...Lab 4 NAT Joel Garcia Cgs 4285 Contents Objective: 3 Procedures: 3 Experience: 3 Conclusion: 4 Data Table Error! Bookmark not defined. Questions 5 Objective: The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action. Procedures: 1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route. 2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server. 3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input: tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS & tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap & tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap & 4. Then, connect to port 7 and source port 2000 on workstation 1 with the command: nc -p 2000 cgs4285.cs.fiu.edu 7 Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2. 5. On the monitor station...
Words: 932 - Pages: 4
...Labs 4B Lab 8.4 1.What extra parameters are necessary in the network command when using OSPF, as compared with RIP, RIPv2, and EIGRP? Router(config)#router ospf process-number 2. What is the purpose of areas in OSPF? An area defines the confines within which LSAs are contained. 3. What is the purpose of the DR? On broadcast, multiaccess networks, OSPF elects a DR, which acts as a central point for LSAs. On multiaccess networks such as Ethernet, OSPF routers elect a DR and establish adjacencies with the DR only. 4. What determines which router will be the DR? If the priorities are not changed and all the priorities are equal, the router with the highest router ID will become the DR and the router with the second-highest will become the BDR. 5. What are the two steps involved when configuring OSPF authentication? Configuration of authentication keys on each OSPF interface. Configuration of area authentication. Lab 9.1 1.Does static NAT conserve IP addresses? Why or why not? Static NAT is a mapping of one inside IP address to one outside IP address. It does not conserve IP address space. 2. Does PAT conserve IP addresses? Why or why not? PAT allows multiple internal, private IP addresses to use a single external registered address. 3. Why do dynamic NAT and PAT require configuration of an access list? The standard access control list is used to define what internal traffic will be translated. 4. What is the purpose of the address pool in...
Words: 356 - Pages: 2
...Frame-Relay Static Mapping 4. Frame-Relay Inverse-ARP & Static Mappings 5. Frame-Relay Multipoint Interfaces: Inverse-ARP 6. Frame-Relay Multipoint Interfaces: Static Mappings 7. Frame-Relay Multipoint Interfaces: Inverse-ARP & Static Mappings 8. Frame-Relay Point-to-Point (P-to-P) Subinterfaces 9. Frame-Relay P-to-P Subinterfaces and Main Interfaces: Inverse-ARP 10. Frame-Relay P-to-P Subinterfaces and Main Interfaces: Static Mappings 11. Frame-Relay P-to-P Subinterfaces and Multipoint Subinterfaces: Inverse-ARP 12. Frame-Relay P-to-P Subinterfaces and Multipoint Subinterfaces: Static Mapping 13. Frame-Relay Multipoint Subinterface, Inverse-ARP and Main Interface, Inverse-ARP 14. Frame-Relay Multipoint Subinterface, Inverse-ARP and Main Interface, Static Mapping 15. Frame-Relay Multipoint Subinterface, Static Mapping and Main Interface, Inverse-ARP 16. Frame-Relay Multipoint Subinterface, Static Mapping and Main Interface, Static Mapping 17. Frame-Relay Hub-and-Spoke, Main Interfaces with Inverse-ARP 18. Frame-Relay Hub-and-Spoke, Main Interfaces with Inverse-ARP & Static Mappings 19. Frame-Relay Hub-and-Spoke, Main Interfaces with Static Mappings 20. Frame-Relay Hub-and-Spoke, Main Interfaces with Inverse-ARP & P-2-P Subinterfaces 21. Frame-Relay Hub-and-Spoke, Main Interfaces with Static Mappings & P-2-P Subinterfaces Again, this is a unique feature! You won't find this anywhere else! This is the complete list of Lab Exercises included in...
Words: 580 - Pages: 3
...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...
