Design and Implement Secure Enterprise Network Using Packet
Design and Implement Secure Enterprise Network Using Packet
Prepared by:
Yisak Nesiro 1587
Birhan Bayu 1068
2
Acknowledgment
First and for most we would like to thank our university of DTU and hosting company of
AWASH BANK. Then we are extremely grateful to the Department of Electrical and Computer
Engineering and for giving us the opportunity to carry out this project which is an integral part of
the curriculum. We have to express our heartily gratitude to the Awash Bank for hosting us to
apply this internship there. Next, we would like to thank Mr. henok, who Is Network
administrator manager of Awash Bank of HQ, who gave us permission for our request to
Internship program. In addition, we would like to thanks the networking staff of Awash Bank
Mr. Bereket, Mr. Habtu, Mr. mihiret, Mr. alemayehu and all other staffs for their friendly advice,
special supports and leadership during our internship period. Again, we would like to thank our
advisor Mr. Yosef B.for his support, guidance with his knowledge and idea. Finally, we extend
our gratefulness to one and all who are directly or indirectly involved in the successful
completion of this project work.
3
Table of Contents
Declaration........................................................................................................................................i
Acknowledgment.............................................................................................................................ii
Acronyms.....................................................................................................................................viii
Executive Summary.........................................................................................................................x
CHAPTER ONE..............................................................................................................................1
1.1. introduction...........................................................................................................................1
1.3.1. Vision..............................................................................................................................2
1.3.2. Mission...........................................................................................................................2
CHAPTER TWO.............................................................................................................................5
4
2.5.4. technical practice on router...........................................................................................11
2.7. Challenges and problems that we have faced and Measures Taken....................................15
CHAPTER THREE.......................................................................................................................17
CHAPTER FOUR.........................................................................................................................20
4.1. Abstract...............................................................................................................................20
4.2. Introduction.........................................................................................................................20
4.4. Objective.............................................................................................................................22
4.7. Limitation............................................................................................................................23
4.9.1. Overview......................................................................................................................25
4.10. Methodology.....................................................................................................................25
5
4.10.1. Network Design and Beautification...........................................................................26
4.10.2. Basic Settings to all devices + SSH + Standard ACL for SSH..................................27
4.10.3. VLAN Assignment + All Access and Trunk Ports on L2 and L3 Switches..............27
4.13.1. Result..........................................................................................................................41
4.13.2. Discussion...................................................................................................................43
CHAPTER FIVE...........................................................................................................................45
6
References......................................................................................................................................47
APPENDEX..................................................................................................................................48
7
List of figures
Fig. 1.1. Organizational structure of awash bank (2)......................................................................4
Fig.2.1.OSI vs TCP/IP Model........................................................................................................10
Fig.2.2. three level hierarchy model..............................................................................................10
Fig.2.2. layer 2 switch....................................................................................................................13
Fig.2.3. layer 3 switch....................................................................................................................14
Fig.2.4. cisco router.......................................................................................................................14
Fig.2.5. serial port console cable...................................................................................................15
Fig.2.6. different types of fiber optics cable..................................................................................15
Fig 4.2 Methodology block diagram.............................................................................................26
Fig 4.3 Overall system design.......................................................................................................37
Fig 4.4 logical diagram of project..................................................................................................41
Figure 4.5 Encryption of password................................................................................................42
Fig 4.6 User Authentication on WLC............................................................................................42
Fig 4.7 Phone call Checkup over IP Phone...................................................................................43
Fig 4.8 Wireless Lan Controller User Interface on PC..................................................................43
8
Acronyms
9
Access list ACL
Application centric infrastructure ACI
Edge Router ER
10
Executive Summary
The report contains all about the information that we have in last three months in Awash Bank.
During this training, we have learned and practiced numerous knowledge and skills about wired
and wireless network configuration and installation in Awash Bank. Internship is a program that
allows students to get practical knowledge from the working environment as well as
to experience the ability to work with people. It enables us to put into the skill, technique, and
knowledge that are important for success in our future work. As the main purpose of this
internship is, to create a linkage between the theory and practical issue we have gained different
practical knowledge in networking.
