NAME: Joshua Brock
DATE: 04 The spring 2015
TEACHER:
NETW208 Week 5 iLab Report
There is certainly one section to this iLab.
Section 1: Implementing and Troubleshooting ACLs iLab (40 points)
Implementing and Troubleshooting ACLs iLab (40 points)
Review the grading rubric below, and after that complete the work for each stage as indicated.
Category
Factors
Description
Section 1
Employing and Troubleshooting ACLs—40 Items
Task 1: Step 19
Related Explanation or Response
Task 1: Step 22
Related Explanation or Response
Task one particular: Step twenty three
Related Reason or Response
Task 1: Step twenty four
Related Reason or Response
Summary Paragraph
2
a few
2
three or more
2
three or more
2
three or more
20
Substance the requested screenshot.
Give you the requested answer.
Paste the requested screenshot.
Provide the expected answer.
Substance the requested screenshot.
Give the requested answer.
Paste the requested screenshot.
Provide the asked answer.
In your words, summarize what you have discovered about putting into action and maintenance ACLs. Total
40
Set a paragraph (minimum five college-level sentences) below that summarizes what was achieved in this laboratory; what you discovered by doing it; just how it relates to this week's TCOs and other course material; and, just as important, how you feel it will benefit you in the academic and professional career. (20 points), In this research laboratory I was capable of implement and troubleshoot ACLs. In doing work through this kind of lab, I actually learned how to create a long access list to refuse specific Telnet traffic. I had this by making use of the get list to multiple cadre and applied show instructions to verify the gain access to list syntax. I then verified that the access list worked well by producing different types of targeted traffic. I was capable to practice maintenance skills simply by copying a problematic list from the TFCP server and used present commands in order to discover why the brand new access list did not operate. At the end from the lab, I reconfigured the access list so that it would work in the way that it was intended to work. I then performed a test on the get list. Operating through these labs gave me the practical experience and practice in implementing and operating a straightforward Cisco network that includes true switches, routers, and remote control access systems. Copy and paste this screenshots from your Implementing and Troubleshooting ACLs lab beneath.
Task 1, Step 19: From the priveleged order prompt of NYEDGE1 perform the Display Access-List order. Paste a screenshot from the output beneath. (2 points)
Query: What is wrong with the newly installed ACL? (3 points) Its not responding. (Hint) Read and study the explanations inside the lab intended for assistance.
Activity 1, Step 22: After you have corrected the access list, execute the Show Access-List command from your previleged control prompt of router NYEDGE1 and insert a screenshot of the result below. (2 points)
Question: What impact does the modification to the ACL have in packet stream? (3 points) (Hint) Examine and examine the explanations within the research laboratory for assistance. It permits the routing table.
Task 1, Step twenty three: Paste a screenshot as soon as you execute the Ping order to hundranittiotv?. 168. of sixteen. 10 (2 points)
Issue: What was the typical round trip time of your Ping control to 192. 168. 18. 10? (3 points) (Hint) Read and study the explanations within the lab for assistance.
Task 1, Step 24: After you have attempted to backup a file from your tftp server, paste a screenshot from the output below. (2 points)
Question: Which in turn line in the ACL will keep the tftp copy process from working? (3 points) The 1st line. (Hint) Read and study the explanations within the lab for assistance or perhaps do a little Net research.