Friday, May 22, 2020

Edgar Allan Poe Essay examples - 692 Words

Short Stories + Terror = Poe American Romanticism brought a new era to America and American literature. Within literature of the Romanticism era came the development of the gothic novel. Edger Allen Poe is one of the well-known gothic authors which arose from this era. Throughout Poe’s career he wrote many short stories following one theory which he created - that every aspect of a short story should lead to one single effect. For Poe many of his stories have the single effect of terror. In Poe’s story â€Å"The Fall of the House of Usher† he creates the single effect of terror through his description of the house, the entombment of Madeline, and Madeline’s appearance at the end of the story. At the beginning of the story, the narrator†¦show more content†¦Instead of burring her in the family cemetery far away from the house Roderick, Madeline’s brother decides to burry her beneath the house( 752). As the narrator describes, Madeline is pl aced in a vault which is â€Å"small, damp, and entirely without means of admission for light†(Poe 272). After Madeline is placed in the vault the lid of her coffin is â€Å"replaced and screwed down† and the iron door to the vault is secured. Madeline is now screwed alive into a coffin and locked into a dark vault. The mere thought of Madeline’s entombment should evoke terror into any reader. Finley Madeline’s appearance at the end of the story is the last and most crucial part in creating the story’s terror. Roderick and the narrator along with the reader have now assumed that Madeline is dead. While the narrator is reading to Roderick, he begins to hear noises that coincidently coincide with the actions in the story he is reading. The story is about to reach its climax when the narrator finds Roderick sitting in front of the room door mumbling. Before the narrator can figure out what Roderick is saying the bedroom door abruptly opens and Madel ine appears in her white robes bloodied by her struggle, falling upon her brother to bring both of them to their deaths(Carpenter 753). In retrospect Poe creates a masterful terror in â€Å"The Fall of the House of Usher† through his description of the house, Madeline’s entombment and the crucialShow MoreRelatedEdgar Allan Poe721 Words   |  3 PagesEdgar Allan Poe Edgar Allen Poe, born is 1809, was an American short story writer, poet, and critic. He is commonly know as the father of detective stories. His most well know work of art is his poem The Raven (Werlock). Although Poe had a short lived career, his literature continues to influence many writers in the United States and Europe. He worked with many genres such as: gothic tale, science fiction, occult fantasies, and satire. While many critics consider his works of literature as grotesqueRead MoreEdgar Allan Poe792 Words   |  4 Pagesauthor, Edgar Allan Poe, on Sunday October 7, 1849. In Massachusetts on the 19th day of January in the year 1809, Edgar Poe was born to actress Elizabeth Arnold Hopkins Poe and actor David Poe Junior, making him an older brother to Rosalie Poe, and a younger one to William Henry Leonard Poe. Poe may, perchance, have been named after a character in the play that his parents were performing that year. He was never formally adopted, however, Edgar Poe was r enamed Edgar Allan Poe when the John Allan familyRead MoreEdgar Allan Poe1245 Words   |  5 Pagesbe discussing about my poet Edgar Allan Poe. Poe had written numerous of poems and stories but the one I chose was â€Å"Annabel Lee†. This poem was written in 1849 which was a long time ago. Even though this poem is centuries old, it is still a well known poem. This whole project includes a biography, literary movement, and a explication about the poem. The biography includes where Poe grew up and how his lifestyle were. Through research and sources, I found out that Poe lived a