Configuration, Operation, and Troubleshooting of Enterprise Routers

Verified

Added on  2022/11/14

|15
|3274
|402
Practical Assignment
AI Summary
This assignment focuses on the practical aspects of installing, operating, and troubleshooting medium enterprise routers within a Wide Area Network (WAN) environment. It covers the design and implementation of a WAN network, including hardware components like routers, switches, and PCs, along with cabling considerations. The assignment delves into IP addressing, subnetting, and initial router configuration, including firmware upgrades and basic security measures using SSH. Furthermore, it explores static and default routing, followed by dynamic routing protocols such as RIPv2 and EIGRP. The document details the configuration steps for each task, including IP address ranges, requirements, and device-specific configurations. Troubleshooting using the ping command and the implementation of network security are also discussed to ensure the proper functioning and security of the network.
Document Page
TITLE: INSTALL, OPERATE AND TROUBLESHOOT MEDIUM ENTERPRISE
ROUTERS
Install, operate and troubleshoot medium enterprise routers
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget. Implementation process is the next one now. We have
to place the computers and servers in the convenient place in the room. When the set up is
complete, then we can now connect the cables through all components. We then have to switch on
the power then start configuring the router and switches. This will ensure the correct data flow and
also in case of any problem then it will be easy to solve by checking the affected switch directly.
Also conflicts will be eradicated between the layers of the switch. The all connection is complete
and the manager can instruct the employees to use the network now (BShara, Tracy, Callaghan, ...
& Crabbe, 2019).
Introduction
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. We have to analyze network performance after the full installations.
Software such as protocol analyzer and network management software can be used since they are
reliable. Analysis of one month results will be more suitable and very convenient since it shows
roughly how network is being used by employees. The analyzers can show what time does
employees uses more network. During the working hours there is probably less use of network but
during free time they use more internet. The protocol analyzers are very powerful since they are
able to identify running protocols by default hence creating overhead and it can be switched off. IP
address design must be chosen and developed to fits growth requirements and also well designed
routing protocol which support quick convergence to facilitate proper management. Bandwidth
should be chosen based on the required performance. WAN transport should be design in a way that
it will be flexible in case bandwidth service changes is to be met in future (BShara, Tracy,
Callaghan, ... & Crabbe, 2019).
Document Page
TASK 1
DESIGNING AND IMPLEMENTATION OF WAN NETWORK
WAN hardware are the physical components in a network set up. These are device that are tangible
such as, laptop, PC, routers, switchers, cables among others. However, wireless network uses
invisible device to transfer information such as invisible radio frequencies or infrared waves. The
path can also be physical also such as cables or invisible wireless. All these components depends on
the customer preference and also the budget (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
In our case, we need a Cisco router, two switches, two servers, cables and two PC's. The type of
connection here will be LAN network which is visible type of connection. As discussed with the
customer, the cost of the devices are affordable and it fits to their budget well therefore we have
made the order to the vendor. The next step is assembling the all components then installing
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Using the design have drawn, I have to fix the Cisco router first. The router will distribute WAN
network in this set up of LAN network. Since there are two PC's then each switch will be assigned
to it. We have to use enough cables from router to switches to minims the wastage and of course we
should strictly consider fire code. The strategic place for switches are also important. They should
be very close to PC hence that is realistic positions of it. After all the components are set in place,
we now use cables we have made to connect the network from router through switches to servers
and PC's. After all this is done, the network is now ready to work (Yondri, Irfan, Putri, Zaus, &
Islami, 2019).
We have to analyze network performance after the full installations. Software such as protocol
analyzer and network management software can be used since they are reliable. Analysis of one
month results will be more suitable and very convenient since it shows roughly how network is
being used by employees. The analyzers can show what time does employees uses more network.
During the working hours there is probably less use of network but during free time they use more
internet. The protocol analyzers are very powerful since they are able to identify running protocols
by default hence creating overhead and it can be switched off. IP address design must be chosen and
developed to fits growth requirements and also well designed routing protocol which support quick
convergence to facilitate proper management. Bandwidth should be chosen based on the required
performance. WAN transport should be design in a way that it will be flexible in case bandwidth
service changes is to be met in future (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Implementation process is the next one now. We have to place the computers and servers in the