This report consists four main chapters. we have included in the first chapter background history,
vision and mission, main services of the organization. The second chapter of this report consists
basic concept of networking, networking devise with configuration. The third chapter of the
report describes the overall benefits we gained from this internship. It further briefs about the
theoretical and practical knowledge’s acquired and also the team, interpersonal and leader ships
skills we developed during the internship. Finally, the last chapter explains the conclusion and
recommendations for the concerned bodies.
11
CHAPTER ONE
1
population by encouraging the habit of saving, the provision of credit facilities and facilitating
efficient and fast payment systems. One of the core values of our bank is accessibility. We
always strive to improve our accessibility by means of different service delivery channels.
Currently, we are the most accessible private bank in the country, with a large footprint
of extensive branch network. In addition to branch networks, we provide our customers the
convenience of 24/7 service through ATMs, point of sale terminals, internet, mobile and agency
banking. Corporate social responsibility lies at the heart of Awash Bank’s activities since its
establishment. The Bank’s intent is to change the socio-economic situation of the communities
within which it operates by ploughing back funds to improve education, health and the
environmental and social wellbeing of the disadvantaged strata. The positive impact of our
activities is clearly indicated in the number of elementary schools built in collaboration with
NGOs, the health facilities improved and the trees planted in different parts of the country and
the like. Our success is measured by realization of our organizational goals and the objectives
specified in our strategy. In this regard, we have crafted a10-year strategic roadmap with
the theme ‘Transforming AIB: Vision 2025. It has ambitious financial and non-financial targets.
Never the less, our performance so far indicates that the Bank is on the verge of attaining those
targets much before 2025. Awash Bank has recorded above average banking industry growth
rates in most key financial performance indicators in the last decade. Indeed, Awash Bank has
recorded the fastest growth rate among private banks operating in the country. We own this
impressive achievement to the visionary leadership of our Board of Directors, dedicated
management team, committed staff and loyal customers.
1.3.2. Mission
“To provide innovative, Competitive and Diversified banking service accessible to the society
with qualified and committed staff in a profitable and socially responsible manner’’
2
1.4. Core values of an organization
• Corporate Citizenship-We value the importance of our role in national development
endeavor and step-up for commitment We abide by the law of Ethiopia and other
countries in which we do business. We care about society's welfare and the environment.
• Customer Satisfaction-We strive to excel in our business and satisfy our customers.
• Quality Service-We are committed to offer quality service to our customers' and aspire
to be branded with quality in the minds of our customers and the general public.
• Innovation-We encourage new ideas that can improve customers' experience and the
Bank's performance.
• Teamwork-We recognize the importance of teamwork for our success. we respect
diversity of viewpoints.
• Integrity-We are committed to the highest ideal of honor and integrity.
• Employees-We recognize our employees as valuable organizational resources.
• Public Confidence-We understand that the sustainability of our business depends on our
ability to maintain and build up the public's confidence.
3
• Provident Fund Solution Account
Digital Channels
• Mobile Banking
• Agency Banking
• Debit Card Services
• Internet Banking
4
CHAPTER TWO
The general objective of this internship program is to introduce the practical and tangible world
to the engineering student by relating the theoretical knowledge what we know in Debretabor
University for the past four years.
Specific Objective
5
After a lot of fatigues through Mr. henok goodwill we get place in awash bank accepts our
request. he introduced us with the overall working system of the team and also, he assigned to us
a supervisor Mr. Bereket. Finally, we agree to start our internship based on our schedule at the
middle of April.
In this office there are a lot of tasks are done around networking. The networks of awash bank
controlled in this office starting from configuration and installation for new branch, maintenance
when system corrupted both in branch and main network that comes from ISP.so this section is
more secure.
6
Nodes: Nodes are devices that are connected to a network. These can include computers,
Servers, Printers, router, switch and other devices.
