Free Essay

Network Implementation

In: Computers and Technology

Submitted By marysol63
Words 2004
Pages 9
| | | | |

| | | | |

Network Implementation Plan
Network Implementation Plan

Table of Contents Implementing IPv6 3
Great Clips: Implementing a Network Plan
Configuring IPv6 on a Juniper Router Network Infrastructure Design 6
Installing Ubuntu on Virtual Box Linux Networking 9
Linux Network Commands Analyzing Network Traffic 14
Network Sniffer Applications: Compare and Contrast
Installing Wireshark: Running a TCP Packet Trace Network Security 16
Access Control Lists (ACL)
ACL Command Examples
To configure an ACL on a router
To configure an ACL on a switch References 18

Implementing IPv6
Great Clips: Implementing a Network Plan

Great Clips is a hair salon franchise through the United States and Canada. The first salon opened in 1982 and the first franchise opened in 1983 both in the state of Minnesota. In 1988, there were 150 franchises and by 2014, there are now well over 3000. Because of this tremendous growth, I have selected this company for which I will implement a network plan that will support seamless sharing and connection between various company locations.

The routing protocols for IPv6 are similar to IPv4 but have been adjusted accordingly. There are two forms of routing protocols, Distance Vector routing and Link-State routing protocols. Distance Vector rules consider distance between nodes and the number of hops data must travel through before it reaches its destination. Distance Vector protocols require very little configuration and are popular among small to midsize organizations. Common Distance Vector protocols are Routing Information Protocol (RIP) and Boarder Gateway Protocol (BGP) which is the standard routing protocol used for the internet. RIP includes authentication to verify source, it needs a network address and number of hops (max of 15 hops) and is very automatic. BGP is used by all ISPs, is very flexible, allows for internal and external and allows multiple links to the same network.

Link-State routing protocols govern how information is passed between routers by determining the best paths of available connections. Routing protocols in this category include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). OSPF will govern that data will follow the shortest, the most cost-effective and reliable path. This protocol is typically used on large networks and can be grouped logically into areas. ISIS is not as popular as OSPF but is typically implemented in large scale networks such as ISPs.

Configuring IPv6 on a Juniper Router

You configure IPv6 on a Juniper Network router much like you do with IPv4. For router interfaces to support IPv6, they must be configured to specific properties, types and addresses. Interface family type inet6 and logical interface protocol families must be configured as well. Below is an example of the steps to configure IPv6 on a Juniper Network.

2001:db8::1/128 2001:db8::5/128

A E 2001:db8:0:1::/64

Log into your device running Junos OS and the CLI

Step 1: Enter configuration mode
Upon logging in, you will be in operation mode: “user@host>”
You must get into configuration mode by enter “configure” “user@host> configure”
This changes to “user@host#” when place in configuration mode.

Step 2: Edit interfaces
“[edit interfaces ] Fe-1/2/0 unit 1 description to –E
Fe1/2/0 unit 1 family inet6 address
2001:db8:0:1:2a0:a502:0:1da/64
Unit 1 family inet6 address 2001:db8::1/128 primary
2001:db7::2/128
2001:db87::3/128
Device A
[edit routing-options]
Set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces] user@host# commit
Device E
Fe-1/2/0 unit 25 description to –A
Fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
2001:db8::5/128
[edit routing-options]
Set routing-options rib inet6.0 static route ::/0 next-hop
2001:db8:0:1:2a0:a502:0:1da
[edit] user@host# commit” (Configuring IPv6 Static Routes, 2012)

