Planning, Development and Testing Internetwork Design
✅ Paper Type: Free Essay | ✅ Subject: Computer Science |
✅ Wordcount: 9359 words | ✅ Published: 8th Feb 2020 |
Table of Contents
Contents
Technical Information Existing & Recommendations
Open Shortest Path First (OSPF)
Enhanced interior gateway routing protocol (EIGRP)
https://www.techopedia.com/definition/26152/vlan-trunking-protocol-vtp
Aims of the Project
This project will analyse, investigate, develop and test a new internetwork for Langburgh between their Glasgow, Birmingham and Cardiff offices. The project will make recommendations on a new IT infrastructure that will make the current structure more efficient, reliable secure and scalable for the future. Regular meetings will be held with the Managing Director to ensure the aims of the project keep in line with the objectives of the company.
Problem Analysis
Internetworking Design Basics
This report will outline the process of the planning, development and testing of the proposed internetwork design between Lanburgh’s Glasgow, Cardiff and Birmingham’s Offices with proposed upgrades.
Designing an internetwork can be a challenging task. An internetwork that consists of only 50 meshed routing nodes can pose complex problems that lead to unpredictable results. Attempting to optimize internetworks that feature thousands of nodes can pose even more complex problems.
This report provides an overview of planning and design guidelines. The report will be divided into three main areas
- Determining Requirements
- Identifying and Selecting Capabilities
- Choosing Reliability, Efficiency, Scalability& Security Options
Requirements & Solutions
WAN requirements:
- Appropriate routing equipment at each company site to interconnect branches Cisco 1290 Routers
- Application of purchased IP address block Layer 3 Subnetted Addressing scheme
- Use of static / dynamic routing
- Appropriate redundancy HSRP
- Method of secure data transfer between Cardiff and Glasgow VPN Tunnelling
- Dedicated 1GB Cardiff/Birmingham connection Static Route
General LAN requirements:
- Logically layered converged switched network with appropriate management and redundancy facilities HSRP Hot Standby Router protocol
- Suitable, efficient RFC 1918 IPv4 address scheme to support users with appropriate growth accommodated IPv4 Sub netted Address Scheme
- Efficient allocation of IP configuration Ipv4 Address Scheme
- Capability for network devices to be securely managed and configuration to be backed up Cisco Server
- Ensure end device security Anti-Virus Software & Upgrade to Windows 10
- Physical security Locked Cupboards Off Site Back up to cloud
Glasgow LAN requirements:
- On-site hosting of the company email and web servers Cisco Server
- Address translation mechanism for internal hosts accessing services outside of the network Cisco Switches
Cardiff LAN requirements:
- Capability for employees to connect wirelessly to company LAN as required Cisco Wireless Routers
- Appropriate fault tolerance on network devices HSRP
Birmingham LAN requirements:
- Appropriate security to filter traffic allowing only students access to the email server on Glasgow campus Extended ACL
- Appropriate security to filter traffic allowing only teaching staff access to the web server (intranet) on Glasgow campus Extended ACL
- Implement IPv6 on 2 sample clients in an isolated test LAN ensuring layer 3 connectivity with IPV6 network egress point IPv6 Address Scheme
Routers, switches and other internetworking devices must reflect the goals, of the organizations in which they operate. For this purpose, all devices will come from Cisco. Cisco has a proven track record of reliability and efficiency and offer a lot of support and training for their devices
Two goals drive networking design and implementation:
- Application availability Applications must be easily and readily available to the end users for a network to perform reliably and efficiently.
- Costs Budgets play a big part in designing a good network
Non-functional requirements describe how the system works, while functional requirements describe what the system should do.
Non- Functional Requirements
- Business Rules
- Transaction corrections, adjustments and cancellations
- Administrative functions
- Authentication
- Authorization levels
- Certification Requirements
- Legal or Regulatory Requirements
- Training
Functional Requirements
- Performance – for example Response Time, Throughput, Utilization, Static Volumetric
- Scalability
- Capacity
- Availability
- Reliability
- Recoverability
- Serviceability
- Security
- Manageability
- Data Integrity
- Usability
Constraints
These constraints include money, labour, technology, space, and time. Economic constraints play a major role in any network design
Figure 1 General Network Design Process
Below is a network design process that investigates, analysing, produces a plan and then tests the plan until all your requirements are met’
Assessing User Requirements
Users primarily want their applications available in a quick response time and it to be reliable. Response time it the time a user asked the device to perform a function and how long it takes to complete the function.