Protocol: A protocol is a set of rules and standards that govern how data is transmitted
over a network. Examples of protocols include TCP/IP, HTTP or HTTPS, and FTP.
Topology: Network topology refers to the physical and logical arrangement of nodes on
a network. The common network topologies include bus, star, ring, mesh, and tree.
Service Provider Networks: These types of Networks give permission to take Network
Capacity and Functionality on lease from the Provider. Service Provider Networks
include Wireless Communications, Data Carriers, etc. e.g. Telecommunication,
Safaricom
IP Address: An IP address is a unique numerical identifier that is assigned to every
device on a network. IP addresses are used to identify devices and enable communication
between them.
DNS: The domain name system (DNS) is a protocol that is used to translate human-
readable domain names (such as www.google.com) into IP addresses that computers can
understand.
Firewall: A firewall is a security device that is used to monitor and control incoming and
outgoing network traffic. Firewalls are used to protect networks from unauthorized access
and other security threats.
Types of Enterprise Computer Networks
LAN: A Local Area Network (LAN) is a network that covers a small area, such as an office or a
home. LANs are typically used to connect computers and other devices within a building or a
campus.
WAN: A Wide Area Network (WAN) is a network that covers a large geographic area, such as a
city, country, or even the entire world. WANs are used to connect LANs together and are
typically used for long-distance communication.
Cloud Networks: Cloud Networks can be visualized with a Wide Area Network (WAN) as they
can be hosted on public or private cloud service providers and cloud networks are available if
there is a demand. Cloud Networks consist of Virtual Routers, Firewalls, etc.
OSI vs TCP/IP Network models
7
OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer. The OSI has been
developed by the International Organization. For Standardization and it is 7-layer architecture.
Each layer of OSI has different functions and each layer has to follow different protocols. The 7
layers are as follows:
Physical Layer: The lowest layer of the OSI Model is responsible with transmitting individual
bit over medium like fibre, coaxial copper, wireless.
➔ fibre between data center devices, branches
Data link Layer: It’s responsible for transmitting frame from one node to other.
Network Layer: It’s responsible for receiving frames from the data link layer, and delivering
them to their intended destinations among based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses, such as IP (internet protocol).
• Ipv4 addressing: It uniquely identifies a network interface in a device. IP is a part of the
TCP/IP suite, where IP is the principal set of rules for communication on the Internet.
• Subnetting: is the practice of dividing a network into two or more smaller networks. It
increases routing efficiency, enhances the security of the network, and reduces the size of
the broadcast domain.
• Network address translation (NAT): is a technique commonly used by internet service
providers (ISPs) and organizations to enable multiple devices to share a single public IP
address. By using NAT, devices on a private network can communicate with devices on a
public network without the need for each device to have its own unique IP address.
Transport Layer: it manages the delivery and error checking of data packets. It regulates the
size, sequencing, and ultimately the transfer of data between systems and hosts. It can be either
UTP or TCP
Session Layer: it controls the conversations between different computers.
Presentation Layer: The presentation layer formats or translates data for the application layer
based on the syntax or semantics that the application accepts.
Application Layer: is the highest abstraction layer of the TCP/IP model that provides the
interfaces and protocols needed by the users.
This layer uses a number of protocols (HTTP, FTP, SMTP, DNS, TELNET, SNMP)
8
TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols
that define the standards for transmitting data over computer networks, including the internet.
The TCP/IP protocol is the foundation of the internet and enables devices to communicate with
each other using a common language.
TCP/IP Layers
Network Access Layer: It is the lowest layer of the TCP/IP Model. It is the combination of the
Physical Layer and the Data link layer which present in the OSI Model. Its main responsibility is
to the transmission of information over the same network between two devices.
Internet/Network Layer: It is the third layer of the TCP/IP Model and also known as the
Network layer. The main responsibility of this layer is to send the packets from any network, and
they arrive at the goal irrespective of the route they take.