Words: 4941 - Pages: 20
...Corporation, Smile Train, Delta Airlines and Gucci are all examples of a. bureaucracies. b. corporations. c. organizations. d. managerial hierarchies. e. centralized units of operation. ANS: C PTS: 1 REF: p. 4 OBJ: 1.1 NAT: AACSB: R MSC: Type: App 2. Which of the following is an example of an organization? a. The Department of Education b. Princeton University track team c. Starbucks d. Swoopo, online auction site e. All of these choices ANS: E PTS: 1 REF: p. 4 OBJ: 1.1 NAT: AACSB: R MSC: Type: App 3. Amy, Frank, Puz, and Tiaro started a Bible study group. They are engaged in a. starting a corporation. b. starting an organization. c. creating a managerial hierarchy. d. creating a bureaucracy. e. creating an organizational matrix. ANS: B PTS: 1 REF: p. 4 OBJ: 1.1 NAT: AACSB: R MSC: Type: App 4. Ken and Jan Robelot have started an organization to sell Kenny's Cajun Popcorn, a peppery-flavored popcorn. The startup process for this organization included a. deciding on a product to make. b. identifying potential competitors for the flavored popcorn. c. finding an initial location in which to house the organization. d. making financial arrangements to order supplies. e. All of these choices ANS: E PTS: 1 REF: p. 4 OBJ: 1.1 NAT: AACSB: R MSC: Type: App 5. Which of the following is NOT an example of a physical resource needed to operate the company that produces Kenny's Cajun Popcorn, a "low-calorie snack with a high-voltage flavor"...
Words: 5762 - Pages: 24
...13772 Contents Introduction Prerequisites Requirements Components Used Conventions Quick Start Steps for Configuring and Deploying NAT Defining NAT Inside and Outside Interfaces Example: Allowing Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Configuring NAT to Allow Internal Users to Access the Internet Using Overloading Example: Allowing the Internet to Access Internal Devices Configuring NAT to Allow the Internet to Access Internal Devices Example: Redirecting TCP Traffic to Another TCP Port or Address Configuring NAT to Redirect TCP Traffic to Another TCP Port or Address Example: Using NAT During a Network Transition Configuring NAT for Use During a Network Transition Example: Using NAT in Overlapping Networks Difference between One−to−One Mapping and Many−to−Many Verifying NAT Operation Conclusion Related Information Introduction This document explains configuring Network Address Translation (NAT) on a Cisco router for use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this document is based on these software and hardware versions: •...
Words: 3234 - Pages: 13
...Design a Layered Security Strategy for an IP Network Infrastructure NaTasha Scott Dr. Danielle Babb CIS 534 Advanced Network Security Design March 6, 2014 1. Block diagram design of a layered security solution 2. A written function overview of your design Lab Assessment Questions and Answers for Lab 8 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regard to physical...
Words: 779 - Pages: 4
.../Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP Routing with Connected, Static...
Words: 22068 - Pages: 89
... WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .......................................................................................................................................... 4 1.3INTERNET PROTOCOL (IP) ADDRESSING ................................................................................. 4 CIDR NOTATION AND SUBNET MASKS ...................................
Words: 3418 - Pages: 14
...Task Summary Actions you were required to perform Change the switch hostname to Branch1 Add a description to FastEthernet 0/1 Add a description to FastEthernet 0/2 Add a description to FastEthernet 0/3 Add a description to FastEthernet 0/24 Save the switch changes Hide Details Save the hostname Save the FastEthernet 0/1 description Save the FastEthernet 0/2 description Save the FastEthernet 0/3 description Save the FastEthernet 0/24 description Change the router hostname to SFO Add a description to FastEthernet0/0 Add a description to Serial 0/1/0 Add a description to Serial 0/1/1 Save the router changes Hide Details Save the hostname Save the FastEthernet 0/0 description Save the Serial 0/1/0 description Save the Serial 0/1/1 description Explanation Use the following commands to complete these tasks: Press Enter Switch>enable Switch#configure terminal Switch(config)#hostname Branch1 Branch1(config)#interface FastEthernet0/1 Branch1(config-if)#description Wrk1 Branch1(config-if)#interface FastEthernet0/2 Branch1(config-if)#description Wrk2 Branch1(config-if)#interface FastEthernet0/3 Branch1(config-if)#description Wrk3 Branch1(config-if)#interface FastEthernet0/24 Branch1(config-if)#description Default gateway Branch1(config-if)#exit Branch1(config)#exit Branch1#copy running-config startup-config Use similar commands on the router to modify the hostname and the interface descriptions...
