentation</b></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Go to the website http://www.cisco.com.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. In the Quick Links pane on the right, select <b>Documentation</b>.</div><div style="font-family: Georgia,"Times New Roman",serif;">c. Under <b>Select a category</b>, click <b>Routers</b>. Under <b>Select a product</b>, click the <b>Cisco 1800 Series</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Integrated Services Routers </b>link.</div><div style="font-family: Georgia,"Times New Roman",serif;">d. Review the documentation links displayed.</div><div style="font-family: Georgia,"Times New Roman",serif;">e. Under Product Literature, click the <b>Data Sheets </b>link. Note the range of data sheet documentation</div><div style="font-family: Georgia,"Times New Roman",serif;">available.</div><div style="font-family: Georgia,"Times New Roman",serif;">f. Click <b>Cisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)</b>.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 2: Record the router hardware information</b></div><div style="font-family: Georgia,"Times New Roman",serif;">a. Read through the <i>Cisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular)</i></div><div style="font-family: Georgia,"Times New Roman",serif;">document, noting the structure and format of the information.</div><div style="font-family: Georgia,"Times New Roman",serif;">b. From <b>Table 1, Architecture Features and Benefits of Cisco 1841 Router, </b>record the following</div><div style="font-family: Georgia,"Times New Roman",serif;">information:</div><div style="font-family: Georgia,"Times New Roman",serif;">The number of different modules and interface cards that are supported: >30</div><div style="font-family: Georgia,"Times New Roman",serif;">Default memory capacity:</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>32 MB of flash and 128</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>MB of synchronous dynamic RAM (SDRAM)</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Cisco IOS versions supported:</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>12.3T, 12.4, 12.4T</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Feature Sets and Beyond</b></div><div style="font-family: Georgia,"Times New Roman",serif;">c. From <b>Table 5, Product Specifications of Cisco 1841 Router</b>, locate and record the following</div><div style="font-family: Georgia,"Times New Roman",serif;">specifications from the Architecture section.</div><div style="font-family: Georgia,"Times New Roman",serif;">d. From the <b>Table 6, Modules and Interface Cards the Cisco 1841 Router Supports</b>, list the 10</div><div style="font-family: Georgia,"Times New Roman",serif;">different categories of interface card (WIC) supported by the 1841 platform.</div><div style="font-family: Georgia,"Times New Roman",serif;">e. From Table 6, what feature does the Advanced Integration Module (AIM) enable to be installed in an</div><div style="font-family: Georgia,"Times New Roman",serif;">1841 router?</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>VPN encryption</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 3: Consider possible hardware options</b></div><div style="font-family: Georgia,"Times New Roman",serif;">The 1841 ISR has removable and interchangeable modules. Various optional modules can be installed in the router to provide specific capabilities. These modules are installed either by inserting them into slots on the chassis, or by opening the chassis and plugging them into connectors inside.Flash memory and interface cards fit into slots on the chassis and are installed and removed without opening the chassis.</div><div style="font-family: Georgia,"Times New Roman",serif;">There are three types of interface cards for the 1800 series modular routers:</div><ul style="font-family: Georgia,"Times New Roman",serif;"><li>• WAN interface cards (WICs)</li>
<li>• Voice WAN interface cards (VWICs – in data mode only on the Cisco 1841)</li>
<li>• High-speed WAN interface cards (HWICs)</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif;">The following components plug into connectors inside the chassis and are installed and removed only by</div><div style="font-family: Georgia,"Times New Roman",serif;">opening the chassis:</div><ul style="font-family: Georgia,"Times New Roman",serif;"><li>• Advanced Integration Module (AIM)</li>
<li>• Synchronous dynamic RAM (SDRAM) small-outline dual in-line memory module (SODIMM</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif;">Summarize the changes that are possible for this router. This information is important to have and consider when planning and designing the network upgrade.</div><div style="font-family: Georgia,"Times New Roman",serif;">If the router is not at its limit of these features, candidates for upgrading could include:</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Flash memory</b> (if larger IOS required)</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>SDRAM</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Slot 1 Ethernet switch 4-port module</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Slot 1 WIC-2T – 2 serial interfaces</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Slot 1 Other WAN technology DSL/ISDN</b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Step 4: Clean up</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Erase any configurations and reload the router. Disconnect and store the cabling. For PC hosts that are</div><div style="font-family: Georgia,"Times New Roman",serif;">normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b> </b></div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Task 3: Reflection</b></div><div style="font-family: Georgia,"Times New Roman",serif;">Network device capabilities are continuously developing. Consider the advantages of a modular platform over that of a device with a fixed hardware platform.</div><div style="font-family: Georgia,"Times New Roman",serif;"><b>Modularitas memfasilitasi kustomisasi perangkat untuk memenuhi kebutuhan jaringan lokal.<br />