hard life. He was inRead MoreThe Rise Of Poe By Edgar Allan Poe1635 Words   |  7 PagesThe Rise of Poe The words people use and how they use them holds so much power within themselves. It seems that, people are always searching for the right words to express their true emotions towards a certain subject. Artists and authors manage to make a living off of knowing how to use the right words to reach through to their platform. Though within his time, Edgar Allan Poe did not have an established platform and was seen as estranged; he still dabbled as an author and has made many famous shortRead More Edgar Allan Poe Essay515 Words   |  3 Pages Edgar Allan Poe nbsp;nbsp;nbsp;nbsp;nbsp;Edgar Allan Poe, the first master of the short story, had written many short stories from mysteries to morbidity. Edgar was born on January 19,1809 in Boston, Massachussettes. Edgars Parents, David and Eliza, were both in the acting business. Poe also had a sister, who is rarely spoken of. When Edgar was young his father fleed from the family, leaving Edgar, his mother, and sister alone. At the age of two Edgars mother died of tuberculosis. Edgar wasRead MoreDeath By Edgar Allan Poe975 Words   |  4 Pagesabout the topic, and the fear of not knowing this leads it to be a taboo subject in many discussions. Edgar Allan Poe defied this sense of taboo and wrote many works centering on the topic of death. It is Edgar Allan Poe’s discussion of death in his works that reveals the innate human perversion of the discussion of death. The reason for his discussion of death may find roots in his personal life. Poe was born into a traveling family in 1809 and had two other siblings. His parents tragically lost theirRead MoreThe Biography Of Edgar Allan Poe841 Words   |  4 PagesThe Biography of Edgar Allan Poe â€Å"Lord, help my poor soul†, the last and final words of the amazing writer, Edgar Allan Poe, before his sudden death in 1849. Edgar Allan Poe wrote dark and treacherous stories and poems that often lead to the questioning of his mental state. Poe lived a rather difficult life in which writing was his escape. He at one time was in so much debt that he could have never payed it back even if his career took off. No one ever knew what had happened to Poe, only that heRead More Edgar Allan Poe Essay1589 Words   |  7 Pages Edgar Allen Poe Edgar Allan Poe Edgar Allen Poe’s contributions to American literature have become increasingly more prominent as the years have passed. As short fiction has become a more accepted genre in literary circles, Poe’s theories are studied with more passion. Although he lived a rather melancholy life, Poe did experience moments of joy, and desired to capture the beauty through poetic form. Indeed, what he left behind for the literary world was his gifted genus, revealed throughRead MoreEdgar Allan Poe Essay1575 Words   |  7 PagesEdgar Allan Poe Edgar Allan Poe was a bizarre and often scary writer. People throughout history have often wondered why his writings were so fantastically different and unusual. They were not the result of a diseased mind, as some think. Rather they came from a tense and miserable life. Edgar Allan Poe was not a happy man. He was a victim of fate from the moment he was born to his death only forty years later. He died alone and unappreciated. It is quite obvious that his life affected hisRead MoreEdgar Allan Poe Essay812 Words   |  4 PagesEdgar Allan Poe Edgar Allan Poe was one of Americas famous poets, fiction short-story writers, and literary critics. He is known as the first master of short story form especially in tales of horror, and mystery. The work he produced was considered to be some of the most influential literary criticism of his time. His poems made him one of the most famous figures in American literary history. His influence on literature is seen in all literature books in schools everywhere. Some of his famous