Transport Layer: It is responsible for the reliability, flow control, and correction of data that is
being sent over the network. There are two protocols used in this layer are User Datagram
Protocol and Transmission control protocol.
Application Layer: An application layer is the topmost layer within the TCP/IP model. When
one application layer protocol needs to communicate with another application layer, it forwards
its information to the transport layer.
9
Fig.2.1.OSI vs TCP/IP Model
Access - controls user and workgroup access to the resources on the network. This layer
usually incorporates Layer 2 switches and access points that provide connectivity
between workstations and servers. You can manage access control and policy, create
separate collision domains, and implement port security at this layer.
Distribution - serves as the communication point between the access layer and the core.
Its primary functions are to provide routing, filtering, and WAN access and to determine
how packets can access the core. This layer determines the fastest way that network
service requests are accessed for example, how a file request is forwarded to a server and,
if necessary, forwards the request to the core layer. This layer usually consists of routers
and multilayer switches.
Core - also referred to as the network backbone, this layer is responsible for transporting
large amounts of traffic quickly. The core layer provides interconnectivity between
distribution layer devices it usually consists of high-speed devices, like high end routers
10
and switches with redundant links.
11
Routers use routing tables to determine the next hop address to which the packet should be
forwarded.
Types of routing
1. Static Routing:
• Manual configuration: Network administrators manually define routes for each
destination network.
• Simple networks: Suitable for small, static networks with few changes.
• Limited scalability: Difficulty in managing large networks or frequent topology
changes.
• Less efficient: Can lead to suboptimal routing choices if not configured carefully.
2. Default Routing:
• Single default route: All traffic destined for unknown networks is sent to a single
default gateway.
• Simplicity: Easy to configure and manage.
• Less flexibility: Limited control over traffic flow.
• Potential inefficiency: May not always select the most efficient path.
3. Dynamic Routing:
• Automatic route updates: Routers exchange routing information with each other
to discover and update routes dynamically.
• Scalability: Well-suited for large and complex networks.
• Efficiency: Can adapt to network changes and select optimal routes.
• Complexity: Requires more configuration and management overhead.
12
Link-State Protocols:
• OSPF (Open Shortest Path First): Highly scalable and efficient, widely used in
large networks.
• IS-IS (Intermediate System-to-Intermediate System): Similar to OSPF but
with a different focus on hierarchical networks.
Path Vector Protocol:
• BGP (Border Gateway Protocol): Used for routing between autonomous
systems (ASes) on the internet.
13
Layer 3 Switch: A Layer 3 switch is a special network device that has the functionality of a
router and a switch combined into one chassis. It works in our network by simply allowing
connected devices that are on the same subnet or virtual LAN (VLAN) to exchange information
at lightning speed, just like a switch that operates in the data link layer of the OSI model, but it
also has the IP routing intelligence of a router built into it.
Router: a router is most commonly an OSI Layer 3 device, since its forwarding decision is based
on the information of the OSI Layer 3 the destination IP address. Routers divide broadcast
domains, provide full duplex communication, and have traffic filtering capabilities.in awash
bank routers are used for branch communication, interface for ISP, interfaces for DMZ zone,
used for vlan communication.
Console cable: also known as Cisco cables, rollover cables and management cables - are
designed for a specific purpose. They connect Cisco networking devices to terminals or PCs for
configuration. Typically, the Cisco end will connect via RJ45, and the terminal end will
conclude in a serial connection.
14
Fig.2.5. serial port console cable
Fiber optics cable: also known as optical fiber cable, is a type of Ethernet cable which consists of
one or more optic fibers that are used to transmit data. It is an assembly similar to an electrical
cable while it is used to carry light and the fiber optic cable price is much higher than that of
copper cable. The cables used in awash bank data center networking because data center needs
more security.
16
CHAPTER THREE
3.THE OVERALL BENEFITS OF INTERNSHIP
During these three months of our internship program at Awash Bank we obtain many benefits we
can able to understand the objective of our stream, how it is broad and essential for the planet.
