Arquitectura de linux

Solo disponible en BuenasTareas
  • Páginas : 4 (929 palabras )
  • Descarga(s) : 0
  • Publicado : 24 de agosto de 2012
Leer documento completo
Vista previa del texto
ENetwork Basic Configuration PT Practice SBA
A few things to keep in mind while completing this activity:
1.     Do not use the browser Back button or close or reload any Exam windows during theexam.
2.     Do not close Packet Tracer when you are done. It will close automatically.
3.     Click the Submit Assessment button to submit your work.
Introduction
In this practice Packet TracerSkills Exam, you will:
* design and implement an addressing scheme to meet stated requirements
* configure, verify, and troubleshoot connectivity between all devices in the network
AddressingTable
Device | Interface | Address | Subnet Mask | Default Gateway |
HQ | Fa0/0 | 10.10.10.1  | 255.255.255.192  | n/a |
| Fa0/1 | 10.10.10.65 | 255.255.255.248 | n/a |
S2 | VLAN1 |10.10.10.2 | 255.255.255.192 | 10.10.10.1 |
NetAdmin | NIC | 10.10.10.62  | 255.255.255.192  |  10.10.10.1 |
H1 | NIC | preconfigured | preconfigured | preconfigured |
NOTE: The initial network hassome errors. To aid in configuring and verifying the devices as well as troubleshooting the existing errors, use a printed version of these instructions to fill in the missing address information in thetable during Step 1.
Step 1: Determine the IP Addressing Scheme.
Design an addressing scheme and fill in the Addressing Table based on the following requirements:
a.     Subnet the address space10.10.10.0/24 to provide 40 host addresses for LAN 1 while wasting the least amount of address space.
b.    Assign the first available subnet to LAN 1.
c.     Assign the lowest (first) host addressin this subnet to the Fa0/0 interface on HQ.
d.    Assign the second address in this subnet to the VLAN 1 interface on S2.
e.     Assign the highest (last) host IP address in this subnet toNetAdmin.

Step 2: Configure HQ.
a.     Configure HQ with these basic parameters:
         Use HQ as the router name.
         Use class as the encrypted password for privileged EXEC mode....
tracking img