Standardized Configurations across the Network Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

Introduction

Standardization configuration of DeVry’s campus network will enable various VLAN members to share information very easily. Nevertheless, at this juncture the standardization initiative must embrace the needs of traffic patterns, design requirements and camera density. As such, this report will address the configuration issues which pertain to the various elements of the network.

Four camera VLANs

Four Camera VLANs will require the installation of cameras to be IP oriented and will be operated in VLAN 600. The cameras will be controlled by 2 switches with a port access such as Cisco 2960 which must embrace the standard requirements. Operation from the switches will enable operators to communicate easily with the server In this case, SF302-8P is highly recommended since the cameras will be operating in a highly populated environment (Samuel, 2009).

Local VLAN database

Local VLAN database, the guiding principle in this configuration is to operate the size of a particular layer 2 section network to ensure that communication and traffic density does not exceed the capacity of the network section. This scenario applies to DeVry’s campus network given the high traffic and data. To transfer data, VLAN must be recognized by the switches mentioned above. Configuration of the local VLAN will also be identified from a switch which has the Trunking Protocol database (Samuel, 2009).

Standard trunking protocol with nondefault native VLAN

Standard trunking protocol with nondefault native VLAN enhances identification of VLAN data frames that are moving between the switches. This also enables the trunks to carry traffic from the VLANS within the network; moreover, they will also be modified to carry particular VLAN traffic. The trunking mechanisms to be used will be configured according to Cisco switch configurations.

Nonstandard management VLAN

Nonstandard management VLAN system works with command switch to automatically recognize a new switch that has not be configured. In this regard, the command switch delivers instructions to the nonstandard management to ensure conformity. Prior to the inclusion of a new switch, the network cluster must be linked to the port where VLAN management cluster can be accessed (Samuel, 2009).

Standard hostnames

The standard host names will be developed according to the proffered set of host names. As indicated in RFC #226. The host names to be used in this network will comprise of at least 6 characters. The guideline to be used will identify the site and the machine. The users will rely on keywords of the site, standard acronyms, or standard abbreviation. However, in case the network team finds the above recommendations inapplicable, selected mnemonics will be used.

Local authentication database

Authentication of the database will enhance data security in the organization. Configuration of the network privileges is therefore important to enable the campus network administrators to enhance efficiency and protection of vital information. In this case, privilege authentication will be achieved by using a switch that embraces AAA mode of authentication (Samuel, 2009).

SSH transport for VTY ports

SSH transport for VTY ports will enable the above mentioned authentication to work. Therefore, to achieve this network engineers will incorporate enabled AAA model to particular specified AAA authentication. This also involves identifying the AAA authentication to be pursued for instance, whether it is tacacs, local based or radius (Samuel, 2009).

Password-protect on all out-of-band management ports

Password-protect on all out-of-band management ports are very important for the campus to provide adequate security control. The initiative will enable the network users to ensure improved productivity due to elimination of potential interferences. To attain this, the network engineers will use 1700 which is the best catalyst out-of-band management to arrange, examine and test the each port.

Naming standards for all devices

The naming standards for devices are very important when conducting an audit on the performance of both hardware and software devices used in the network system. The audit is also useful in providing configuration adjustments for improving the performance. Cisco based standards such RME is applied in auditing device performance and provides information on different modules, hardware and software devices (Samuel, 2009).

Cable identification

Cable identification in network system is very important to enhance efficient network operations. The most reliable identification method to be used in this case is Cad-Connect labeling system which is essential in saving time and elimination of errors by using prior CAD files that reduces manual operations in data entry.

IP addressing scheme using RFC

IP addressing scheme using RFC 1918 addresses to be used in this case is 10.0.0.0/8 which is recommended for private organizations such a campus. This is chosen because it operates TCP/IP without difficulties. However, IP addressing scheme will only be limited for use within the internal network since it tends to limit connections with other external networks such as the public network system.

Indication of how devices will acquire addresses

IP addressing scheme identifies network device assignments, subnet assignments and size of the subnet. The IP address to be used in this case will reduce chances of overlapping or duplicating the subnets. This relies on established IP standards which automatically assigns addresses within particular subnets from routers to switches.

VLAN membership

The VLAN membership recommended for the network will be Dynamic VLANs where switches delegate the ports to the VLAN by relying on the information from applier device through IP address. This therefore reveals the devices which obtain addresses through IP address system (Samuel, 2009).

Concerns on the current network design

Since the organization will adopt switch oriented network system, concerns will emanate from issues of design as many of the campus network administrators are not used to the new system. Adapting the new network topology may therefore come with some challenges which emanate from difficulties in mastering the switch based system.

Reference

Samuel, F. (2009). Octopus: The Lawrence Radiation Laboratory Network. Rogerdmoore.ca. Archived from the original on 2012 VLANs.345-350

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, January 17). Standardized Configurations across the Network. https://ivypanda.com/essays/standardized-configurations-across-the-network/

Work Cited

"Standardized Configurations across the Network." IvyPanda, 17 Jan. 2019, ivypanda.com/essays/standardized-configurations-across-the-network/.

References

IvyPanda. (2019) 'Standardized Configurations across the Network'. 17 January.

References

IvyPanda. 2019. "Standardized Configurations across the Network." January 17, 2019. https://ivypanda.com/essays/standardized-configurations-across-the-network/.

1. IvyPanda. "Standardized Configurations across the Network." January 17, 2019. https://ivypanda.com/essays/standardized-configurations-across-the-network/.


Bibliography


IvyPanda. "Standardized Configurations across the Network." January 17, 2019. https://ivypanda.com/essays/standardized-configurations-across-the-network/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1