Premium Essay

Network 209 Week 4

In:

Submitted By tx14
Words 2587
Pages 11
LAB 4-1 BASIC SECURITY CONFIGURATION

MAY 29TH, 2013
DEVRY

LAB 4-1: BASIC SECURITY CONFIGURATION
TASK 2: PERFORM BASIC ROUTER CONFIGURATIONS
STEP 1: CONFIGURE ROUTERS

Router(config)#hostname R1R1(config)#no ip domain lookupR1(config)#banner motd #Keep Out.#R1(config)#int fa0/1R1(config-if)#ip address 192.168.10.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#int s0/0/0R1(config-if)#ip address 10.1.1.1 255.255.255.252R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#exitR1(config)#router ripR1(config-router)#version 2R1(config-router)#network 192.168.10.0R1(config-router)#network 10.0.0.0 | Router(config)#hostname R2R2(config)#no ip domain-lookupR2(config)#banner motd #keep out!!#R2(config)#line con 0R2(config-line)#password ciscoR2(config-line)#loginR2(config-line)#line vty 0 4R2(config-line)#password ciscoR2(config)#int fa 0/1R2(config-if)#ip add 192.168.20.1 255.255.255.0 R2(config-if)#no shutR2(config-if)#int s0/0/0R2(config-if)#ip address 10.1.1.2 255.255.255.252R2(config-if)#no shutR2(config-if)#int s0/0/1R2(config-if)#ip address 10.2.2.1 255.255.255.252R2(config-if)#clock rate 64000R2(config-if)#no shutR2(config)#router ripR2(config-router)#version 2R2(config-router)#network 192.168.20.0R2(config-router)#network 10.1.1.0R2(config-router)#network 10.2.2.0R2(config-router)#network 209.165.200.224R2(config-router)#endR2(config)#int loopback 0R2(config-if)#ip add 209.165.200.225 255.255.255.224R2(config-if)#no shut | Router(config)#hostname R3R3(config)#no ip domain lookupR3(config)#banner motd #Keep Out.#R3(config)#int fa0/1R3(config-if)#ip addre 192.168.10.1 255.255.255.0R3(config-if)#no shutdownR3(config-if)#int s0/0/0R3(config-if)#ip address 10.1.1.1 255.255.255.252R3(config-if)#clock rate 64000R3(config-if)#no shutdownR3(config-if)#exitR3(config)#router ripR3(config-router)#version 2R3(config-router)#network

Similar Documents

Premium Essay

Final

...points under each chapter is the number of questions for that chapter – and they are the topics for each question from that chapter. In essence this document IS the Final Exam – without specific answers and of course the answers ( • The exam will be "scaled" in the sense that your scores will be compared to others, so the normal “90% = A” will not be the hard fast rule at all. So don't be overwhelmed by the test, just do your best and let me worry about "the grade." • You will take the exam online, during Week 8, just like all of the quizzes you have taken. Below is the list of EACH chapter and the topics, theories, and theorists to study for the Final Exam. EVERYTHING that appears on this list WILL be on the exam and there will be NO surprises on the exam, study this and you should do just fine. |WEEK |CHAPTER |TOPICS TO STUDY | |Week 1 |Chapter. 1: The Sociological Perspective |C. Wright Mills | | | |Karl Marx – Class Conflict | | | |Max Weber and the Protestant Ethic |...

Words: 861 - Pages: 4

Premium Essay

Royal Suites

...Executive Summary Royale Suites, an all suite hotel, is ready to expand its business into the downtown Inner Harbor Baltimore district. History tells us that the Royale Suites has been in business since early 1980 accommodating business professionals and families desiring larger and more private hotel rooms. The 267 room hotel offers 2 room suites, where small business meetings can be held or families can feel the comforts of home. The standard suite room contains a bed, television, table, chair, couch/love seat, computer accessibility, and variety of daily newspaper. The suites do not offer a kitchen facility. The hotel offers two large meeting rooms are available seating 60 each or combined to seat 100 and serve meals as well as a restaurant facility. After meeting with the executive committee members, marketing, advertising, rooms, food & beverage, and accounting, we determined that many concerns need to be addressed before the grand opening of Royale Suites Baltimore. Our target market includes the business professional and families with emphasis on business professionals. Based on statistics from our customer surveys we need to improve guest satisfaction in the following areas: comfortable beds, sought after amenities, efficient check-ins, and reasonable phone charges. We are tasked with developing a marketing mix which includes determining a competitive room rate for the downtown Baltimore district as well as promoting our product as a superior option in the...