Sunday, May 10, 2020

Schizophreni A Mental Disorder - 904 Words

Schizophrenia is a chronic mental illness that affects approximately 1% of people around the world, and more than two million citizens in the U.S. alone (Dryden-Edwards). This illness is seen to affect men more often than woman. Schizophrenia is one of many psychotic mental disorders and usually presents with symptoms including behavior, thought, and social issues. Many people would describe schizophrenia more simply as a mental disorder that is characterized by abnormal social behavior which leaves the sufferer with a hard time differentiating things that are real from things that are hallucinations. There are five different types of schizophrenia that are all categorized differently due to the different symptoms the person experiences. The five different types of schizophrenia are: Paranoid schizophrenia, Disorganized schizophrenia, Catatonic schizophrenia, Undifferentiated schizophrenia, and Residual schizophrenia. Though all different types of schizophrenia have unique symptoms, Undifferentiated schizophrenia contains all of the symptoms from every type of schizophrenia put together. Before people put a name to this illness is was deemed a separate mental illness by Emile Kraepelin, a German physician, in 1887. Rather than schizophrenia, Dr. Kraepelin referred to this mental disorder as â€Å"dementia praecox and manic depression†. Though there was not a specific name for this illness recorded symptoms similar to those of schizophrenia can be traced as far back as 2000Show MoreRelatedSchizophreni A Mental Disorder1048 Words   |  5 Pages Schizophrenia is in a mental disorder classification on its own. Schizophrenia is said to possibly date as far back as Egyptian times. Although it may date back to ancient times, the first belief was that the person was possessed by a demon or was being punished for not obeying the God’s wishes. Schizophrenia has not always had that name. The term used before Eugene Bleuber renamed it was called dementia praecox. Arnold Pick was actually the first one to name the disorder dementia praecox but wasRead MoreSchizophreni A Mental Disorder Essay1427 Words   |  6 PagesIntroduction Schizophrenia is a mental disorder that often appears in someone’s early adulthood stage, but it can emerge at any point of time in life. This disorder affects the brain and is considered as psychosis, which is a type of mental illness that makes people with it unable to differentiate between reality and imagination. The first person to identify schizophrenia as a mental illness was German physician Dr. Emile Kraepelin in 1887 and categorized it as dementia that occurs early in lifeRead MoreSchizophreni A Mental Disorder Essay1278 Words   |  6 PagesSchizophrenia is a mental disorder that takes over a patient’s body and mind. Schizophrenia’s causes and mechanisms remain poorly understood, and the most common treatments do little to restore patients health (Kurtz 7). Schizophrenia affects the person’s brain and ability on to think and function. People with Schizophrenia have voices inside their heads telling them to do things they don t want to. People with schizophrenia are not eligible to control the things they do or say. Schizophrenia isRead MoreSchizophreni A Distinct Mental Disorder862 Words   |  4 PagesSchizophrenia Deemed as the disorder with no preference, schizophrenia has followed mankind since the times of Ancient Egypt (2000, Okasha) under the broad term of â€Å"madness† yet it was not officially recognized until 1887 when Dr. Emile Kraepelin issued it a distinct mental disorder (2012, Burton). Widely thought to be a split personality disorder, it has in fact nothing to do with multiple personality conditions but instead, schizophrenia is an extreme thought disorder that causes disconnected thoughtsRead MoreSchizophreni A Severe Mental Disorder2078 Words   |  9 PagesDefinition Schizophrenia is a severe mental disorder characterized by some, but not necessarily all, of the following features: emotional blunting, intellectual deterioration, social isolation, disorganized speech, behavior delusions, and hallucinations. Delusions are beliefs that are not true, like people are trying to hurt them, believing other people can read their mind, or they have special abilities or powers. Hallucinations are hearing voices that are not there. People with schizophrenia mayRead MoreSchizophreni A Severe Mental Disorder2469 Words   |  10 PagesDefinition Schizophrenia is a severe mental disorder characterized by some, but not necessarily all, of the following features: emotional blunting, intellectual deterioration, social isolation, disorganized speech, behavior delusions, and hallucinations. Delusions are beliefs that are not true, like people are trying to hurt them, believing other people can read their mind, or they have special abilities or powers. Hallucinations are hearing voices that are not there. People with schizophreniaRead MoreSchizophreni A Severe And Disabling Mental Disorder924 Words   |  4 PagesSchizophrenia is a severe and disabling mental disorder, affecting approximately one percent of the world s adult population. Researcher say there are several of causes for this disorder, for instance genetics, substance use, or even the environment. As research began we found that, â€Å"schizophrenia can occur at any age, the average age begin in the late teens to the early 20s for men, and the late 20s to early 30s f or women† (NAMI). As said this disorder can go both ways with either women or men

Wednesday, May 6, 2020

M11Cde Skills-Based Assessment Free Essays

string(39) " be responsible for an entire network\." School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. We will write a custom essay sample on M11Cde Skills-Based Assessment or any similar topic only for you Order Now Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submission will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. You read "M11Cde Skills-Based Assessment" in category "Essay examples" This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |19 2. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-hal f of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs cor rect but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip add ress shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

M11Cde Skills-Based Assessment Free Essays

string(39) " be responsible for an entire network\." School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. We will write a custom essay sample on M11Cde Skills-Based Assessment or any similar topic only for you Order Now Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submission will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. You read "M11Cde Skills-Based Assessment" in category "Essay examples" This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |19 2. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-hal f of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs cor rect but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip add ress shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)