6.1 Weekly Plan of Roles and Responsibilities: Smile Suneer Dubal Muhammad Arsalan Jaspreet Kaur Week 1
6.1 Weekly Plan of Roles and Responsibilities: Smile Suneer Dubal Muhammad Arsalan Jaspreet Kaur Week 1
Week 1
Week 2
Week 3
Week 4
Week 5
Week 6
Week 7
Week 8
Week 9
Week 10
Week 11
Week 12
Research on
the Cisco
Routers
Analysis of
the Routers
Design and
Implementati
on on the
Routers
Implementati
on of the
Firewalls
Understandi
ng and
Implementin
g of VPN
using
Routers
Configuratio
n of the
Routers
Configuring
Global
Parameters
Configuring
Fast
Ethernet
Wan
interface
Clearing and
Resetting
Interface and
Counters
Shutting
Down and
Restarting
the Interface
Submission
of the Final
Project
Post
Suneer
Dubal
Analysis of
the Network
Muhammad
Arsalan
Analysis of
the Network
Design of
LAN and
VLAN
Subnetting
and IP
Distribution
Design of
LAN and
VLAN
Subnetting
and IP
Distribution
Configuratio
n of VLAN
Configuratio
n of VLAN
Configuratio
n of InterVlan
communicati
on
Configuratio
n of InterVlan
communicati
on
Testing of
VLAN
Testing of
VLAN
Bug Fixing in
VLAN Design
&
Implementati
on
Report
Writing of
VLAN
Bug Fixing in
VLAN Design
&
Implementati
on
Report
Writing of
VLAN
User Manual
of VLAN
User Manual
of VLAN
Administrato
rs Manual of
VLAN
Administrato
rs Manual of
VLAN
Submission
of Final
Project
Post
Submission
of Final
Project
Post
Jaspreet
Kaur
Research on
the Cisco
Switches
Analysis of
the Switches
Design and
implementati
on of the
Switches
Understandi
ng Interface
Types
Using the
Interface
Command
Configuring
Ethernet
Interfaces
Port-Based
VLANS
Monitoring
Interface and
Controller
Status
Clearing and
Resetting
Interface and
Counters
Shutting
Down and
Restarting
the Interface
Submission
of the Final
Project
Post
Implementati
on
Presentation
6.2
Implementati Implementati
on
on
Presentation Presentation
Table 6.1
Roles and Responsibilities of Each Team Members
Team Members
Smile
Jaspreet Kaur
Muhammad Arslaan Yasin
Suneer Subhaschandra Dubal
Implementati
on
Presentation
Roles
Security and Performance Analyst
Designer and Testing of the
Network
Network Administrator, Network
Engineer
Research Analyst, Network Tester
k&
Cloud
Server
Insight
ful
Journal
and
Report
Accom
plishm
ent
Table 6.3A Gantt chart
6.2.2 Work breakdown structure
Work breakdown structure (WBS) is key to the deliverable which
categorizes the team members into manageable sections. It is a welldefined hierarchical decomposition of work to get the tasks executed by
the team members [2]. WBS in the implementation of Microsoft Azure in
cloud computing which contains Tasks, its predecessors and estimated
duration along with the designated team member is as follows.
Estimat
Tas
Predece ed
k
Task
Assigned To
ssor
Duratio
No
n
Analysis of MS
1
3 Days
Research Analyst
Azure
Analysis
of
Hardware
1.1 (Routers,
1
3 Days
Research Analyst
Switches, Server
Machines, Cables)
Analysis
of
1.2
1, 1.1
3 Days
Research Analyst
Network
1,
1.1,
2
Design of Network
4 Days
Designer
1.2
Design of Cloud
2.1
2
4 Days
Designer
Services
Installation of MS
2.2 Azure on Server 2, 2.1
1 Days
Designer
OS R2
Implementation of
Network
Engineer,
3
Client/
Server 2.2
7 Days
Network Administrator
Architecture
Configuration
of
3.1
3
1 Days
Network Administrator
Azure
3.2 Routers
and 2
8 Days
Network Engineer
3.3
3.4
3.5
4.1
4.2
switches
configuration for
Wired
Connectivity
of
WAN
Implementation of 2,
Security Features 2.2,
on Azure Cloud
3.1,
2,
Implementation of
2.2,
Security Features
3.1,
on Router
3.3
2,
Implementation of
2.2,
Security Features
3.1,
on Switches
3.3,
Checking
the
performance
of 3.3
Cloud Server
Checking
the 2.2,
performance
of 3.2,
Azures Working
4
Checking
of 2.2,
Network at User 3.2,
level
4.1
of
2.2,
at
4.2
2.1,
3, 6 Days
3.2
2.1,
3,
2 Days
3.2,
2.1,
3,
2 Days
3.2,
3.4
3 Days
3,
3.3, 2 Days
3,
4, 2 Days
4.3
Checking
Applications
User level
Documentation of
1, 2, 3, 4
User Manual
10 Days
5.1
Documentation of
1, 2, 3, 4
Network Manual
10 Days
5.2
Documentation of
1, 2, 3, 4
OS at cloud server
10 Days
3,
2 Days
Security
Analyst,
Network Administrator
Network
Engineer,
Network Tester
Network
Engineer,
Network Tester
Research
Analyst,
Security
Analyst,
Network Tester
Network Administrator,
Research
Analyst,
Network Tester
Research
Analyst,
Network Administrator,
Network Tester
Research
Analyst,
Security
Analyst,
Network Administrator,
Network Tester
Network Administrator,
Research
Analyst,
Security
Analyst,
Network
Engineer,
Designer
Network Administrator,
Research
Analyst,
Security
Analyst,
Network
Engineer,
Designer
Network Administrator,
Research
Analyst,
Security
Analyst,
Network
Engineer,
Designer