Lanburgh’s user requirements will be assessed in several ways.
User community profiles outlining what different user groups require. This is the first step in determining internetwork requirements. Faculty Staff will require more restricted access than students and finance will require more detailed information. Proper steps will be taken to ensure the confidentiality of each of these needs by a number of ways.
Assessing Costs
A list of costs associated with internetworks include
- Router hardware and software costs These can be expensive to buy or upgrade but are one of the most important part of the network system
- Performance trade-off costs This is selecting what equipment you really need and can afford
- Installation costs this can be one of the largest and most expensive jobs, it included labour charges for installation.
- Expansion costs scalability, if it will save money in the future it could be recommended to install better equipment now.
- Support costs certain equipment like servers can be difficult to manage without the proper expertise or support.
- Cost of downtime this is how long your company can be out of commission for repairs or installation and upgraded or if poor equipment fails.
Figure 2 is a provisional list of costs. The latest software has been proposed to increase security and efficiency. Some back up services will be moved to cloud storage for back up purposes. This can be divided into separate cloud storage allocations for Staff and Students. Hubs will be replaced with switches as these are far more efficient and secure. Two 24 port switches will be used instead of a 48 port as this will be more reliable in case one goes down. On Site storage and extra server will also be used as an extra back up. All cabling will be upgraded to 100mb to increases speed and scalability for future devices.
Figure 2 Costs of Materials
Item |
Quantity |
Cost £ |
HPE ProLiant DL380 Gen9 Xeon E5-2620V4 2.1GHz 16GB RAM 2U Rack Server |
2 |
2513 |
Server License |
1 |
652 |
Windows 10 Volume License |
1 |
900pm |
Switches 2960 24port |
8 |
835 |
Synology DS418 DiskStation 4-Bay 16TB Network Attached NAS |
2 |
792.74 |
100 TB Cloud |
1 |
|
Office 365 Volume License |
1 |
750 per month |
One Drive cloud Storage 100TB |
1 |
100 per/month |
Dedicated Line |
1 |
30 per/month |
1 GB Secure Line |
1 |
30 per/month |
100mb cable |
50m |
1000 |
Technical Information Existing & Recommendations
|
Glasgow |
Cardiff |
Birmingham |
Server software |
Windows server Upgraded to Windows 2016 |
Windows server Windows 2016 Back Up |
|
Client OS Software |
Upgraded to Windows 10 |
Upgraded to Windows 10 |
Upgraded to Windows 10 |
Client Application Software |
MS Office 365, HR software package. |
MS Office 365, Finance software package |
MS Office 365, Marketing software package |
Broadband |
Asymmetric up to 100Mbps |
Asymmetric up to 100Mbps |
Asymmetric up to 100 Mbps |
Public IPv4 addresses (simulated) |
Router – Assigned by ISP Server – 47.9.90.89 |
Router – Assigned by ISP |
Router – Assigned by ISP |
LAN IPv4 ranges |
10.10.0.0 /8 |
10.10.0.0 /8 |
10.10.0.0 /8 |
IPv6 |
Not currently used |
Not currently used |
To be tested by two users |
Switches |
3* 24 port managed switch, 2* |
3* 24 port managed switch, |
2* 24 port managed switch, |
Routers |
Provided by ISP |
Provided by ISP |
Provided by ISP |
Printers |
12 Mono LaserJet 2 colour inkjet |
10 Mono LaserJet 1 colour LaserJet |
1 Mono LaserJet 1 colour inkjet |
Host security |
Native security that comes with end station OS. This applies to client and server OS. |
Native security that comes with end station OS |
Native security that comes with end station OS |
Network Security |
Native security that comes with ISP router firewall. |
Native security that comes with router firewall. |
Native security that comes with router firewall. |
Backup |
5TB off-site NAS device 100TB Cloud Storage |
5TB off-site NAS device |
5TB off-site NAS device |
Key Factors
Key factors involved in this project are the £150,000 budget that has become available for Lanburgh to upgrade its IT system
1. Understand your network goals
2. Create a budget and acquire components.
3. Training, security, and scalability.
4. IT maintenance.
Resources & Materials
Items required for this project are as follows and will be assessed in the Analysis section.