Network Infrastructure Design
Installing Ubuntu on Virtual Box

Linux Networking
Linux Network Commands

The ifconfig command is a system admin tool used for network interface configuration. Using this command, a report is generated listing all running and recognized network interfaces on the system. Also listed are configurations such as IP addresses, net masks, broadcast addresses, gateway and the status of the loopback.
The ifconfig command can be used to troubleshoot networking issues by allowing a view of all network settings, all network interfaces, enabling and disabling network interfaces, assigning IP addresses and net masks among other capabilities.
Examples:
ifconfig –a: displays all information for active and inactive interfaces on the network ifconfig eth0 netmask : allows admin to define a net mask for a specific interface ifconfig eth0 broadcast: allows admin to set certain broadcast address for a specific interface ifdown and ifup are additional troubleshooting commands used for interface configurations allowing the administrator to shutdown or bring back online a specific interface. This is extremely helpful in the event of a malicious attack.
The nslookup command is a query command used to find information about a named domain. Running this command will provide the IP address for a specific domain name. This search can also be reversed, using the IP address to search for the domain name. This command is helpful when troubleshooting DNS servers.
Example:
Nslookup www.google.com
The ping command is a basic command that lets the administrator test for network connectivity. Using the ping command, the administrator can send a test packet of data to a certain host on a network in an attempt to get a reply and to determine how long it takes for the data to be exchanged.
Example:
Ping 192.168.1.122
The File Transfer Protocol is a program allowing users to transfer data to and from remote network sites. It is the fastest and most easy way to send files from your machine to another machine.
The Domain Name System is used on Linux to resolve computer IP addresses into readable host names. Users would never be able to remember computer IP addresses; however they have an easier time remember names such as Google. It can also do the reverse and convert a name into an IP. This is important because the IP address is used to route information, not the readable name.
The SSH application on Linux is used for logging into a machine remotely for administration and work through secure encrypted communication channels.

Analyzing Network Traffic
Network Sniffer Applications: Compare and Contrast
A program that works to intercept, track and log traffic over an interface is known as a network analyzer or sniffer. The sniffer captures the packets of data streaming through the network and decodes the data being sent. These tools can be very helpful for troubleshooting network problems, detecting network intrusions and misuse, monitoring utilizations and debugging along with other additional capabilities. A sniffer would be very helpful in a scenario where a user suspects computer attacks against their network firewall. Using a sniffer, the user could analyze the data packets being sent to the network to determine if they are legit or not. There are quite a handful of different applications and software sniffer tools available in the marketplace today. Let’s look at just two of them, Cain and Abel and Wireshark.
Cain and Abel is a graphical user interface (GUI), created by Massimiliano Montoro and Wireshark, formually Ethereal, is both a command-line interface and GUI both provided free for downloading but whereas Cain and Abel is a freeware, usually with restrictions, Wireshark is a General Public License freeware allowing more freedom. Cain and Abel works on Windows operating systems only and Wireshark works on Windows, OS, Linux, BSDs, Solaris, AIX, HP-UX, IRIX, Tru64 and UNIX. Cain and Abel, a well documented tool, has the ability to analyze routing protocols, recover, decode and/or crack encrypted passwords and record VoIP conversations. Wireshark has the ability to capture packets live and/or read in a file of previously captured packets. Additionally, the interactive interface allows the user to dig deep into the details of the packet as well as reconstruct the flow of a TCP session. I think based upon the research findings comparing and contrasting these two tools, I think the vast versatility that comes with Wireshark makes it a better tool than that of Cain and Abel.
Installing Wireshark: Running a TCP Packet Trace

Network Security
Access Control Lists (ACL)
Access Control Lists (ACL) are the rules governing the flow of traffic on the network by specifying which traffic is allowed to flow in and/or which traffic is allowed to flow out. The rules are set regarding different traffic attributes found in the data packets such as source and destination IP addresses and MAC addresses, port information and protocols. When a data packet is received, the attributes are thoroughly scanned and compared against the ACL, looking for rules that will either allow or prohibit the packet to enter the network. Because of this, ACLs are able to provide a fundamental level of network security by blocking unauthorized traffic and restricting data.
ACLs are created using commands or statements that specify which attributes are permitted and which ones are denied. The attributes are specified in the order in which the list should appear in the ACL using a top-down approach since the ACL reviews the packets from top to bottom. ACLs are applied to interfaces, so you can have an ACL for the outbound interface and/or for the inbound interface. ACLs can be standard, extended or named. Standard ACLs match source addresses, extended ACLs can include additional information such as ports, TCP and UDP information and named ACLs use specified names and numbered lines.
For example: ACL 180
Config access-list 180 permit tcp 192.167.77.0.0.0.0.255 192.167.77.3.0.0.0.0
TCP packet to 192.167.78.1 will be rejected because it is not within the specificed range of the ACL.
TCP packet to 192.167.77.2 will be accepted because it is within the specified range of the ACL.
ACL Command Examples
There are many commands that can be used for ACL implementations. Such commands are:
Config access-list permit
Config access-list deny
Config clear access-list
Config show access-list