Table 6.3B
6.3 Security Implementation of routers and switches
External networks must be carefully considered as part of the overall
security for an enterprise organization. Cisco router plays an important
role in embedding security at the customer's access edge. A router may
include a firewall, dynamic multipoint virtual private network, Access
Data Point and other security functions that may be handled by separate
devices to secure the data for an organization. These have been
specifically designed to deliver high performance and high availability for
enterprise organization. Cisco 890 series router comes with a
comprehensive security solution that protects organizations' networks
from known and Internet vulnerabilities and attacks, while improving
employee productivity. There are different methods that can be utilised to
provide security in this the focus is on Zone based firewall that will block
the unwanted traffic whereas the other method used for security purpose
is DMVPN that secure IPsec traffic encryption and maintain data privacy.
The other one that will be used is IPS to protect organization network.
Routing:
Routing is the act of moving information across an inter-network from a
source to a destination. Along the way, at least one intermediate node
typically is encountered. Its also referred to as the process of choosing a
path over which to send the packets. Routing is often contrasted with
bridging, which might seem to accomplish precisely the same thing to
the casual observer. The primary difference between the two is that
bridging occurs at Layer 2 (the data link layer) of the OSI reference
model, whereas routing occurs at Layer 3 (the network layer). This
distinction provides routing and bridging with different information to
use in the process of moving information from source to destination, so
the two functions accomplish their tasks in different ways. The routing
algorithm is the part of the network layer software responsible for
deciding which output line an incoming packet should be transmitted on,
i.e. what should be the next intermediate node for the packet. For this
project, EIGRP routing protocol is used.
Benefits of EIRGP routing:
DEPARTMENT
S
IP
ADDRESSES
(NETWORK)
MANAGEMEN
T
ACCOUNTING
MARKETING
192.168.1.0/29
RESEARCH
AND
DEVELOPME
NT
-- ISP
CONNECTION
-----SWITCH----
ROUT
ER/SW
ITCH
NAME
R1
INTERFACE
IP ADDRESS ON
ROUTER (DEFAULT
GATEWAY)
Fa0/0.99
192.168.1.1
192.168.1.8/28
192.168.1.24/2
7
192.168.1.56/2
5
R1
R1
Fa0/0.10
Fa0/0.20
192.168.1.9
192.168.1.25
R1
Fa0/0.30
192.168.1.57
172.16.1.1/32
R1
Fa1/0
172.16.1.1
192.168.1.2/32
S1
FROM
MANAGEME
NT
192.168.1.2
essential as it aware the hub and spoke routers which packets can be
sent via the VPN network. This can be done either using static routes or
routing protocols. To configure the static routes is simple and all it
requires is to set the static routes on each router and point it to the other
networks
Intrusion Prevention System
The purpose of IPS (Intrusion prevention system) technology is to look at
all data inside network packets to determine if malicious traffic exists
within those packets. If an IPS determines that malicious traffic exists
within those packets, it will immediately drop the traffic and stop the
attack; in less-critical situations, the IPS may just generate an alert to let
the clients know that the suspicious traffic was found on the network.
Configuration of IPS
There are few steps that need to follow to configure the IPS to protect
the organization network from known signature based malware
The first thing to configure the IPS is to download the IOS IPS files from
cisco.
There are two files that are required to be downloaded such as
The next step is to create the IOS IPS configuration directory in the
device flash so that the features of the IOS IPS can be used. This
directory includes the signature files and the configuration. Moreover,
the name of this directory does not have to be anything specific, but the
name ips is recommended.
After the configuration of the directory than configure the cisco IOS IPS
crypto key. To ensure that the contents of the signature file are authentic,
Cisco has signed the master signature file with their private key. To
ensure that this master file can be verified, Ciscos public key must be
input into the device configuration. The following steps should be
followed to accomplish this:
1. Open the realm-cisco.pub-key.txt file that was downloaded from
Cisco and open it in a text editor.
2. Copy the contents of the file.
3. On the IOS IPS device, enter into global configuration mode with
the configure terminal command.