- Software programs Microsoft Word, Visio, Packet Tracer, Microsoft Project & License
- Computer with Internet Connection
- Stationary
- Computer with Internet connection
- Network Engineers
- Dedicated Leased Line from ISP
- VPN
Information’s Sources
- Managing Director
- Students
- Faculty Staff
- Web Searches
- Vendors
- Cisco
- Networking Books
- Project Brief
Efficiency
Routing Protocols
Ripv2
VSLM
Variable-Length Subnet Masking (VLSM)
This is subnetting this will allow more subnets without wasting large amounts of addresses.
Summarisation
This will be used to lowering the amount of routing tables. It achieves this by consolidating multiple routes into a single route
https://searchnetworking.techtarget.com/definition/route-summarization
NAT
Network Address Translation (NAT) A static Nat will be used for Students in Birmingham to access the email server in Glasgow
This lets the router to change private IP addresses into public IP addresses
There will be a static route for students to the email server
https://www.cisco.com/c/en/us/support/docs/ip/network…nat/26704-nat-faq-00.html
PAT
There will be a port translation from the public facing router to port HTTP Port 80 and HTTPS port 443 for the staff to access the internet.
VTP
Virtual Trunking Protocol – This allows you to set leave one switch as server and configure others as clients saving time configuring them individually.
VLAN
Virtual local area network (VLAN)
This allows a group to be added inside a local area network as if they are on separate networks
STP
The Spanning Tree Protocol (STP)
This protocol prevents data going around in loops which can slow down and bring your network to a standstill
https://en.wikipedia.org/wiki/Spanning_Tree_Protocol
DHCP
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol.
This automatically assigns IP addresses to clients. A separate DHCP server will be used for students and staff.
https://docs.microsoft.com/en-us/windows-server/networking/technologies/dhcp/dhcp-top
Scalability
Switches Port Density
Port density is the number of ports in a network device or the number of ports in a backbone.
ftp://ftp.hp.com/pub/networking/software/density.pdf
IP Scheme
IP scheme must scale from ipv4 to ipv6
Most IP addresses are still IPv4 IPv6 was created to allow more IP addresses as time has gone by more and more end users require IP addresses. Using IPv6 will increase the scalability of your network.
https://www.techrepublic.com/article/how-to-make-your-ipv4-network-scalable-to-ipv6/
Reliability
HSRP
Hot Standby Router Protocol is a Cisco redundancy protocol for establishing a fault-tolerant default gateway. If the main router goes down the standby router will step in.
Raid
A Redundant Array of Independent Disks (RAID) this is an arrangement of multiple disk drives set together to act as a single disk drive. There will be a 5tb off-site storage.
https://www.vmware.com/products/workstation-pro.html
UPS
This is an uninterrupted power supply that can come in the form of a battery this will protect against power failures and power surges
Security
Firewalls
A firewall protects your network from harm by creating a barrier between trusted internal and external networks.
Physical Security
This is protection of personnel, software and hardware and the physical harm that can be caused from fire, flooding, theft and vandalism. The servers and storage devices will be kept in a locked room.
https://searchsecurity.techtarget.com/definition/physical-security
WPK2 for Wireless
Wi-Fi Protected Access 2 (WPA2) this is considered the most secure encryption for wireless.
https://searchnetworking.techtarget.com/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2
Authentication and Encryption
Encryption turns readable data into data that looks illegible using secrets that can transform it back into meaningful data at the other end. Authentication will allow only the person with permission to access the network. This will be used on all routers and switches. SSH will be for remote management rather than telnet as it used encryption rather than clear text.
Clients will require to be signed in with a username and password.
https://support.1password.com/authentication-encryption/
ACL
Extended Access Control List (ACL)
These are filters that allow a network administrator to control the flow of routing updates and filter traffic for extra security. One will be created for Students to access the Glasgow email server and one will be created for staff to access the internet.
https://www.orbit-computer-solutions.com/access-control-lists/
USER Groups
These are security groups that permit or deny users from accessing certain data. The windows server operating system can allow the administrator to control user groups centrally. This makes the process a lot more efficient. User groups will be created for staff, students and management.
https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups
DS/IPS
Intrusion Detection (IDS) and Prevention (IPS) Systems. This is used to monitor your network and act if necessary, of any unauthorised entry into your network. This will not be used at present as it will severely impact on the systems performance.
