Saturday, March 30, 2019

Creating a WAN Diagram

Creating a WAN platBY JAN AVIT MICOLH MATUGASCreating WAN Diagrama) Create a WAN plot detailing and labeling on the whole components of a WAN network according to the scenario (network devices, computers and servers configurations). E re every(prenominal)y starting time must endure their own IP range.Figure 1 unquestionable Diagram of capital of New Zealand being attached to its tot whollyy runneresFigure 2. Actual Diagram of jackboot Main OfficeFigure 3. Actual Diagram of Napier and ChristchurchFigure 4. Actual Diagram of Auckland and Taurangab) Write down the IP address range for entirely branches.1. Wellington 192.110.2.1/242. Napier 192.90.1.2/243. Christchurch 192.117.3.1/244. Auckland 122.13.58.4/245. Tauranga 192.168.14.0/24c) angle of inclination down the components used in the network you have created with their configuration, separated by branch ComponentConfigurationWellington52 PCHP Z240 SFF i5-6500 3.2GHz 8GB DDR4 1TB Win7Pro8 ServersIntel seventh Gen Core i7 7700 3.6Ghz Quad Core/ 16 GB DDR4 RAM4 RoutersNetgear Orbi RBK50 MU-MIMO Wi-Fi System, Orbi Router + Orbi Satellite, Tri-Band AC3000, 4 x Gigabit LAN,4 counterchangeesUbiquiti UniFi Switch US-8-150W, 8-Port Gigabit Managed PoE+ Switch, with 8 x PoE/PoE+ (Max 150W) and 2 x SFP Rackmountable, Fanless, Passive 24V 802.3af/atNapier8 PCHP Z240 SFF i5-6500 3.2GHz 8GB DDR4 1TB Win7Pro2 RouterNetgear Orbi RBK50 MU-MIMO Wi-Fi System, Orbi Router + Orbi Satellite, Tri-Band AC3000, 4 x Gigabit LAN,2 SwitchUbiquiti UniFi Switch US-8-150W, 8-Port Gigabit Managed PoE+ Switch, with 8 x PoE/PoE+ (Max 150W) and 2 x SFP Rackmountable, Fanless, Passive 24V 802.3af/atChirstchurch5 PCHP Z240 SFF i5-6500 3.2GHz 8GB DDR4 1TB Win7ProRouterNetgear Orbi RBK50 MU-MIMO Wi-Fi System, Orbi Router + Orbi Satellite, Tri-Band AC3000, 4 x Gigabit LAN,SwitchUbiquiti UniFi Switch US-8-150W, 8-Port Gigabit Managed PoE+ Switch, with 8 x PoE/PoE+ (Max 150W) and 2 x SFP Rackmountable, Fanless, Passive 24V 802.3af/atU TP cableCat45Auckland18 PCHP Z240 SFF i5-6500 3.2GHz 8GB DDR4 1TB Win7ProRouterNetgear Orbi RBK50 MU-MIMO Wi-Fi System, Orbi Router + Orbi Satellite, Tri-Band AC3000, 4 x Gigabit LAN,SwitchUbiquiti UniFi Switch US-8-150W, 8-Port Gigabit Managed PoE+ Switch, with 8 x PoE/PoE+ (Max 150W) and 2 x SFP Rackmountable, Fanless, Passive 24V 802.3af/atTauranga4 PCHP Z240 SFF i5-6500 3.2GHz 8GB DDR4 1TB Win7Pro2 RoutersNetgear Orbi RBK50 MU-MIMO Wi-Fi System, Orbi Router + Orbi Satellite, Tri-Band AC3000, 4 x Gigabit LAN,2 SwitchesUbiquiti UniFi Switch US-8-150W, 8-Port Gigabit Managed PoE+ Switch, with 8 x PoE/PoE+ (Max 150W) and 2 x SFP Rackmountable, Fanless, Passive 24V 802.3af/at2 ServersIntel 7th Gen Core i7 7700 3.6Ghz Quad Core/ 16 GB DDR4 RAMd) rationalise the WAN diagram in terms of how the branches network ar consorted and justify your choose of network devices and components for each branch.As I observed, around of the connection is being done by the VPN connections. Like Na pier and Christchurch, they are render with router-to-router VPN connections. Through this, its very easy to connect from branch to main office. in like manner with the Auckland and Tauranga they are also using VPN that deal stay connected 24/7 a day. It is also equipped with T1 connection that allows them to have a smooth transition experience. For me the most important device is the Router. Through this all the connections of all branches is possible (Intranet and Extranet VPN billet Scenarios, 2007).e) Provide a scenario explaining how a branch provide connect to the company main office. This company is already expanding. In fact it has already 4 branches across the country. So for this the company will make sure that all employees can have