logo

Network Security Management

7 Pages983 Words261 Views
   

Added on  2020-04-15

Network Security Management

   Added on 2020-04-15

ShareRelated Documents
Running head: NETWORK SECURITY MANAGEMENTNetwork Security Management[Name of the Student][Name of the University][Author note]
Network Security Management_1
NETWORK SECURITY MANAGEMENT21. Describe the steps to configure and enable a FastEthernet0/1 router interface with the IPaddress 10.10.20.250 and a subnet mask of 255.255.0.0. Ans: The steps are discussed below:The first step includes the enabling of the routers CMD terminal, by the below command:Router>enableThe following command is used for entering the configuration.Router#config terminalThen the selection is done by choosing the FastEthernet0/1 interface by the use if the followingcommand.Router(config)#interface FastEthernet0/1After selection of the interface assigning of the given network id is done by the use of followingcommand. Router(config-if)#ip address 10.10.20.250 255.255.0.0After completing the above steps, the following command is used to exit the configuration mode.Router(config-if)#exitThen exit the configure mode. Router(config)#exit
Network Security Management_2
NETWORK SECURITY MANAGEMENT32. What are the three ways to see if your router’s serial port is a DCE or DTE end? Ans: The most important way of identifying a port weather it is a DCE or DTE is by lookinginto the type that is if the port is a female port then it is DCE and if the port is a male port then itis a DTE port. By the use of a voltmeter also the port can be identified (Deepthi & Babu, 2017).In case if there is a voltage on receive then it is DCE and if there is a voltage on transmit then itis a DTE. Another way of detecting this port is by the use of the RS-232 Line Tester like9PMTT.3. A BPDU data packet lists the “Forward Delay” as 15 seconds. What information does this provide?Ans: Forward delay refers to the time that is used to listen and learn the current state of theBPDU. The time 15 seconds is the default time whereas the time can be tuned from 4 secs to 30secs (He et al., 2017). Forward delay also means the moving of the active STP topology to theforwarding stage from the blocking stage. 4. Your supervisor asks you if a layer 2 switch could be used in the core of the campus network. Prepare a response to your supervisor. Be sure to justify your recommendation. Ans: Layer 2 switch or also known as the bridging terminates the VLANs at the layer ofdistribution and acts as a pure bridge blocking half of the uplinks because of the limitations inthe spanning tree. It is easier to proceed with the layer 2 switch design as the termination of theVLANs on the Cat6500. This helps in the use of the centralized packet filters, the VRFs and alsothe MPLS/VPN when there is a requirement for the retention of separate paths across the corenetwork (Mahalingam et al., 2014). Due the presence of multiple security zones layer 2 switch isto be considered for use in the core of the campus.
Network Security Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Network Management
|7
|1150
|257

The interface of the router configuration mode
|5
|663
|237

Assignment on Network Management in Organization
|4
|440
|50

Assignment on TCP and IP Networking Server
|19
|918
|34

Introduction to Enterprise SWITCHED NETWORKS
|32
|8619
|177

Network Design and Validation | Assignment
|14
|2503
|16