To configure an ACL on a router
Example: deny traffic from 192.167.77.3.0.0.0.0
Open the router terminal
En
Conf t
#access-list
<1-99 for standard list>
#access-list 50
#access list 50 de
#access list 50 deny 192.167.77.3.0.0.0.0
To configure an ACL on a switch
Example: permit traffic from 192.167.77.3.0.0.0.0
Open Command prompt
En
Switch#conf t
Switch#(config)#access-list 50
Switch#(config)#access-list 50 permit 192.167.77.3.0.0.0.0

References
Beasley, J. S., & Nilkaew, P. (2013). A Practical Guide to Advanced Networking. Pearson IT Certification.
Cain and Abel (software). (2014, 09 27). Retrieved 12 15, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Cain_and_Abel_%28software%29
Configuring IPv6 Static Routes. (2012, 08 10). Retrieved 11 24, 2014, from Juniper: https://www.juniper.net/documentation/en_US/junos12.1/topics/example/policy-ipv6-static-routes.html
How to install Ubuntu 14.4 LTS on Virtubal box. (2014, 05 14). Retrieved 12 02, 2014, from YouTube: https://www.youtube.com/watch?v=QkJmahizwO4
Methods of Network Access Security. (n.d.). Retrieved 12 22, 2014, from Exam Collection: http://www.examcollection.com/certification-training/methods-of-network-access-security.html
SecTools.Org: Top 125 Network Security Tools. (n.d.). Retrieved 12 15, 2014, from SecTools: http://sectools.org/tag/sniffers/
Wilson, T. (2012, 05 16). Securing Networks: Access Control LIsts (ACL). Retrieved 12 22, 2014, from Pluralsight Blog: http://blog.pluralsight.com/access-control-list-concepts
Wireshark. (2014, 12 1). Retrieved 12 15, 2014, from Wikepedia: http://en.wikipedia.org/wiki/Wireshark

Similar Documents

Premium Essay

Voip Network Service Implementation

...In carrier networks VoIP has been mainly deployed in enterprise networks or as a trunking technology to reduce transport costs in voice backbone networks. In order to deploy a VoIP network that is capable of providing a PSTN scale solution the following issues must be addressed: What services need to be offered, for example full PSTN equivalence, a more restricted? “cheap second line” service, or a simple user-to-user voice service. Voip focus on a service set that provides full PSTN equivalence – what we are...

Words: 2981 - Pages: 12

Free Essay

Implementation and Analysis of a Wide Area Network

...Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO......................................................................Page 9 3.1 TECHNICAL ANALYSIS.........................................................................................Page 9 3.2 DISCUSSIONS.........................................................................................................Page 13 3.3 ESTIMATED COST.................................................................................................Page 13...

Words: 1948 - Pages: 8

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021 International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment....

Words: 4335 - Pages: 18

Free Essay

On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks

...On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks A B.Tech Project Report submitted in fulfilment of the requirements for the Degree of Bachelor of Technology Submitted by K Bharadwaj Sharma 07010219 M Krishna Chaitanya 07010228 Under the Guidance of Dr.Ratnajit Bhattacharjee Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati Guwahati-781039, Assam i Candidate’s Declaration I hereby declare that the work which is being reported in this thesis entitled “ On Implementation of Elliptic Curve Cryptography and self-certified public key cryptosystems in Wireless Mesh Networks “ in partial fulfilment of the requirements for the award of the Degree of Bachelor of Technology, submitted in the Department of Electronics and Communication Engineering, Indian Institute of Technology Guwahati, is a record of my own work carried out during my thesis work under the supervision of Dr.Ratnajit Bhattacharjee, Associate Professor, Department of EEE, IIT Guwahati. The matter entitled in this thesis has not been submitted elsewhere for the award of any other degree. Place: Guwahati Date: 21st April, 2011 This is to certify that the above statement made by the candidate is correct to the best of my knowledge. April,2011 IIT Guwahati ` Supervisor: Dr....