Words: 3819 - Pages: 16

Premium Essay

Vut2 Task 1 Memo Checklist

...the web browser to go to an unintended/unwanted/ unknown/undesired web page) a person’s web browser to a webpage that is (phony and) malicious in nature, seeking only to execute commands that are for clandestine purposes. The typical outcome involves installation of some form of malware (keylogger, virus, trojan, browser hijacker, remote access backdoor, network and password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in mind the user clicked on the link). In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user name and password, but also trolled through network activity to obtain potential accounts (username and password) that would have higher level administrative permissions in case this particular user did not have such robust access. Simply stated, the user was a victim of a social engineering attack whereby the user clicks on a compromised (as in malicious in nature) link that can cause serious network, data and information security intrusion to the entire organization, and not just that particular computer, for the remote access and data trolling...

Words: 1895 - Pages: 8

Premium Essay

E-Business

...The Power of Like2 How Social Marketing Works ANDREW LIPSMAN VP, Marketing, comScore GRAHAM MUDD Head of Measurement Partnerships, Facebook CARMELA AQUINO Senior Marketing Manager, comScore PATRICK KEMP Senior Data Analyst, comScore Executive Summary The following white paper is the second in the U.S. Power of Like series, a research collaboration between comScore and Facebook to deliver unique insights on the impact of social media marketing. The research, which primarily leverages data and analysis from comScore Social Essentials™, comScore AdEffx™ and Facebook’s internal analytics platform, focuses on the impact of branded earned and paid media exposure on the behavior of Facebook Fans and Friends of Fans. The summary below establishes the key findings and implications of this research. Brands can maximize the impact of their social marketing programs on Facebook by leveraging a framework that helps them move beyond Fan acquisition to delivering reach, impact, and measurable marketing ROI. Using the Brand Page as a control panel for creating social marketing programs, brands should focus on benchmarking and optimizing on the following dimensions to deliver against their broader marketing objectives: Fan Reach Exposure in the News Feed Engagement Fans interacting with Brand Page marketing content Amplification Expanding reach by promoting content to Friends of Fans through both earned and paid means Most leading brands on Facebook achieve a monthly earned Amplification...

Words: 5984 - Pages: 24

Premium Essay

Nec Electronic Case Study

...9-209-001 REV: NOVEMBER 3, 2010 C. FRITZ FOLEY ROBIN GREENWOOD JAMES QUINN NEC Electronics In early July 2007, Alp Ercil, Managing Partner and portfolio manager of Perry Capital’s (“Perry”) Asian portfolio, was considering options for how best to manage the $150 million position his firm had in NEC Electronics (NECE), the semiconductor subsidiary of Japanese electronics conglomerate NEC. In recent days, the NECE subsidiary had garnered Ercil’s full attention. On the heels of attending NECE’s annual meeting, he had learned that the Tokyo Stock Exchange (TSE) was placing NECE on a watchlist for possible delisting due to its concentrated ownership structure. To Ercil, this was yet another sign that the investment was not going as planned - the stock was down considerably since Perry initiated the position in late 2005 (see Exhibit 1). Ercil took a moment to reflect on the recent history with NECE. When Perry Capital made the initial investment in 2005, Ercil had every expectation for success. Ercil’s team felt that NECE’s microcontroller unit (“MCU”) business,1 which supplied chips to major automobile manufacturers, operated at a world-class level with high growth potential and solid margins. NECE’s Computing, Consumer and Discrete businesses were generally competitive. However, the Communications business, which supplied semiconductors for mobile phones, appeared to be a constant drag on NECE’s cash flow and earnings. Specifically, Perry believed that NECE...

Words: 8161 - Pages: 33

Free Essay

Mci Case Study

...in the late 1990s to lead all others except for AT&T, which had held an industrywide monopoly until the 1980s. The company, located just a few blocks from the White House, has offices in 300 locations around the world, and competes in a wide variety of communication service markets. In 1997, the global long-distance company World-Com Inc. made a $30-billion bid to buy MCI. GTE made a $28 billion offer. After some negotiation, MCI agreed to a $37-billion purchase by WorldCom. The merger was announced November 10, 1997 and the new company will be named MCI WorldCom. COMPANY FINANCES Upon announcing the merger of MCI and World-Com Inc., the combined firms projected over $30 billion in revenues for 1998. In 1997 MCI had net income of $209 million on revenue of $19.65 billion, as compared to 1996 when net income was __BODY__.20 billion on revenue of $18.49 billion. This was a considerable increase over 1995 income of $548 million on $15.26 billion in revenues. Earnings per share of stock rose from $.80 in 1995 to __BODY__.73 in 1996, and fell to $.29 in 1997. MCI's long distance services represent more than 90 percent of its revenues. ANALYSTS' OPINIONS Although the MCI/WorldCom merger was touted by both companies as the joining of "two of the industry's most entrepreneurial and competitive forces," the U.S. Department of Justice and the European anti-trust chief declared in the spring of 1998 that...

