Objectives In this Capstone Project activity, you will demonstrate your ability to: Design and implement an IPv4 VLSM addressing scheme that fulfills the requirements Design and implement an IPv6 VLSM addressing scheme that fulfills the requirements Design, configure, verify, and secure EIGRP for the necessary networks Design, configure and verify Link Aggregation, RapidPVST+, FHRP, Port Fast, Edge Ports Create detailed design documentation for your proposed network Implement an operational network based on your network design Explain your implementation and demonstrate its operation Produce documentation of your testing and network configuration for use by others to maintain and expand the network. Scenario You are a network engineering specialist at a consulting firmy.
1) Advertise directly connected networks (IPv4 & IPv6) using the wildcard mask.
2) Disable automatic summarization.
3) Disable routing updates where appropriate.
4) Modify the EIGRP hello-timers.
5) Modify the bandwidth of the interfaces.
6) Require EIGRP authentication on all routers. (Bonus)
7) Configure accurate link speeds as outlined in the network design. Implement load balancing where appropriate as outlined in the design. Configure network security to the client requirements
1) Configure all passwords as encrypted.
2) Require a username and password for all login.
3) Restrict access to the console connection.
4) Restrict access to the VTY connections.
a) Allow SSHv2 connections only. (Use the company domain acme.com)
b) Allow connections originating only from the Head offices network.
5) Disable AUX port access.
6) Configure a banner warning.
7) Close all switch ports not in use. (For this assignments, Ports 22 - 24 are not to be used)
8) Register the first two MAC address learnt per open switch port. Attempts by other devices to use the open switch port must be logged and violations counted but the port should not stop functioning. Verify the network.
1) Validate connectivity between all networks and devices.
2) Validate dynamic routing functionality through routing tables and traceroutes. Use at least five commands to verify dynamic routing configuration.
3) Verify all security restrictions have been correctly implemented.