Analysis
Research will be carried out by
- Online and offline sources for up to date networking materials and cost.
- Vendor product manuals
- Looking at project brief
- Contacting Cisco
- Questionnaires from faculty staff
- Interviews from students
Reviewing Existing documentation
- Project brief
- Gantt Chart
- Visio Diagrams
- Packet Tracer Topology
Techniques
- Face to Face interviews
- Telephone calls
- Emails
- Staff questionnaires
Layer 3 Addressing Scheme
Campus |
Faculty |
Number of users |
Projected 5-year growth % |
Glasgow |
8 |
||
|
Teaching Staff |
3 |
|
|
Students |
50 |
|
|
HR |
3 |
|
|
IT Dept. |
2 |
|
|
MD |
1 |
|
Cardiff |
10 |
||
|
Teaching Staff |
2 |
|
|
Students |
40 |
|
|
Finance |
2 |
|
Birmingham |
12 |
||
|
Teaching Staff |
3 |
|
|
Students |
35 |
|
|
Marketing |
2 |
|
|
Testing |
2 Sample users |
Public Facing IP 165.65.74.80/28
165.65.74.0
255.255.255.252
IP Range 165.65.74.1
165.65.74.254
Glasgow IP Range 165.65.74.1
165.65.74.63
Cardiff IP Range 165.65.74.64
165.65.74.128
Birmingham IP Range 165.65.74.129
165.65.74.193
Private Addressing scheme
10.10.10.0/8
10.0.0.0/8
IP range 10.0.0.1
10.255.255.254
Net mask 255.0.0.0
VLAN 1 0 Staff
VLAN 2 0 Students
VLAN 22 Unused Ports
VLAN 30 Management.
VLAN 99 Native
Test Plan
Test Name |
Test Type |
Date of Test |
Method |
Expected Result |
Actual result |
Outcome and action Required |
RipV2 |
Efficiency |
9/5/2019 |
Use the show ip route command on the Birmingham Router |
Router will show up as being rip version 2 and directly connected routes will be shown as well as rip connected routers |
Router shows connected through rip
|
No action required |
Dedicated 1GB Line Static and Default routes |
Security |
9/5/2019 |
Use the show ip route command on the Cardiff router |
S* Will show for static route between Cardiff and Birmingham |
|
S* shows no action required |
VSLM/CIDR |
Efficiency |
15/4/19 |
Use the show ip route on the Glasgow Main Router |
Classless Addresses will show |
|
Classless IPs addresses show/no action required |
NAT Static Route |
Efficiency |
15/4/19 |
Use test Student in Birminghams web browser to ping cardiffs public facing cable |
Cisco Packet Tracer should show up Use show show ip nat translations and ip nat statistics command |
|
Action Needed/ Apply To Glasgow Branch email server. |
Port Address Translation |
Efficiency |
18/05/19 |
Use Staff tester to put birmingham public ip address in |
Cisco packet tracer should show. Use show show ip nat translations and ip nat statistics command |
|
Action Needed apply to Glasgow Branch Web Browser |
VTP |
Efficiency |
15/4/19 |
Use the show VTP status in the Glasgow Root switch |
|
||
DTP |
||||||
VLAN/inter VLAN |
Efficiency Security |
15/4/2019 |
Use Show VLAN Command on Glasgow Root Switch |
Hosts can ping all hosts on their VLAN |
||
Inter Vlan Networking |
Efficiency |
15/5/19 |
Ping any student client to any staff client . Staff test 1 from Student Test 1 |
|
Pings Successful/no action required |
|
STP |
Efficiency |
15/4/2019 |
Show Spanning-tree protocol |
Use the show spanning -tree to show new root bridge is configured |
|
New Root Bridge Is selected/ no action required |
DHCP |
Efficiency |
15/4/2019 |
Student Test 1 and Staff test one Clients and Request IP Address |
Request new ip address from respective dhcp server |
|
Requests Successful no action required |
Switch Port Sticky |
Security |
15/5/19 |
Only the first mac address in port 24 will be allowed |
Plug in another client to port 24 in the Glasgow root bridge. The pot will be blocked |
Port Successfully blocked/no action required. |
|
IP Scheme IPV4 |
Scalability |
15/4/2019 |
Use Ping command from staff test 1 in Glasgow to student test 2 In Cardiff and student test 3 in Birmingham |
Clients will reply |
|
Pings successful /no action required |
IP Scheme IPV6 |
Scalability |
15/4/2019 |
Use Ping command from PC2 to PC! In the ipv6 test area |
PC1 will reply to ping |
|
Ping Successful no action rquired |
HSRP |
Reliability |
15/4/2019 |
Use Shutdown command on main router so standby router becomes active |
Ping ISP Router which |
||
UPS |
Reliability |
15/4/2019 |
Shut down power to server in glasgow |
Batteries will continue the power supply until main power is restored |
