NTISthis.com

Evidence Guide: ICTNWK506 - Configure, verify and troubleshoot WAN links and IP services in a medium enterprise network

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK506 - Configure, verify and troubleshoot WAN links and IP services in a medium enterprise network

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to install medium enterprise WAN links

  1. Prepare for given work according to legislation, work health and safety (WHS) codes, regulations and standards
  2. Arrange access to the site according to required procedure
  3. Review existing network design documentation to ensure it is current and complete
  4. Select network elements required to be installed to meet technical requirements
  5. Contact vendors and service suppliers to obtain specifications and availability of identified components
  6. Develop plans, with prioritised tasks and contingency arrangements, for installation of components with minimum disruption to client
  7. Liaise with appropriate person to obtain approval for the plans, including security clearance and timing
Prepare for given work according to legislation, work health and safety (WHS) codes, regulations and standards

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Arrange access to the site according to required procedure

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review existing network design documentation to ensure it is current and complete

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select network elements required to be installed to meet technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contact vendors and service suppliers to obtain specifications and availability of identified components

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop plans, with prioritised tasks and contingency arrangements, for installation of components with minimum disruption to client

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Liaise with appropriate person to obtain approval for the plans, including security clearance and timing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure WAN links

  1. Determine different methods for connecting to a wide area network (WAN)
  2. Configure and verify a basic serial WAN configuration
  3. Configure and verify at least two WAN protocols
  4. Determine virtual private network (VPN) technology
  5. Configure and verify a site-to-site VPN
  6. Determine asymmetric digital subscriber line (ADSL) technology
  7. Configure and verify an ADSL connection
Determine different methods for connecting to a wide area network (WAN)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify a basic serial WAN configuration

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify at least two WAN protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine virtual private network (VPN) technology

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify a site-to-site VPN

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine asymmetric digital subscriber line (ADSL) technology

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify an ADSL connection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify IP services on a router

  1. Determine the operation and benefits of using dynamic host configuration protocol (DHCP)
  2. Configure and verify DHCP operation on a router
  3. Implement static and dynamic addressing services for hosts in a local area network (LAN) environment
  4. Determine the basic operation of network address translation (NAT)
  5. Configure NAT for given network requirements
  6. Implement and verify NAT in a medium sized enterprise branch office network
  7. Describe the basic operation and configuration of internet protocol version 6 (IPv6)
Determine the operation and benefits of using dynamic host configuration protocol (DHCP)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify DHCP operation on a router

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement static and dynamic addressing services for hosts in a local area network (LAN) environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine the basic operation of network address translation (NAT)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure NAT for given network requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement and verify NAT in a medium sized enterprise branch office network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Describe the basic operation and configuration of internet protocol version 6 (IPv6)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure a network using router services

  1. Determine the purpose and types of access control lists (ACLs)
  2. Configure and apply ACLs based on network filtering requirements
  3. Configure and apply ACLs to provide secure access to the router
Determine the purpose and types of access control lists (ACLs)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and apply ACLs based on network filtering requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and apply ACLs to provide secure access to the router

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Troubleshoot medium enterprise WAN links

  1. Troubleshoot WAN implementation issues
  2. Rectify WAN problems
  3. Document solutions
Troubleshoot WAN implementation issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Rectify WAN problems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document solutions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Prepare to install medium enterprise WAN links

1.1 Prepare for given work according to legislation, work health and safety (WHS) codes, regulations and standards

1.2 Arrange access to the site according to required procedure

1.3 Review existing network design documentation to ensure it is current and complete

1.4 Select network elements required to be installed to meet technical requirements

1.5 Contact vendors and service suppliers to obtain specifications and availability of identified components

1.6 Develop plans, with prioritised tasks and contingency arrangements, for installation of components with minimum disruption to client

1.7 Liaise with appropriate person to obtain approval for the plans, including security clearance and timing

2. Configure WAN links

2.1 Determine different methods for connecting to a wide area network (WAN)

2.2 Configure and verify a basic serial WAN configuration

2.3 Configure and verify at least two WAN protocols

2.4 Determine virtual private network (VPN) technology

2.5 Configure and verify a site-to-site VPN

2.6 Determine asymmetric digital subscriber line (ADSL) technology

2.7 Configure and verify an ADSL connection

3. Configure and verify IP services on a router

3.1 Determine the operation and benefits of using dynamic host configuration protocol (DHCP)

3.2 Configure and verify DHCP operation on a router

3.3 Implement static and dynamic addressing services for hosts in a local area network (LAN) environment

3.4 Determine the basic operation of network address translation (NAT)

3.5 Configure NAT for given network requirements

3.6 Implement and verify NAT in a medium sized enterprise branch office network

3.7 Describe the basic operation and configuration of internet protocol version 6 (IPv6)

4. Secure a network using router services

4.1 Determine the purpose and types of access control lists (ACLs)

4.2 Configure and apply ACLs based on network filtering requirements

4.3 Configure and apply ACLs to provide secure access to the router

5. Troubleshoot medium enterprise WAN links

5.1 Troubleshoot WAN implementation issues

5.2 Rectify WAN problems

5.3 Document solutions

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Prepare to install medium enterprise WAN links

1.1 Prepare for given work according to legislation, work health and safety (WHS) codes, regulations and standards

1.2 Arrange access to the site according to required procedure

1.3 Review existing network design documentation to ensure it is current and complete

1.4 Select network elements required to be installed to meet technical requirements

1.5 Contact vendors and service suppliers to obtain specifications and availability of identified components

1.6 Develop plans, with prioritised tasks and contingency arrangements, for installation of components with minimum disruption to client

1.7 Liaise with appropriate person to obtain approval for the plans, including security clearance and timing

2. Configure WAN links

2.1 Determine different methods for connecting to a wide area network (WAN)

2.2 Configure and verify a basic serial WAN configuration

2.3 Configure and verify at least two WAN protocols

2.4 Determine virtual private network (VPN) technology

2.5 Configure and verify a site-to-site VPN

2.6 Determine asymmetric digital subscriber line (ADSL) technology

2.7 Configure and verify an ADSL connection

3. Configure and verify IP services on a router

3.1 Determine the operation and benefits of using dynamic host configuration protocol (DHCP)

3.2 Configure and verify DHCP operation on a router

3.3 Implement static and dynamic addressing services for hosts in a local area network (LAN) environment

3.4 Determine the basic operation of network address translation (NAT)

3.5 Configure NAT for given network requirements

3.6 Implement and verify NAT in a medium sized enterprise branch office network

3.7 Describe the basic operation and configuration of internet protocol version 6 (IPv6)

4. Secure a network using router services

4.1 Determine the purpose and types of access control lists (ACLs)

4.2 Configure and apply ACLs based on network filtering requirements

4.3 Configure and apply ACLs to provide secure access to the router

5. Troubleshoot medium enterprise WAN links

5.1 Troubleshoot WAN implementation issues

5.2 Rectify WAN problems

5.3 Document solutions

Evidence of the ability to:

plan and prepare for the wide area network (WAN) link installation task

install and configure WAN links

configure and troubleshoot the following internet protocol (IP) services:

network address translation (NAT)

dynamic host configuration protocol (DHCP)

access control lists (ACLs)

configure and troubleshoot ADSL links

configure and troubleshoot VPNs

document solutions.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

outline the basic operation and configuration of internet protocol version 6 (IPv6)

identify and describe typical router setup and operations, including:

ACLs

router calling line identification (CLI) configuration

router debug commands

explain typical problems and solutions with WAN link installations.