Wide Area Networking Technologies Implementation and Management
VerifiedAdded on 2025/05/04
|16
|1175
|221
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Wide Area Networking Technologies
Assignment 2
Implement and Manage a WAN
Student Name:
Student ID:
Assignment 2
Implement and Manage a WAN
Student Name:
Student ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
LO3 Be able to implement WAN infrastructures............................................................................2
3.1 Build and configure a WAN (including services) to meet a given requirement...................2
3.2 Implement network security on a WAN................................................................................5
3.3 Critically review and test a WAN........................................................................................10
LO4 Be able to manage WAN infrastructures...............................................................................12
4.1 Monitor and troubleshoot a WAN.......................................................................................12
4.2 Resolve WAN issues to improve security, reliability and performance..............................14
4.3 Critically evaluate the performance of a WAN...................................................................14
LO3 Be able to implement WAN infrastructures............................................................................2
3.1 Build and configure a WAN (including services) to meet a given requirement...................2
3.2 Implement network security on a WAN................................................................................5
3.3 Critically review and test a WAN........................................................................................10
LO4 Be able to manage WAN infrastructures...............................................................................12
4.1 Monitor and troubleshoot a WAN.......................................................................................12
4.2 Resolve WAN issues to improve security, reliability and performance..............................14
4.3 Critically evaluate the performance of a WAN...................................................................14

LO3 Be able to implement WAN infrastructures
3.1 Build and configure a WAN (including services) to meet a given requirement
In the above given case study, the requirement that is given by the client, we have designed the
network as per the requirement.
In the given design, we have created a Wide Area Network (WAN). Wide Area Network are
designed for
Providing Interconnection between different remote sites which are deployed in different
geographical Locations.
User Requirement:
Network should have functionality of fast response time. Response time it the time take
between when the user enters the command to perform any action and the response that is
delivered by the network.
Network should have high throughput because frequently many users will access the services
on the network at same time.
Network should be high scalability which means network should be function properly for at
least next 5 years.
Network design should be secure when data is transfer with WAN.
WAN network should have fault-tolerance which gives stability to the network.
Steps to Build WAN:
Create or select the topology to design the network.
Select the WAN technologies to be used in a network like MPLS or VPN.
Select the routing protocols to be used in network like BGP, OSPF or EIGRP.
Allocate the network address to the routers.
Check the communication between LANs on different network.
3.1 Build and configure a WAN (including services) to meet a given requirement
In the above given case study, the requirement that is given by the client, we have designed the
network as per the requirement.
In the given design, we have created a Wide Area Network (WAN). Wide Area Network are
designed for
Providing Interconnection between different remote sites which are deployed in different
geographical Locations.
User Requirement:
Network should have functionality of fast response time. Response time it the time take
between when the user enters the command to perform any action and the response that is
delivered by the network.
Network should have high throughput because frequently many users will access the services
on the network at same time.
Network should be high scalability which means network should be function properly for at
least next 5 years.
Network design should be secure when data is transfer with WAN.
WAN network should have fault-tolerance which gives stability to the network.
Steps to Build WAN:
Create or select the topology to design the network.
Select the WAN technologies to be used in a network like MPLS or VPN.
Select the routing protocols to be used in network like BGP, OSPF or EIGRP.
Allocate the network address to the routers.
Check the communication between LANs on different network.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

