| dc.contributor.advisor | Vesga, Juan Carlos | |
| dc.coverage.spatial | cead_-_josé_celestino_mutis | spa |
| dc.creator | Rodríguez Garzón, Frey Hernán | |
| dc.date.accessioned | 2020-02-29T13:40:37Z | |
| dc.date.available | 2020-02-29T13:40:37Z | |
| dc.date.created | 2019-12-01 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/31599 | |
| dc.description.abstract | Se ha realizado dos escenarios con el fin de desarrollar los conceptos y ponerlos en práctica mediante el software packet tracer, en ella se divide en dos módulos, el primer escenario se puede analizar el direccionamiento IP, en el cual se debe definir una dirección de acuerdo con el número de hosts requeridos, asignar los parámetros básicos y la detección de vecinos directamente conectados, además la red y subred establecidas deberán tener una interconexión total, todos los hosts deberán ser visibles y poder comunicarse entre ellos sin restricciones. Una de las principales partes es Implementar la seguridad en la red, se debe restringir el acceso y comunicación entre hosts de acuerdo con los requerimientos del administrador de red.
Para ello se comprueba el funcionamiento mediante el software packet tracer y se realiza un ánalisis de los dos escenarios. | spa |
| dc.format | pdf | |
| dc.title | Pruebas de habilidades CCNA – Final. | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | Hots | spa |
| dc.subject.keywords | IP | spa |
| dc.subject.keywords | Red | spa |
| dc.description.abstractenglish | This work has been carried out in order to put into practice the topics covered in modules 1 and 2 of the ccna Diploma, through which two exercises with real and very frequent scenarios in the design of networks are solved.
The first scenario can be seen the division is a network into eight subnets, which is put into practice the IP addresses of the networks and their rules to carry out this subdivision, in addition the allocation of the basic parameters such as the Direct verification of equipment close to these devices.
You can check the communication of the different equipment that make up the subnets, through Telnet and Ping commands, verifying and analyzing the correct operation and guaranteeing the timely communication.
The router access list is configured, which restricts communication to a certain network, and allows communication governed by only one host, which is requested on stage.
Finally, the correct functioning is checked, by means of a table, which allows us to verify the communication of the different hosts of the different subnets.
The second scenario allows us to analyze the basic configuration of the routers, authentication, authorization and accounting (AAA), the configuration of the maximum access time to detect attacks such as establishing a TFTP server to store all the files of the routers. | spa |