Words: 7761 - Pages: 32

Premium Essay

Business Management

...3.2 Guiding Principles Guiding Principles Guiding Principles Guiding Principles Guiding Principles To achieve the development objectives, tTo achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, tTo achieve the development objectives, tTo achieve the development objectives, tTo achieve the development objectives, t To achieve the development objectives, tTo achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, tTo achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, tTo achieve the development objectives, t To achieve the development objectives, t To achieve the development objectives, implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he implementation framework he......

Words: 1457 - Pages: 6

Premium Essay

Test

...In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 25% 1.0 1.1 1.2 1.3 1.4 1.5 1.6 25% 2.0 2.1 2.2 2.3 2.4 2.5 2.6 5% 3.0 3.1 3.2 3.3 3.4 3.5 3.6 Implement an EIGRP Based Solution, Given a Network Design and a Set of Requirements Determine network resources needed for implementing EIGRP on a network Create an EIGRP implementation plan Create an EIGRP verification plan Configure EIGRP routing Verify EIGRP solution was implemented properly using show and debug commands Document results of EIGRP implementation and verification Implement a Multi-Area OSPF Network, Given a Network Design and a Set of Requirements Determine network resources needed for implementing OSPF on a network Create an OSPF implementation plan Create an OSPF verification plan Configure OSPF routing Verify OSPF solution was implemented properly using show and debug commands Document results of OSPF implementation and verification plan...

Words: 659 - Pages: 3

Free Essay

Khjkh

...Qualification Highlights ▪Cisco Certified Network Associate ▪Project Planning and Execution ▪Large Scale Network Engineering and Management ▪Network Analysis and Support Professional...

Words: 1029 - Pages: 5

Premium Essay

Week 5 Inf 325

...They reflect the degree of urgency, innovation, complexity and/or sensitivity associated with the particular policy measure, and provides sufficient detail to support and inform successful implementation. One of the most important effects of the division between policy-making and implementation is the possibility for policy makers to avoid responsibility. ‘The dichotomy between policy-making and implementation is dangerous. That is because it separates the ‘decision’ from the ‘implementation’ and thus opens up ‘escape hatches’ through...

Words: 1375 - Pages: 6

Free Essay

Ntc 411 Week 5 Individual Security Solutions

...CompTIA Network+ 2012: Network Security Part 3. Complete the Security Solutions Model module in Skillport. Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your boss also wants to know what hardware or software should be procured for intrusion detection. Write a 2- to 3-page business report describing the hardware and/or software you believe should be considered for implementation. Include your reasoning for why the described hardware and/or software should be procured and implemented. Address the following questions raised by your boss: Does a properly installed and maintained firewall provide adequate defense against intrusion? What is an IPS and do we need one in an ecommerce network? Do we need a group of network personnel to monitor the ecommerce network for intrusions 24/7? Will any of this hardware or software facilitate a real-time response to an intrusion? Format your business report consistent with APA guidelines. NTC 411 Week 5 Individual Security Solutions Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/ntc-411-week-5-individual-security-solutions/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar...

Words: 5062 - Pages: 21

Premium Essay

Planning a Network

...Only when these first two steps are followed in this order will you succeed in designing a network that best suits the customer and the specific needs of their business. The third step is assessing the current network infrastructure. Information is collected and then reviewed for trends, problems and issues that are negatively affecting the present network. "This information is then utilized for making effective strategy recommendations and design proposals to the client...