||
Firewalls |
Security |
15/4/2019 |
||||
ACL |
Security |
15/4/2019 |
||||
WPK 2 |
Security |
15/4/2019 |
Connect Rogue Device. SSID is changed from default. WPA2 -PSK Authentication required with password |
Device wont Connect |
|
Rogue devices wont connect/no action required. |
FTFP |
|
|||||
SSH |
|
|||||
VPN |
show crypto ipsec sa |
|||||
switchport port-security |
Security |
14/5/19 |
show interfaces switchport |
|
||
switchport port-security aging time 120 |
Security |
14/5/19 |
show interfaces switchport |
|
||
No cdp enable |
Security |
14/5/19 |
show interfaces switchport |
|
||
spanning-tree portfast |
Security |
14/5/19 |
show interfaces switchport |
|
||
spanning-tree bpduguard enable |
Security |
14/5/19 |
show interfaces switchport |
|
||
storm-control broadcast level 75.5 |
Security |
14/5/19 |
show interfaces switchport |
|
||
switchport mode trunk switchport no negotiate |
Security |
14/5/19 |
show interfaces switchport |
|
||
Ether Channel LACP – Link Aggregation Control Protocol |
Efficiency |
16/.5/19 |
Issue Show Run command |
Interface Port Channel should show |
|
Interface Port Channel 1 shows/no action required |
Provisional Design Topology’
Refer to Visio file
Evaluation
3.1 Outline of the assignment
You should produce an outline of the assignment and to what extent the solution met the original requirements of the assignment brief as noted below. (4 marks)
You should give a statement regarding the extent to which each of these objectives has been achieved. If an objective has not been achieved, or has only been partially achieved, you should give an explanation.
In this assignment we were asked to upgrade the company’s existing network infrastructure. Almost all the requirements have been met except, the following
HSRP is partially working, there is a backup router, but it is misconfigured after the network was streamlined. Time constrains have made it unable to be reconfigured
VPN is also partially configured a serial cable was removed for efficiency and the wrong IP route was put on the Cardiff and Glasgow routers time constraints have made it unable to be reconfigured.
Extended ACLs have still to be implemented and tested time constraints have cause this not to be implemented yet.
There were problems implementing NAT in Glasgow. My plan was to put a Static NAT to the student email server and a PAT to port 80 and 443 to the Glasgow web server I had put a Server on DHCP for quickness and configured PAT on it, when I started the network back up it was then misconfigured. This was rectified with a static IP but became misconfigured when I put a static NAT on the same serial cable port, so I put a Static in Cardiff and a PAT in Birmingham for testing.
Vlans are all configured correctly with sub interfaces for inter vlan networking. This caused a few configuration problems as the number of gateways increased.
I would have used a Zone based firewall as it is easier to configure this than a ASA firewall, it is also a lot more cost effective as you don’t need to buy extra equipment.
IPV^ has been properly configures and through time I would role this out thought the full network.
There is redundancy on every site with no single points of failure, there are multiple switches and multiple routers all giving at least two possible routes.
3.2 Strengths and weaknesses
You should give an assessment of the strengths and weaknesses of the outputs of the practical assignment. (4 marks)
The network I have planned and built is strong on security and efficiency. I have used RipV2 as it is one of the easiest to implement and maintain. Through time I would recommend using some of the other protocols as the network grows and the management staff get to know it.
The Inter vlans work on every site. I have good switch security with a goodpractices demonstration in a switch and on a router for test, this would be used on every switch and router after the testing stage.
There is a DHCP properly configured on each site on for the Staff and one for the students, each DHCP is on the same Vlan as the clients they are serving. Staff and Students also have they’re on printers on there on vlan for added privacy and security.