Peningkatan dan penggantian modul mengurangi biaya dan waktu dari layanan.<br />
Perangkat Modular menyediakan desain jaringan yang fleksibel dan scalable.</b></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-17984994257827327232011-01-08T17:16:00.001-08:002011-01-08T17:16:41.857-08:00Tugas CCNA 4 Lab 3.4.1 Preparing for a Site Survey<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 3.4.1 Preparing for a Site Survey</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Clarify and document the purpose of the site visit</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. List and discuss reasons for conducting a site visit.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. List the FilmCompany personnel who are most likely to be able to answer your questions and whom</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">you would need to talk to on site.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Teknis </strong><strong>jaringan </strong><strong>& infrastruktur informasi – administrator IT & jaringan<br />
• Sistem administrator<br />
• </strong><strong>P</strong><strong>engguna </strong><strong>a</strong><strong>khir – Dukungan</strong><strong> d</strong><strong>esktop<br />
• </strong><strong>K</strong><strong>ebutuhan </strong><strong>m</strong><strong>asa </strong><strong>d</strong><strong>epan – Manajemen dan pengguna akhir<br />
• Untuk organisasi kecil beberapa peran mungkin digabungkan</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Examine the existing network topology diagram at the end of this lab. List points that you want to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">confirm and those that need clarification.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Konfirmasi penggunaan port switch sebenarnya<br />
• Interkoneksi perangkat<br />
• VLAN topologi dan alokasi alamat</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Use word processing software to create a site visit plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Prepare a list of tools and equipment</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. List the tools and equipment that you need to take to the site.</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Pen dan notepad atau PDA</li>
<li>• Voice memo recorder</li>
<li>• Flashlight</li>
<li>• Clothing / coveralls (may need to access ceiling space)</li>
<li>• Portable stepladder (to inspect ceiling space, wireless Access Point installation); will a</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">stepladder be available on site?</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Tape measure</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. List the documentation, instrumentation, and software you need to take to the site.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Copy persetujuan kunjungan<br />
• Jaringan lalu lintas / pemantauan kinerja perangkat lunak dan alat uji (tidak untuk diinstal dan digunakan kecuali disetujui oleh pelanggan)<br />
• LAN nirkabel sinyal radio pemantauan dan analisis instrumen</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Add this list to the site visit plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Arrange an appointment to visit the site</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Role-play and discussion:</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">A site visit to FilmCompany must not disrupt the operation of the business and its network. Arrangements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">must be made to set a convenient visit time and duration. Access to the premises and to the required</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">appropriate people must be organized.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Network designer role: Develop a list of questions and requests to ask when telephoning</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany to arrange the site visit.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Alamat dan akses ke tempat: parkir pengunjung atau angkutan umum?<br />
• Tanggal dan waktu?<br />
• </strong><strong>Aturan</strong><strong> </strong><strong>k</strong><strong>edatangan: mendaftar di resepsi atau meja keamanan, lencana pengunjung?<br />
• Jika akses ke lokasi yang tinggi diperlukan, adalah tangga yang tersedia?<br />
• Apa persetujuan yang diperlukan untuk mengakses dan mengukur lalu lintas jaringan atau kinerja?</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Customer role: Develop a list of requirements relating to a proposed site visit by the network designer</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">that the on-site technician can follow to ensure seamless interaction.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Waktu terbaik untuk me</strong><strong>lakukan kunjungan</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Siapa yang akan tersedia untuk bertemu dengan perancang jaringan?<br />
• Siapa yang harus memenuhi perancang jaringan?<br />
• Siapa yang akan menjadi tuan rumah / guide kunjung</strong><strong>an</strong><strong>?<br />
• Apa daerah mungkin telah membatasi akses baik untuk alasan fisik dan operasional?<br />
• Apakah staf lain akan diberi tahu tentang kunjungan dan tujuannya?<br />
• Apa isu-isu keselamatan harus dipenuhi?</strong><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Using the information recorded above, the student performing the network designer role simulates a</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">telephone conversation with the student performing the customer role, to arrange a site visit that</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">meets the requirements of both roles.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">d. Record the agreed-upon terms and details of the visit.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">e. Add the agreed-upon details to the site visit plan.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Approach to site visit</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. List points and issues that the network designer should follow while actually conducting the site visit.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Discuss the most commonly chosen answers and the least commonly chosen answers</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Persiapan:<br />
</strong>• Memakai atau membawa kredensial perusahaan.<br />
• Bawalah peralatan yang memadai dengan membuat daftar standar untuk memastikan bahwa semua bahan yang diperlukan dimasukkan.<br />
<strong>Di Situs:<br />
</strong>• Datanglah tepat waktu<br />
• Periksa dengan staf yang tepat pada saat masuk ke stadion.<br />
• Tanamkan rasa percaya diri pada pelanggan dengan bekerja cepat dan profesional<br />
• Ajukan pertanyaan dengan jelas dan tepat, memungkinkan untuk penjelasan dan tindak lanjut; penggunaan yang tepat mempertanyakan teknik untuk memperoleh informasi yang relevan<br />
• Jawablah pertanyaan pelanggan dengan sopan dan selengkap mungkin.<br />
• Tuliskan pertanyaan yang harus dijawab oleh anggota staf lain.<br />
• Memberikan saran kepada pelanggan prosedur survei.<br />
• Laporan kembali ke staf pelanggan sebelum meninggalkan tempat untuk menginformasikan mereka tentang berhasil tidaknya menyelesaikan survei.<br />
<strong>P</strong><strong>edoman </strong><strong>k</strong><strong>eselamatan:<br />
</strong>• Ikuti petunjuk keselamatan yang direkomendasikan untuk memastikan pengoperasian yang tepat dan penggunaan yang aman dari perangkat nirkabel.<br />
• Memperoleh persetujuan pelanggan sebelum menyentuh atau memasang perangkat untuk setiap jaringan yang ada peralatannya.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Arranging a visit to a customer site to inspect their network and associated facilities can have many aspects. The data network of an organization is a vital part of their operations. Gaining access to inspect and record details of that network may require more detailed arrangements than this lab presents. Consider and discuss the arrangements required to visit to a high-security area such as government, aviation, or military location.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>• Mengatur kredensial identifikasi yang tepat dan diakui dan izin.<br />
• Membuat tujuan kunjungan situs yang sangat jelas sehingga akses ke daerah yang relevan dapat diselenggarakan di</strong><strong> </strong><strong>sebelum kunjungan. Mendapatkan akses ke daerah-daerah lainnya ketika pada situs mungkin tidak dapat dilakukan tanpa persetujuan terlebih dahulu.<br />
• Memperjelas dan mengikuti protokol pengunjung: pendaftaran pada saat kedatangan, tinggal dalam batas wewenang.<br />
• Mengetahui identitas resmi Anda untuk bertemu.<br />
• Penandatanganan dan mematuhi Perjanjian Non-Disclosure, dan keamanan lainnya dan protokol bisnis</strong></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-82647540074475369822011-01-08T17:15:00.001-08:002011-01-08T17:15:32.713-08:00Tugas CCNA 4 Lab 3.4.3 Performing a Wireless Site Survey<div class="post_content" style="font-family: Georgia,"Times New Roman",serif;"> <div style="text-align: justify;"><strong>Lab 3.4.3 Performing a Wireless Site Survey</strong></div><div style="text-align: justify;"><strong><br />
</strong></div><div style="text-align: justify;"><strong>Step 1: Configure the wireless client PC1</strong></div><div style="text-align: justify;">a. Referring to the topology diagram, configure the PC1 wireless NIC address to match the address</div><div style="text-align: justify;">shown in the topology for PC1.</div><div style="text-align: justify;">b. Ensure that power has been applied to the Wireless Router.</div><div style="text-align: justify;">c. From the command prompt of PC1, ping the Wireless Router to confirm network connectivity.</div><div style="text-align: justify;">If the pings fail, troubleshoot and establish connectivity.</div><div style="text-align: justify;"><strong>Step 2: Monitor signal strength using Network Stumbler</strong></div><div style="text-align: justify;">a. On PC1, open the Network Stumbler program.</div><div style="text-align: justify;">b. In the Network Stumbler window, expand the SSIDs section and locate the SSID of the wireless</div><div style="text-align: justify;">router being used in this demonstration.