VPN: VPN or Virtual Private Network is communication medium which is encrypted over the
internet from one device to the network. It helps to secure data while transmitting from one
network to another.
IPSec: IPsec or Internet Protocol Security is security algorithm to secure the network traffic.
BGP: Border Gateway Protocol or BGP is an routing protocol which is used route from One
network to another network over WAN.
Configuration
On Router 1
R1#configure terminal
R1(config)#int s2/0
R1(config-if)#ip address 192.168.1.1 255.255.255.252
R1(config-if)#no shutdown
On Router 2
R2#configure terminal
R2(config)#int s2/0
R2(config-if)#ip address 192.168.1.1 255.255.255.252
R2(config-if)#no shutdown
BGP configuration
R1#configure terminal
R1(config)#router bgp 100
R1(config-router)#network 10.1.1.0 mask 255.255.255.252
R1(config-router)#network 172.16.0.0 mask 255.255.0.0
R1(config-router)#neighbour 10.1.1.1 remote-site 1
internet from one device to the network. It helps to secure data while transmitting from one
network to another.
IPSec: IPsec or Internet Protocol Security is security algorithm to secure the network traffic.
BGP: Border Gateway Protocol or BGP is an routing protocol which is used route from One
network to another network over WAN.
Configuration
On Router 1
R1#configure terminal
R1(config)#int s2/0
R1(config-if)#ip address 192.168.1.1 255.255.255.252
R1(config-if)#no shutdown
On Router 2
R2#configure terminal
R2(config)#int s2/0
R2(config-if)#ip address 192.168.1.1 255.255.255.252
R2(config-if)#no shutdown
BGP configuration
R1#configure terminal
R1(config)#router bgp 100
R1(config-router)#network 10.1.1.0 mask 255.255.255.252
R1(config-router)#network 172.16.0.0 mask 255.255.0.0
R1(config-router)#neighbour 10.1.1.1 remote-site 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

R3#configure terminal
R3(config)#router bgp 200
R3(config-router)# network 10.2.2.0 mask 255.255.255.252
R3(config-router)#network 192.168.3.0 mask 255.255.255.0
R3(config-router)#neighbour 192.168.1.1 remote-site 1
R2#configure terminal
R2(config)#router bgp 1
R2(config-router)#network 10.1.1.0 mask 255.255.255.252
R3(config)#router bgp 200
R3(config-router)# network 10.2.2.0 mask 255.255.255.252
R3(config-router)#network 192.168.3.0 mask 255.255.255.0
R3(config-router)#neighbour 192.168.1.1 remote-site 1
R2#configure terminal
R2(config)#router bgp 1
R2(config-router)#network 10.1.1.0 mask 255.255.255.252

R2(config-router)#network 10.2.2.0 mask 255.255.255.252
R2(config-router)#network 192.168.2.0 mask 255.255.255.0
R2(config-router)#neighbour 10.1.1.2 remote-site 100
R2(config-router)#neighbour 10.2.2.2 remote-site 200
3.2 Implement network security on a WAN
VPN configuration
Device Interface IP Subnet Default
Gateway
R1 S0/0/0 10.1.1.2 255.255.255.252 NA
GIG0/0 172.16.0.1 255.255.0.0 NA
R2 S0/0/0 10.1.1.1 255.255.255.252 NA
S0/0/1 10.2.2.1 255.255.255.252 NA
Gig0/0 192.168.2.1 255.255.255.0 NA
R2 S0/0/0 10.2.2.2 255.255.255.252 NA
GIG0/0 192.168.3.1 255.255.0.0 NA
IPsec Policy Parameters
R2(config-router)#network 192.168.2.0 mask 255.255.255.0
R2(config-router)#neighbour 10.1.1.2 remote-site 100
R2(config-router)#neighbour 10.2.2.2 remote-site 200
3.2 Implement network security on a WAN
VPN configuration
Device Interface IP Subnet Default
Gateway
R1 S0/0/0 10.1.1.2 255.255.255.252 NA
GIG0/0 172.16.0.1 255.255.0.0 NA
R2 S0/0/0 10.1.1.1 255.255.255.252 NA
S0/0/1 10.2.2.1 255.255.255.252 NA
Gig0/0 192.168.2.1 255.255.255.0 NA
R2 S0/0/0 10.2.2.2 255.255.255.252 NA
GIG0/0 192.168.3.1 255.255.0.0 NA
IPsec Policy Parameters
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Parameters R1 R3
Transform Set VPN-SET VPN-SET
Peer Hostname R3 R1
Peer IP Address 10.2.2.2 10.1.1.2
Network to encrypted 172.16.0.0/16 192.168.3.0/24
Crypto Map name VPN-MAP VPN-MAP
SA Ipsec-isakmp Ipsec-isakmp
R1(config)# license boot module c2900 technology-package securityk9
R1(config)# end
R1# copy running-config startup-config
R1# reload
R1# show version
Configure IPSEC on R1
Configure ACL
R1(config)# access-list 110 permit ip 172.16.0.0 0.0.255.255 192.168.3.0 0.0.0.255
R1(config)# crypto isakmp policy 10
Transform Set VPN-SET VPN-SET
Peer Hostname R3 R1
Peer IP Address 10.2.2.2 10.1.1.2
Network to encrypted 172.16.0.0/16 192.168.3.0/24
Crypto Map name VPN-MAP VPN-MAP
SA Ipsec-isakmp Ipsec-isakmp
R1(config)# license boot module c2900 technology-package securityk9
R1(config)# end
R1# copy running-config startup-config
R1# reload
R1# show version
Configure IPSEC on R1
Configure ACL
R1(config)# access-list 110 permit ip 172.16.0.0 0.0.255.255 192.168.3.0 0.0.0.255
R1(config)# crypto isakmp policy 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

R1(config-isakmp)# encryption aes
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 2
R1(config-isakmp)# exit
R1(config)# crypto isakmp key cisco address 10.2.2.2
R1(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
R1(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-crypto-map)# description VPN connection to R3
R1(config-crypto-map)# set peer 10.2.2.2
R1(config-crypto-map)# set transform-set VPN-SET
R1(config-crypto-map)# match address 110
R1(config-crypto-map)# exit
R1(config)# interface S0/0/0
R1(config-if)# crypto map VPN-MAP
Configure IPSEC on R3
R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes
R3(config-isakmp)# authentication pre-share
R3(config-isakmp)# group 2
R3(config-isakmp)# exit
R3(config)# crypto isakmp key cisco address 10.1.1.2
R3(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
R3(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 2
R1(config-isakmp)# exit
R1(config)# crypto isakmp key cisco address 10.2.2.2
R1(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
R1(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-crypto-map)# description VPN connection to R3
R1(config-crypto-map)# set peer 10.2.2.2
R1(config-crypto-map)# set transform-set VPN-SET
R1(config-crypto-map)# match address 110
R1(config-crypto-map)# exit
R1(config)# interface S0/0/0
R1(config-if)# crypto map VPN-MAP
Configure IPSEC on R3
R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes
R3(config-isakmp)# authentication pre-share
R3(config-isakmp)# group 2
R3(config-isakmp)# exit
R3(config)# crypto isakmp key cisco address 10.1.1.2
R3(config)# crypto ipsec transform-set VPN-SET esp-3des esp-sha-hmac
R3(config)# crypto map VPN-MAP 10 ipsec-isakmp

R3(config-crypto-map)# description VPN connection to R1
R3(config-crypto-map)# set peer 10.1.1.2
R3(config-crypto-map)# set transform-set VPN-SET
R3(config-crypto-map)# match address 110
R3(config-crypto-map)# exit
R3(config)# interface S0/0/1
R3(config-if)# crypto map VPN-MAP
Verify IPSec
R1 #show crypto ipsec sa
Ping 172.16.0.5 from 192.168.3.10
R3(config-crypto-map)# set peer 10.1.1.2
R3(config-crypto-map)# set transform-set VPN-SET
R3(config-crypto-map)# match address 110
R3(config-crypto-map)# exit
R3(config)# interface S0/0/1
R3(config-if)# crypto map VPN-MAP
Verify IPSec
R1 #show crypto ipsec sa
Ping 172.16.0.5 from 192.168.3.10
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Reviewing of Network:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3.3 Critically review and test a WAN
1. First we check whether the two different LAN’s are communication with each other or
not
Expected Result: - Successful
Actual Result: - Successful
2. Check Whether BGP is perfectly Configured or not
Expected Result: - Successful
Actual Result: Successful
1. First we check whether the two different LAN’s are communication with each other or
not
Expected Result: - Successful
Actual Result: - Successful
2. Check Whether BGP is perfectly Configured or not
Expected Result: - Successful
Actual Result: Successful

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.