access to all network resources that they need in order to perform their job effectively. With this, it is very important also to assure the security of creating the path on how you connect it. By the use of site-to-site VPN, it will crea te a path called burrow between two sites via internet. This will allow the branches to access the file servers at the main office. The data being transfer are all encapsulated so youre both protected as you send and receive data.f) Provide a scenario explaining how a telephone line associate will access the extranet.The business partner is one of the most valuable parts in any organization. We should take and provide good communications to create a good bond. In order to make this happen, the Main office and the business partner should be connected through a secure IPSec tunnel (VPN), then allowing the business partner to access the Main offices file server to perform their divers(a) tasks, like updating and monitoring the product stocks (Intranet and Extranet VPN Business Scenarios, 2007).Using the diagram that you created before, answer the following questionsa) Create a routing table for every branch if applicable.This routing table is from Christchurch branch, where it has 5 PC.DestinationSubnet MaskGatewayInterface system of measurementProtocol192.117.3.2255.255.255.0192.117.3.1 topical anaesthetic Area entanglement1 local anaesthetic192.117.3.3255.255.255.0192.117.3.1Local Area Network1Local192.117.3.4255.255.255.0192.117.3.1Local Area Network1Local192.117.3.5255.255.255.0192.117.3.1Local Area Network1Local192.117.3.6255.255.255.0192.117.3.1Local Area Network1Localb) Which communications protocol or protocols should be used to ensure the routing tables are correct and working.There are 3 types of Routing ProtocolsStaticDefaultDynamicStatic This type of protocol is being done my manual configurations. Each destination is all set up manually, like configuring the known destination and subnet mask.Default In this protocol, the main blow is to send packets into unknown network destination. (Not in routing table) and it has also one run out port.Dynamic This protocol caters all the features that able find and update routing tables on routers. This is very efficient to use because it will directly connect all known networks and send/receive data between two routers.I choose the Dynamic protocol, because as you can see it is packed with all the good features that very useful and convenient to use. In this protocol you can save more time and resources(Academy, 2014).ReferencesAcademy, C. N. (2014, March 24). lake herring Networking Academys Introduction to Routing Dynamically. Retrieved from http//www.ciscopress.com http//www.ciscopress.com/articles/article.asp?p=2180210seqNum=7Academy, C. N. (2014, March 24). Cisco Networking Academys Introduction to Routing Dynamically. Retrieved from http//www.ciscopress.com http//www.ciscopress.com/articles/article.asp?p=2180210seqNum=7Intranet and Extranet VPN Business Scenarios. (2007, August 3). Retrieved from http//www.cisco.com http//www.cisco.com/c/en/us/td/docs/security/vpn_modules/misc/Archive_-6342/6342cmbo.htmlwp1057569Academy, C. N. (2014, March 24). Cisco Networking Academys In troduction to Routing Dynamically. Retrieved from http//www.ciscopress.com http//www.ciscopress.com/articles/article.asp?p=2180210seqNum=7Intranet and Extranet VPN Business Scenarios. (2007, August 3). Retrieved from http//www.cisco.com http//www.cisco.com/c/en/us/td/docs/security/vpn_modules/misc/Archive_-6342/6342cmbo.htmlwp1057569Intranet and Extranet VPN Business Scenarios. (2007, August 3). Retrieved from http//www.cisco.com http//www.cisco.com/c/en/us/td/docs/security/vpn_modules/misc/Archive_-6342/6342cmbo.htmlwp1064626

No comments:

Post a Comment