Each site offline storage is at another site in the network. Glasgow’s in in Cardiff, Cardiff’s is in Glasgow’s and Birmingham is in Glasgow’s
All trunk GB ports are used as trunk ports as they have lower costs and faster.
3.3 Recommendations
You should make recommendations for any future development of the solution and give your reasons for these recommendations. (4 marks)
In the future I would use other routing protocols which can be more efficient though harder to configure. I would make every trunk route and ether channel linking the two gigabyte ports this doubles the bandwidth. As the company grows, I would use more ethernet channels to create more bandwidth.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Find out more about our Essay Writing Service
I would guide have a booklet printed for all the users advising on safe practice and strong passwords as a lot of damage from networks can come from the inside as well as the outside such as a person bringing their own devices which contain viruses.
I would create a VPN from Glasgow to Birmingham and Birmingham to Glasgow as well for added security.
I would remove the printers off DHCP and put them on a static IP rather than having to request one every time they are switched on. They were configured DHCP for time scale factors.
There is a TFTP server which backs up the running configs in Glasgow this will be rolled out to every site in future
3.4 Modifications
You should give a summary of any modifications to the project plan, solution design and/or implementation that were made during the project, including reference to any unforeseen events and how they were handled. (4 marks)
OSPF and EIGRP were initially be going to be used but RipV2 was quicker and easier to use.
More switch security has been implemented as they are easy to configure i.e. Switchport security, broadcast storm control. Switches come with preconfigure settings which can be easily manipulated by attackers and leave the system vulnerable.
One unforeseen even was configuring with no single default gateway with sub interfaces. After research I understood that a sub interface can be configured just like a physical interface.
I had more routers than I needed so after removing one my configurations on HSRP and VPN became misconfigured, these still need to be trouble shooted.
3.5 Knowledge and skills
You should identify any knowledge and skills which have been gained or developed while carrying out the project assignment and how the actions/ process of carrying out the project could have been improved. (4 marks)
I have gained skills in using the command line interface and the commands, using some of them that often has made configuring routers a switch a lot easier.
I know have a better understanding of what the commands are and why they are used.
I have found a lot more ways to configure switches for extra security with some basic switch configurations to start with like closing all ports until you use them, removing them from vlan 1, enabling broadcast storm control.
I have learned a lot more about configuring routers and setting them up to start with with passwords, no ip-domain look up, password encryption and understand a lot clearer why the work.
I have learned a lot more about IPv6 and what the addresses are made up of like a post code and machine mac address.
I’ve learned a lot more about encryption with things like SSH which encrypts text where telnet ins clear text for remote access and making it a lot more secure.
I’ve learned how to configure servers for DHCP, WEB, EMAIL TFTP, FTP and how to back up the settings.
I have learned a lot about standard ACLs and Extended Access-lists and how to configure and verify them allowing filtering from different networks or clients.
I have learned a lot more about what ports are used for and have most of the well-known ones memorised whereas before they were just jumbled numbers.
I could have improved my network by doing a lot more research first, some command I learned save a lot of time. I could have HSRP and VPN better configured instead of deleting a router leaving older configurations.
Identifying the root bridge earlier would have allowed me to reduce the costs of the network by using the GB ports straight to the router then the redundancy put on fast ethernet.
Bibliography
- https://searchnetworking.techtarget.com/definition/route-summarization
- https://www.cisco.com/c/en/us/support/docs/ip/network…nat/26704-nat-faq-00.html
https://www.techopedia.com/definition/26152/vlan-trunking-protocol-vtp
- https://en.wikipedia.org/wiki/Spanning_Tree_Protocol
- https://docs.microsoft.com/en-us/windows-server/networking/technologies/dhcp/dhcp-top
- ftp://ftp.hp.com/pub/networking/software/density.pdf
- https://www.techrepublic.com/article/how-to-make-your-ipv4-network-scalable-to-ipv6/
- https://www.vmware.com/products/workstation-pro.html
- https://searchnetworking.techtarget.com/feature/Wireless-encryption-basics-Understanding-WEP-WPA-and-WPA2
- https://support.1password.com/authentication-encryption/
- https://www.orbit-computer-solutions.com/access-control-lists/
- https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-security-groups
References
- Cisco Networking Academy Logbooks
- CCNA Routing & Switching Protocol PDFs
- Dans Courses CCNA material
Cite This Work
To export a reference to this article please select a referencing stye below:
Related Services
View allDMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: