Figure 7 - uploaded by Mokhaled N. A. Al-Hamadani
Content may be subject to copyright.
Switch security configuration

Switch security configuration

Source publication
Article
Full-text available
The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can co...

Citations

... This is because unscrupulous humans with malicious intents may intercept sensitive data, and gain unauthorized access to a network. Also, in an organization, the duties of each department may vary, and as a result, it would be logical to prevent the unauthorized access of data from non-members of any department [2,3]. In view of these, adequate security measures must be put in place to avert the aforementioned threats. ...
Preprint
Full-text available
An enterprise network is the livewire of the daily administrative operations in any institution. It facilitates the sharing of information between different users, and also provides high-speed connectivity to the internet. In designing an enterprise network, several factors, such as resiliency, scalability, speed, and the security of the network, all need to be catered for. Cisco packet tracer is a simulation tool created by Cisco systems to simulate the performance of a virtual network design. The software enables network designers to access the performance of a design and make necessary corrections if required, before the design is implemented in reality. In this study, an enterprise network is designed and simulated using cisco packet tracer, typical for application at the Faculty of engineering, University of Lagos, Nigeria. The research provides an explanation and application of several networking concepts that realize a secured network design. Some of the concepts include; IP addressing, VLANs (Virtual Local Area Networks), Etherchannel, ACLs (Access Control Lists), NAT (Network Address Translation), etc.
... Factors included in the mode o f experiential learning according to research four departments on a university campus employ VLANs to gain improved network performance, i.e., Po licy on access restriction. VLA Ns are also mentioned in the report [4] [5]. In order to connect to the new host easily used a DHCP server in big networks. ...
Conference Paper
Full-text available
The key to communication is being digitalized every day, in order to keep up with technology everyone needs to update their skillset with it. A campus network is connected to us more because all are often a part of it. Everyone uses it most of the time for their daily activities on campus and also for educational purposes, depending on their needs. To ensure that data cannot be corrupted, it is crucial to make specific alterations to it. Integrity and reliability are key issues in all information switch difficulties in order to ensure safe and simple transfers among customers. As a result, this research has developed a secure campus network and a stable campus community for sending and getting data among end users with high levels of security. Using a Cisco packet tracer, this study proposed a topology for a campus of multiple networks and virtual local area networks (VLANs), as well as the most crucial security configurations for the networking used in this design. There used a massive variety of protocols to defend and accommodate the customers of the secure campus network scheme and also added switches, routers, firewalls, Wi-Fi routers, IP routers and printers to this network in order to make communication smoother and more efficient. Digital campus is the place where the next generation goes to gain education and knowledge about the world makes the campus network more secure and tech-focused. The students and other personnel can learn and even get familiar with them all and also help everyone.
Chapter
In today world, wide area network is the most necessary computer network for communication and administration in most of the companies and organization. In today’s epidemic situation all home-based IT professionals need to go in from a distance to access their company’s network. In this paper, designing a secure wide area network to connect multiple offices using the CISCO package tracker simulation tool. The paper is divided into two parts, one for the network design and the other for the protection provided by that network. The paper Provides detailed information about routers and servers such as domain name server, telnet server, network time protocol and system logging protocol. The main purpose of the organization is to share information through network and specially, it is far essential to make sure the change of data; as a result, no person can spoil or harm it. For comfy and dependable transfers among customers, integrity and trustworthiness are vital questions for all statistics transfer troubles. Therefore, created a complete secure wide area network (SWAN) for sending and receiving facts among exceedingly comfortable quit customers and also added the maximum crucial protection settings to the community used in our construction. We used huge variety of protocols to shield and host users of the SWAN machine.KeywordsRouterSwitchHTTPDNSDHCPTelnetSMTP