Words: 2340 - Pages: 10

Premium Essay

Should College Players Get Paid to Play

...Should College Players Get Paid To Play By De’Angelo Beasley Learn Across Life Span Post University Febuaury 25, 2013 The argument that a college athletic scholarship is an equal quid pro quo for a college education has been utilized since athletic scholarships were approved by the NCAA in 1950’s. A college graduate can in fact make a great deal more money over a lifetime when compared to non-graduates. For instance, a “full athletic scholarships” do not provide a “free” education (as it does not cover all costs incurred from matriculation to graduation. In many cases, the university does not live up to its end of the bargain of providing an education; as evidenced by the dismal number in the graduation rates, especially among African Americans. Furthermore, the athletic scholarship is only a one-year (renewable) agreement that can be terminated by the coach or university in any given year for any reason. In debating the pay-for-play issue in college athletics, the history of the governing body (i.e., currently the NCAA), their mission and view of amateurism, the past history of college athletes benefitting financially, and the degree to which athletes benefit from the university experience must all be examined. The counter point section of this paper addresses each point made by my colleague. Using the Eitzen (12) analogy comparing the NCAA and big-time athletic programs to the old southern plantation system will be the underpinning wellspring for the subject...

Words: 1640 - Pages: 7

Premium Essay

Project

...It has been about 8 weeks since the Bangladesh Bank was hit by $101 million heist — $101 million in stolen funds, taken from a secure account, disappeared into a murky world of casinos and money laundering. The caper involves at least four countries, a central bank and a pillar of the U.S. financial system. Last February 1, when banks were closed for the weekend in Bangladesh, criminals executed five transfers from the central bank's account at the Federal Reserve Bank of New York. The requests looked real: They appeared to come from a Bangladesh server, and the thieves supplied the correct bank codes to authenticate the transfers. Most of the stolen funds ended up in accounts located in the Philippines, while roughly $20 million, which has since been recovered, went to Sri Lanka. The robbers tried to steal $850 million more, but the requests were denied by the New York Fed. The stolen funds that ended up in the Philippines were discovered last March 9, after Rizal Commercial Banking Corporation (RCBC) said that a bulk of the laundered money was deposited in its Jupiter branch in Makati City. It was approximately $81 million, which is suspected to have come from the same source, managed to enter the local banking system but was released to local RCBC clients with an alleged help of the bank’s Jupiter branch manager. A number of big names are said to be involved who are mainly from 3 camps: Rizal Commercial Banking Corporation (RCBC), PhilRem Service Corporation, and the...

Words: 2522 - Pages: 11

Premium Essay

Positive & Negative Impact of Using Social Networking Sites on Youngsters

...Int. J. Human-Computer Studies 68 (2010) 719–728 www.elsevier.com/locate/ijhcs Cultural differences, experience with social networks and the nature of ‘‘true commitment’’ in Facebook Asimina Vasaloua,n, Adam N. Joinsona, Delphine Courvoisierb a School of Management, University of Bath, Bath BA2 7AY, UK Geneva University Hospitals 6, rue Perret-Gentil, 1211 Geneva 14, Switzerland b Received 9 January 2009; received in revised form 3 March 2010; accepted 2 June 2010 Communicated by S. Wiedenbeck Available online 9 June 2010 Abstract Formed on an analysis of design practices, the behaviour chain model stipulates that social network designer’s ultimate aim is to encourage users to adopt the social network site by entering a phase of true commitment. During this phase, social network users are driven to connect to known or unknown others by engaging in instrumental uses that create value and content and involve others, while staying active and loyal by investing time in the site. This paper investigates how designer’s intentions, as captured by the behaviour chain model, materialise through users’ reported practices in the social network site Facebook. A total of 423 Facebook users from 5 countries answered a questionnaire that allowed us to examine how 2 user characteristics, experience with the site, and culture, shape the nature of true commitment. Our findings show that experience with the site and even more so, culture, have an effect on users’ motivations...