Words: 15973 - Pages: 64
...Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP Site Lab – 3: Creating Isolate User FTP Site Lab – 4: Creating Isolate User using Active Directory FTP Site 84 85 86 90 96 2 Windows Server 2008 - Network Administration 5 Routing Lab – 1: Assigning the IP Address to Configure Routing Lab – 2: Installing Routing Service on Router1 & Router2 Lab – 3: Enabling Routing...
Words: 12134 - Pages: 49
...real-world uses for paper chromatography used in the fields of chemistry and biology. This can be used to test for contaminants in rainwater, analysis of narcotics and detection of substances in urine. Be sure to include references for any research conducted for this section. Purpose In one or two complete sentences, state the purpose of this laboratory investigation. Materials Candy( skittles) colors: red, blue, pink, and green rubbing alcohol 2 coffee filters 2 glass cups pencil ruler foil water table salt cotton swabs measuring cup pitcher Procedure Cut coffee filters in to rectangles 3cm by 9cm put 4 water drops on a piece of foil and put each piece of candy in the water . Drew a line 1cm from the edge of the paper put 4 dots on the line for each color dipped a cotton swab in each color and added to the coffee filter three times each mixed 1/8 teaspoons of salt and 3 cups of water in to a pitcher and shaked it until it was dissolved poured the salt water in to a glass cup so that the liquid level was ¼ inch put the coffee filter in to the salt water the dyes started to separate repeat steps 2-9 but with alcohol and not salt water Data and Observations List your original predictions about the expected pigment components of each candy color. I thought that no color would move. Create an organized and labeled data table that lists the color and distance traveled...
Words: 511 - Pages: 3
...|Wireshark Lab: NAT v6.0 |[pic] | | | | |Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and | | |K.W. Ross | | | | | | | | | | | | | | |“Tell me and I forget. Show me and I remember. Involve me and I understand.” | | |Chinese proverb | | | | | |© 2005-21012, J.F Kurose and...
Words: 922 - Pages: 4
...(School Physical Plant and Facilities Management) GRPE311 A COMPARATIVE ANALYSIS ON SCHOOL PHYSICAL PLANT AND FACILITIES (Manila Cathedral School and San Rafael Parochial School) Introduction The school site must be suitable and adequate for its activities. School buildings are designed and constructed in conformity with the provisions of the Building Code. Facilities are appropriate and adequate to implement the philosophy, vision, mission, goals and objectives, and activities of the school. The physical environment, facilities and equipment support teaching and learning in all curricular offerings, delivery of services as well as optimal student development and achievement. School facilities are safe, clean, and well maintained for all faculty and students engaged in them. The school site and facilities are regularly inspected for effective operation and meet all applicable laws including health and safety code requirements. (DepEd ESC Re-certification Assessment Instrument PEAC-FAPE Secretariat 2010) In the first part of this analysis, the focus will be in more general terms of the school’s physical environment (plant and facilities) as shown in the succeeding tables, the format and the survey instrument will be a modification of the ESC School (Re-) Certification process tool basically designed to assess the extent of compliance with the DepEd Minimum Quality Standards as well as to evaluate the school’s characteristics, its qualitative...
Words: 2909 - Pages: 12
...n IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address. Address Classes There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine; [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting; Class E addresses are reserved for future use. They should...
Words: 586 - Pages: 3