convenient place in the room. When the set up is complete, then we can now connect the cables
through all components. We then have to switch on the power then start configuring the router and
switches. This will ensure the correct data flow and also in case of any problem then it will be easy
to solve by checking the affected switch directly. Also conflicts will be eradicated between the
layers of the switch. The all connection is complete and the manager can instruct the employees to
use the network now (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Document Page
TASK 2
CABLING, SUBNETTING AND INITIAL ROUTER CONFIGURATION
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
1 192.168.125.0 255.255.255.192 /2
2 192.168.15o.0 255.255.255.192 /2
3 192.168.175.0 255.255.255.192 /2
IP Address Requirements
Networks Number of Hosts
Network 1 Switch 1 – PC 1 – Server 1 2 hosts
Network 2 Switch 2 – PC 2 – Server 2 2 hosts
IP Address Allocation
Device Interface Assigned IP Address
AccessRouter Network 1 interface Last device address - Network 1
Network 2 interface Last device address - Network 2
Switch1 VLAN 1 interface One before the last device address – Network 1
PC1 Network interface 2nd device address - Network 1
Server1 Network interface 1st device address - Network 1
Switch2 VLAN 2 interface One before the last device address – Network 2
PC2 Network interface 2nd device address - Network 2
Switch2 Network interface 1st device address - Network 2
Firmware upgrade on the router
Firmware upgrade on the router is necessary for new features and also security purpose. All the
vulnerabilities that might have been detected will fixed by new features. Also since technology is
advancing then all the time the devices should be in latest version. Upgrading also might means
adding up the new security features that was not there hence improving the new features of the
devices. The general performance also might be improved hence it is most important in the
efficiency of the router (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
Document Page
Configuring basic router security
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH
Document Page
TASK 3
STATIC AND DEFAULT ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
4 172.20.125.0 255.255.255.0 /2
5 172.20.150.0 255.255.255.0 /2
6 172.20.175.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 1 / PC-A 6 hosts
Router 2 / PC-B 3 hosts
AccessRouter – Router 1 link 2 addresses only
Router 1 – Router 2 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device (Yondri, Irfan, Putri, Zaus, & Islami, 2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Configuring basic router security
Secure Shell (SSH) is the most secured and recommended. It improves and give room for
establishment of network security on the system. Hackers and all malicious persons can’t access or
pass through the system when this used (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
Host-name of the router can be configured using SSH.
yourname#configure terminal
yourname (config)#hostname LabRouter
LabRouter(config)#
Password also can be encrypted by use of this feature SSH
Document Page
TASK 4
RIPV2 DYNAMIC ROUTING
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
7 172.30.150.0 255.255.255.0 /2
8 172.30.175.0 255.255.255.0 /2
9 172.30.200.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 3 / PC-C 6 hosts
Router 4 / PC-D 3 hosts
Router 5 / PC-E 2 host
AccessRouter – Router 3 link 2 addresses only
Router 3 – Router 4 link 2 addresses only
Router 3 – Router 5 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).
Document Page
Configure RIPv2 dynamic routing
RIPv2 configurations is very direct process. RIP is only enabled in router RIP global configuration
command. Next step is giving instructions the router to utilize RIPv2 by keying version 2 in
command prompt. Finally you inform RIP which type of network to advertise by use of one or more
network commands. First commands are more straightforward but the last commands requires a
little bit of clever thoughts. These commands will evaluate which routing process to take place
(BShara, Tracy, Callaghan, ... & Crabbe, 2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TASK 5
EIGRP Dynamic Routing
IP Address Ranges
Range Network Address Subnet Mask CIDR Notation
10 192.168.225.0 255.255.255.0 /2
11 192.168.235.0 255.255.255.0 /2
12 192.168.245.0 255.255.255.0 /2
IP Address Requirements
Network Number of Hosts
Router 7 / PC-C 6 hosts
Router 8 / PC-D 3 hosts
Router 9 / PC-E 2 host
AccessRouter – Router 7 link 2 addresses only
Router 7 – Router 8 link 2 addresses only
Router 7 – Router 9 link 2 addresses only
Configuring of the devices
Ping command is the main command used in trouble shouting network devices. This command is
used to send a message to a device and is the echo is received from that device then it is working
and if not that means there is a problem. Troubleshooting using ping command is the most efficient
way of testing the device. Secure Shell (SSH) is the most secured and recommended. It improves
and give room for establishment of network security on the system. Hackers and all malicious
persons can’t access or pass through the system when this used (Yondri, Irfan, Putri, Zaus, & Islami,
2019).
Document Page
Configure EIGRP dynamic routing
Enabling EIGRP is one in two steps. First, activate EIGRP by enabling it in routing protocol from
global configuration mode. second, inform EIGRP which interfaces that we would like to include.
By simply typing in this commands;
Router(config)# router eigrp autonomous_system_#
Router(config-router)# network IP_network_# [subnet_mask]
Router(config)# router eigrp autonomous_system_#
It will enable the EIGRP routing protocol in router. This commands will guide us which local
interface to include in EIGRP (BShara, Tracy, Callaghan, ... & Crabbe, 2019).
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]