</div><div style="text-align: justify;">c. Expand that SSID number to find the Wireless Router MAC address. Click that address to open the</div><div style="text-align: justify;">Signal/Noise monitoring window to the right.</div><div style="text-align: justify;">The Green vertical bars in the moving graph indicate signal strength. Red bars indicate signal noise.</div><div style="text-align: justify;">The higher the green bars, the more signal strength. Additional information may be found in the <strong>Help</strong></div><div style="text-align: justify;">menu of the Network Stumbler program (<strong>Help > User Interface > Configuration Dialog > Graph</strong></div><div style="text-align: justify;"><strong>View</strong>).</div><div style="text-align: justify;">d. Record the signal strength of the Wireless Router at its current location and include its distance from</div><div style="text-align: justify;">PC1.</div><div style="text-align: justify;"><strong>Step 3: Relocate the wireless AP</strong></div><div style="text-align: justify;">a. Unplug the power cord on the Wireless Router and move the device to a location outside the room,</div><div style="text-align: justify;">preferably more than 25 feet away, and plug the power cord into the nearest wall outlet within that</div><div style="text-align: justify;">area.</div><div style="text-align: justify;">b. Wait for the Wireless Router to power up, and then return to PC1 to view the Signal/Noise meter.</div><div style="text-align: justify;">Has the signal strength been reduced?</div><div style="text-align: justify;"><strong>Ya</strong></div><div style="text-align: justify;">Record the signal strength of the Wireless Router at the current location and include its distance from</div><div style="text-align: justify;">PC1.</div><div style="text-align: justify;"><strong>Step 4: Relocate the wireless AP to a secure location</strong></div><div style="text-align: justify;">a. Unplug the power cord on the wireless router and move the device to a secure wiring closet, outside</div><div style="text-align: justify;">the classroom. This room should be able to be locked and also provide an AC wall outlet to plug in</div><div style="text-align: justify;">the Wireless Router power supply.</div><div style="text-align: justify;">b. Plug the power cord in and power up the Wireless Router. While waiting for the Wireless Router to</div><div style="text-align: justify;">power up, close the wiring closet door, and return to PC1 to view the Signal/Noise meter.</div><div style="text-align: justify;">Has the signal strength been reduced?</div><div style="text-align: justify;"><strong>Ya</strong></div><div style="text-align: justify;">If no wiring closet can be used, the Linksys antennas can be removed to simulate a long distance.</div><div style="text-align: justify;">Remove the antennas and place the router under a desk or in a cabinet.</div><div style="text-align: justify;">c. Record the signal strength of the Wireless Router at the current location and include its distance from</div><div style="text-align: justify;">PC1.</div><div style="text-align: justify;">Will the current placement of the Wireless Router be a good location to provide wireless access to</div><div style="text-align: justify;">other rooms within the area?</div><div style="text-align: justify;">Judge how far away end devices can be placed from the wireless Access Point and determine the</div><div style="text-align: justify;">number of end devices that the AP could provide service to.</div><div style="text-align: justify;">What obstructions tend to cause the largest drop in signal strength?</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Step 5: Clean up</strong></div><div style="text-align: justify;">Return the wireless router to the classroom. For PC hosts that are normally connected to other networks</div><div style="text-align: justify;">(such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP</div><div style="text-align: justify;">settings.</div></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0tag:blogger.com,1999:blog-1902617327026703277.post-66469178991909162282011-01-08T17:14:00.001-08:002011-01-08T17:14:32.037-08:00Tugas CCNA 4 Lab 3.5.2 Creating an Overall Project Goal<div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Lab 3.5.2 Creating an Overall Project Goal</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong><br />
</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 1: Gather information about the company goals that this network upgrade will facilitate</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider what FilmCompany sees as benefits that the upgraded network will provide to their business in</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">terms of their new stadium contract. These business benefits will not be the direct technical improvements</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">that networking technicians and engineers may see. A business manager does not necessarily see the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">network in terms of bandwidth, latency, efficient protocols, or device operation. They are more likely to</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">consider issues of profitability, flexibility, customer service, and reliability.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">As a network designer, you take into account all the information obtained through interviewing the company managers and key members of the staff.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Draft informal notes of what you consider to be the business benefits in this case.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Use word processing software to create a Project Goal document based on these notes.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">c. Organize or group your informal notes and save these in your Project Goal document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">General headings could include:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Financial goals</li>