Words: 8098 - Pages: 33

Premium Essay

Marketing

...MBA 2006-07 Hilary Term | Marketing, Culture and Society MARKETING, CULTURE and SOCIETY Linda Scott N.B. Please remember to check the Intranet for the most current version of this list. Library staff regularly updates hyperlinks, shelf locations and copy information. Course Aims and Objectives The purpose of this course is to prepare students to understand and act from a sophisticated cultural perspective when confronting issues involving markets and media. Readings, lectures, and discussions will show students how the circulation of goods (and the messages about goods) interact with social groupings, political agendas, other institutional imperatives, cultural tensions, and historical events. Recent research demonstrates quite clearly that such interactions have consistently been more determinative of both market failures and successes than the correct practice of traditional marketing techniques or the faithful application of conventional marketing wisdom. Given the rapid rate of change in today’s markets for goods and services, along with new channels for distribution and communication, this perspective should provide the basis for a more innovative way of practicing marketing, as well as a more globally responsible one. To these ends, a variety of texts have been assigned. These selections are designed to reorient the student toward more lasting, socially grounded, and culturally portable ideas about marketing, as well as to help each reader look at both the context...

Words: 3404 - Pages: 14

Premium Essay

Zara It for Fast Fashion

...FIT Analysis Opportunity – invest heavily in IT to update system and possibly gain functionality; 5 possibilities: 1. Upgrade POS to modern operating system 2. Build in-store networks 3. Build in-store inventory lookup capabilities 4. Build store-to-store inventory lookup capabilities 5. Build online shopping capabilities a. Customers 1. Internal – store managers; want an upgraded system to make ordering, store-to-store exchanges, and inventory easier 2. External – customers; fashion conscious, know Zara inventory turns over rapidly, want continued quickness to market, no significant price increases b. Costs – very low for current IT system, a new investment could cost as much as €43.8 million initially and nearly €340000 annually. See table 1 in Appendix. c. Competition – mainly Gap, H&M, & Benetton (see Table 2 in Appendix for financial comparison) d. Context – international brand with room to grow, particularly outside of Spain KSF – design/manufacture/deliver fashionable clothes quickly, maintain simplicity and low costs, push decisions out to front line workers Cash flows – More efficient system could reduce worker-hours needed in stores Strategy – Begin to develop POS application so that when DOS enabled systems are unavailable Zara will not be shut down People – this is a good mix of the right people; the fact that Salgado and Sanchez switch sides in the IT investment argument shows their wisdom and commitment to...

Words: 3122 - Pages: 13

Premium Essay

Indian Telecom Industry

...vipul rohit Indian Telecommunication Industry Last Updated: July-September 2008 [pic] The Indian telecommunications has been zooming up the growth curve at a feverish pace, emerging as one of the key sectors responsible for India's resurgent economic growth. India is has surpassed US to become the second largest wireless network in the world with a subscriber base of over 300 million in April, according to the the Telecom Regulatory Authority of India (Trai). The year 2007 saw India achieving significant distinctions: |1 |having the world's lowest call rates |2-3 US cents | |2 |the fastest growth in the number of subscribers |15.31 million in 4 months | |3 |the fastest sale of million mobile phones |in a week | |4 |the world's cheapest mobile handset |US$ 17.2 | |5 |the world's most affordable color phone |US$ 27.42 | |6 |largest sale of mobile handsets |in the third quarter | Segment-wise growth Wireless segment has emerged as...

Words: 5812 - Pages: 24

Premium Essay

Public-Key Encryption

...Public-key Encryption Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption and...

Words: 3473 - Pages: 14

Premium Essay

Public-Key Encryption

...Public-key Encryption David Burianek Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption and...

Words: 3477 - Pages: 14

Premium Essay

Deqwe

...requires coordinating numerous activities throughout the organization. A myriad of details must be considered in planning how to coordinate all these activities, in developing a realistic schedule, and then in monitoring the progress of the project. Fortunately, two closely related operations research techniques, PERT (program evaluation and review technique) and CPM (critical path method), are available to assist the project manager in carrying out these responsibilities. These techniques make heavy use of networks (as introduced in the preceding chapter) to help plan and display the coordination of all the activities. They also normally use a software package to deal with all the data needed to develop schedule information and then to monitor the progress of the project. Project management software, such as MS Project in your OR Courseware, now is widely available for these purposes. PERT and CPM have been used for a variety of projects, including the following types. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Construction of a new plant Research and development of a new product NASA space exploration projects Movie productions Building a ship Government-sponsored projects for developing a new weapons system Relocation of a major facility Maintenance of a nuclear reactor Installation of a management information system Conducting an advertising campaign PERT and CPM were independently developed in the late 1950s. Ever since, they have been among the most widely used OR techniques. The original...

Words: 27582 - Pages: 111