4. On the IOS IPS device, paste the contents from the text file at the
VLAN:
A Local Area Network (LAN) was originally defined as a network of
computers located within the same area. Today, Local Area Networks are
defined as a single broadcast domain. This means that if a user
broadcasts information on his/her LAN, the broadcast will be received by
every other user on the LAN. Broadcasts are prevented from leaving a
LAN by using a router. The disadvantage of this method is routers usually
take more time to process incoming data compared to a bridge or a
switch. More importantly, the formation of broadcast domains depends
on the physical connection of the devices in the network. Virtual Local
Area Networks (VLAN's) were developed as an alternative solution to
using routers to contain broadcast traffic.
The workstations, hubs, and repeaters together form a LAN segment. A
LAN segment is also known as a collision domain since collisions remain
within the segment. The area within which broadcasts and multicasts are
confined is called a broadcast domain or LAN. Thus a LAN can consist of
one or more LAN segments. Defining broadcast and collision domains in
a LAN depends on how the workstations, hubs, switches, and routers are
physically connected together. This means that everyone on a LAN must
be located in the same area The workstations, hubs, and repeaters
together form a LAN segment. A LAN segment is also known as a
collision domain since collisions remain within the segment. The area
within which broadcasts and multicasts are confined is called a broadcast
domain or LAN. Thus a LAN can consist of one or more LAN segments.
Defining broadcast and collision domains in a LAN depends on how the
workstations, hubs, switches, and routers are physically connected
together. This means that everyone on a LAN must be located in the
same area.
Devices within a VLAN can communicate with each other without the
need of Layer 3 routing. But devices in separate VLANs require a Layer 3
routing device to communicate with one another. For example, same
department vlans can communicate with each other without a router in
the same VLAN 10; different department vlans can not communicate
because of being in different VLANs same like router interfaces with
different network addresses.
VLAN NAME
MANAGEMENT
ACCOUNTING
MARKETING
RESEARCH AND
DEVELOPMENT
VLAN
ID
99
10
20
30
Host
Requirements
5 hosts
10 hosts
20 hosts
100 hosts
Port Allocation on
Switch
N/A
Fa 0/3 4
Fa0/5 8
Fa 0/6 - 12
ACL CREATION:
ACLs are used to control network access or to specify traffic for many
features to act upon. An extended ACL is made up of one or more access
control entries (ACEs). Each ACE specifies a source and destination for
matching traffic. You can identify parameters within the access-list
command, or you can create objects or object groups for use in the ACL.
For the purporse of this project external ACLs are used due to folloing
benefits.
6.4
Performance Analysis
A huge number of masses depend on the prospective of cloud
to
the
cloud
through
switches,
where
VLAN
is
also
implemented. So, the security of the switches are one of the most
important aspect. By putting the passwords on switches console and its
command line interfaces refrains all intruders to break in the switches. In
the same way, if any intruder wants to get the access of switches
remotely via telnet, he will not be able to get in due to the protected
passwords over telnet. Meanwhile, the data transmission including
usernames and passwords to get the access of the switches have been
encrypted by using the SSH version 2 (Secure socket shell). This protocol
encrypts all the information being propagated over the switches in order
to avoid man in the middle attacks. Whereas, other protocols like SSH
version 1, RSH, REXEC used to transmit all information in the plain text
[5].
including
requests
and
responses
from
clients
and
server
Firewall in the inside zone enables the inside users to open the sessions
to particular server. Whereas, the firewall policy for the outside zone
refrains all the outsiders from the direct access to the cloud. This
implementation of zone based firewalls makes the design quicker for
insiders and slightly slow for outsiders. And this is because all the
firewalls has to process every incoming packet, match it with the attacks
in its database, filtration of packets and its transmission to the next hope.
The entire process makes the system slightly slow but relatively secure
[6].
Dynamic multipoint VPN allows end users to scale small and big
IPSec
tunnels.
IPSec
protocol
encrypts
each
IP
Packet
in
specifications.
3DES
uses
three
independent
keys
for
encryption of each size 56bit and cumulatively 168bits [7]. But due to the
man in the middle attack, the efficient security it provides is 112bits, so it
falls down to 112bits. Whereas, MD5 algorithm uses 128bit hash value
for encryption for 512bit block size of data that cannot be reversed by
any mean, which makes the data more secure and quick. Because the end
user also has its own hash value, he just has to match this hash to the
received hash value. In this case no more processing is required.
ACL (Access Control List), is one of the great solution on from cisco
to avoid unwanted traffic from the network. It works from the general
logic to the specific and works as step by step (statement by statement)
in top to down approach. In this cloud computing environment, end users
will require the maximum and quick response from the cloud server for
requested data. By putting the ACL on the router will allow only the data
requested from server. Apart from this, all of the requests will be blocked
on the router, and this process will make the server robust and quick.
Because server will not have to process unnecessary requests, which will
make it more secure also.