<li>• Job management goals</li>
<li>• Customer communication goals</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 2: Summarize important goals in a list</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Examine the general goals recorded and summarize these as three or four key points.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Begin each point with a verb, such as Provide, Increase, Improve, or equivalent word. Try to include a measurable achievement if possible.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">For example:</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Provide the stadium with a broadcast-quality, 30-minute highlight video package within 3 hours of the conclusion of an event.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Save the list of important goals in your Project Goal document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 3: Develop an overall project goal statement</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Write a single statement that introduces the summarized important goals.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">The proposed network upgrade will enable FilmCompany to increase its share of</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">the sports event video market through:</div><ul style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><li>• Improved response times to customer requests</li>
<li>• Improved processing and delivery of video content across the network</li>
<li>• Improved communications access to customer facilities</li>
<li>• Ability for improved flexibility in meeting customer needs</li>
</ul><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Add this statement to your Project Goal document.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 4: Obtain agreement from the company on the project goal statement</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">FilmCompany has to agree with your assessment of the Project Goal before you proceed further with the</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">design. If this is agreement is not obtained, the network you design may not meet the FilmCompany overall business requirements. An agreement provides clarification and acknowledgement of why the upgrade is to occur and what it is to achieve.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">a. Discuss your Project Goal document with another student and arrive at an agreed-upon Project Goal.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">It may be necessary to amend the statement and important goals before agreement is reached.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">b. Save your Project Goal document and retain it for the next stages of this network design case study.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong> </strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Step 5: Reflection</strong></div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Consider the issue of communication between the network designer and a manager of the company</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">considering an upgrade of the business network. The network designer is trained in network operation and performance and how to optimize network resources and technologies to best provide network services. To the manager, the network is only one of a number of business tools that the company may use. The business manager probably wants to improve profitability and sees an enhanced network as a tool to help achieve that goal. A business manager is not likely to relate to a goal that is expressed solely in technical terms, such as an upgraded LAN with higher bandwidth, less latency, and maximized server utilization. Although most designers may want to talk about network capabilities, the lifecycle approach is about customer requirements and enabling the business process.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;">Discuss some strategies that will enable clear communication between a network designer and a business manager so that the resulting Project Goal document represents business needs that ultimately can be met by a network design.</div><div style="font-family: Georgia,"Times New Roman",serif; text-align: justify;"><strong>Mahasiswa yang tertarik untuk jaringan, termasuk komputer, sistem TI, dan teknologi, mungkin cenderung terlalu fokus pada aspek teknis desain jaringan. Pada tahap awal siklus desain, penting </strong><strong>bagi</strong><strong> siswa mengembangkan kesadaran tentang keharusan usaha yang akan </strong><strong>meng-upgrade </strong><strong>drive jaringan dari alam. </strong></div>LoUPZzz_nYahttp://www.blogger.com/profile/09444738248514426096noreply@blogger.com0