Words: 669 - Pages: 3

Premium Essay

It190

...IT190-02 Key Assignment Tarris Walls CTUO IT190-2 Introduction to IT Professor Vandercreek June 22, 2015 Table of Contents Section 1: Information Systems Overview 3 Section 2: Information Systems Concepts 6 Section 3: Business Information Systems 9 Section 4: System Development 12 Section 5: Information Systems and Society 13 References 14 Section 1: Information Systems Overview The organization I would like to use in this project, is my own organization. Currently my organization is a tier 2 wireless service provide, serving the Mississippi, Memphis, and Sun Coast’s markets. Along with wireless voice and data services, my organization also provides fiber to home services, which include data, voice, and video services and business class services throughout the markets in operates in. In addition to the above services, my organization also just completed construction on the regions first Tier3 Plus data center, opening its portfolio up to a number of hosted solutions. A service provider like the organization I work for has to take a unique approach in the selection of its information systems (IS). Because my organizations operations span from customer facing store fronts, to large data center operations, the selection of a single information processing solution is almost impossible. We utilize many different information processing solutions often tied into each other, and dependent on each other to accomplish my organizations goals. We......

Words: 3232 - Pages: 13

Free Essay

Wireless

...Coursework Assignment Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is located on a single campus called Campus A. Students and staff use the network services from hosts on various different user networks, as shown in Figure 1 . Due to an increasing number of security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to propose security enhancements, and produce a report. The aim of the exercise is to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design should tackle the following components:  Provide best practice network egress and ingress filtering at the network perimeter.  Create a perimeter firewall, with an appropriate topology to provide the organisations services, including public web, and mail servers. The firewall should have a closed security stance, and provide public services in a secure way.  Provide secure access to all devices, from the security management subnet. Additionally, research should be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against these using network defenses. This part of the coursework will be research only and be confined to a part of the Research Section....

Words: 607 - Pages: 3

Free Essay

Joe's Yacht's

...NW 421 Curtis Cooper 9/29/2012 Joe’s Yachts Network Design Proposal By High-Power Consultants NW 421 Curtis Cooper 9/29/2012 Joe’s Yachts Network Design Proposal By High-Power Consultants Contents Executive Summary 2 Company Overview 3 Evaluation of Existing Network Infrastructure 3 Requirements Review 5 Proposed Network Design 6 Network Diagrams and Addressing Schemes 7 Diagram 1: Joe’s Yachts WAN 8 Diagram 2: Joe’s Yachts Main Office and Branch-Office LAN 8 Table 1: Addressing Scheme 9 Cost Breakdown & Implementation 10 References 11 Executive Summary Joe’s Yachts is a seller of high-end and custom yachts, based out of Myrtle Beach, South Carolina, with 15 locations across four states in the south-eastern coastal area. The company means to upgrade its network design and components to improve network capacity, provide wireless services at their stores, offer more robust security services, and implement store-to-store VoIP services to replace the existing traditional phone service. The “Evaluation of Existing Network Infrastructure” section of this document details the current network employed by Joe’s Yachts and explains its weaknesses in terms of data rate and capacity, security features and functionality. The next section “Requirements Review” goes over the technical and business goals identified for Joe’s Yachts network infrastructure design upgrade....

Words: 2092 - Pages: 9

Free Essay

A Walk in the It Director’s Shoes

...Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that threats from inside the company is far more dangerous than attacks from outside. These facts shows that any company must plan an implement policies to defend their network security from inside and outside intruders. These companies must find how intruders attack in order to protect their information assets. This will help make their network security more effective in blocking threats either from outside or inside the company. Within my paper I will discuss that I am the Information Technology (IT) Director for a small, growing firm and my tasked would be to develop an electronic resource security policy to deploy within my organization. I will discuss the differences between the terms implementation and policy and describe the importance of their separation. Then develop an outline of a security policy which addresses areas that are identified as problems....

Words: 1183 - Pages: 5

Free Essay

Proj Mgmt

...We recommend the implementation of a phased implementation of the SANS Top 20 Controls over the next several months; first focusing on identifying and removing any existing malware, followed by the implementation of a robust incident...

Words: 3167 - Pages: 13