From internship many experiences we gained when what theoretically learned is brought to
practical one. There for internship enables students comparing theoretical knowledge with
practical world. in general, we have going the following important and interesting benefits.
Which are:
• Improving theoretical knowledge
• Improving Practical Skills
• Leadership skill
• Work ethics related issue
• Entrepreneur ship skill
• Interpersonal communication skills
These used benefits are discussed below briefly
17
3.2. Improving Practical Skills
The first and foremost important of internship is for students to have practical skill. When we
started working in the company everything is new for ours. we had only theoretical knowledge
of the work. It was really fascinating and inspiring to see and experience the lessons we have
been learning for the past 4 years and so we tried to experience and learn every works as much
as we can practice skills we gland in the company are-
• How the networking configuration works
• Designing networking
• Working on software
• How to sharing
• Able to secure
18
These are what we understand at internship time-
• Responsibility
• Office discipline
• Punctuality
• Reliability
• Honesty
• Cooperation
19
CHAPTER FOUR
PROJECT TITLE: - DESIGN SECURE ENTERPRICE NETWORK
USING PACKET TRACER
4.1. Abstract
This project outlines a comprehensive approach to strengthening network security in an
enterprise environment, simulated using Packet Tracer. As organizations depend on digital
infrastructure, securing network devices like routers is crucial. Our solution incorporates a multi-
layered security strategy, including strong password policies, encryption via SSH, and
administrative closure of unused ports. VLANs are used to segment traffic and enhance security,
while ACLs are configured to control packet forwarding based on predefined rules. Additionally,
firewall inspection policies and interface security zones are implemented to protect the network.
The system also covers essential configurations such as STP port fast, BPDU guards, Ether-
channel, HSRP, inter-VLAN routing, DMZ setup, DHCP server configuration, OSPF routing,
wireless network, and VoIP setups. By integrating these techniques, the project not only secures
the network but also improves traffic flow, reducing latency and optimizing performance. This
robust framework ensures business continuity and guards against evolving cyber threats,
enhancing the integrity and resilience of enterprise operations.
4.2. Introduction
In today's interconnected world, networks have become the lifeblood of businesses and
individuals alike. The exponential growth of digital technologies has transformed the way we
communicate, collaborate, and conduct business. However, this digital revolution has also
brought forth new challenges, particularly in the realm of cyber security.
Cyber threats, ranging from simple phishing attacks to sophisticated, targeted intrusions, pose
significant risks to organizations of all sizes. As cybercriminals continue to innovate, it is
imperative to implement robust security measures to protect sensitive data, maintain operational
integrity, and ensure business continuity.
This project aims to address these challenges by designing and implementing a secure network
infrastructure. By employing a multi-layered security approach, we seek to safeguard our
network from unauthorized access, data breaches, and other cyber threats.
20
Multi-access control is a security technology that can regulate who uses resources in a computing
environment. It is a method to improve network security by limiting the availability of network
resources of terminal devices. Access control list (ACL) is one of multiple access control
technologies. It is very powerful security feature of Cisco IOS. By using ACL, I can deny
unwanted access to the network while allowing internal users appropriate access to necessary
services. SSH, or Secure Shell, is a cryptographic network protocol that provides a secure way to
access remote computers. It's like a secure tunnel that protects your data as it travels between
your device and the remote system. Firewall inspection policies are a set of rules defined within
a firewall to scrutinize network traffic. They act as the gatekeeper, determining which traffic is
allowed to pass through the firewall and which is blocked. By analyzing various parameters of
network packets, such as source and destination IP addresses, ports, protocols, and payload
content, firewalls can effectively filter and control network traffic.
21
availability of information to its necessary recipients at the predetermined times without
exception. The three principles that network security must adhere to evolved from years of
practice and experimentation that make up network history.
Statement of problem
During Our internship at Awash Bank, We saw on Monitoring and problem solving around
secure network design and the implementation of an enterprise network. In our practice at the
Awash Bank, we focused on various aspects of network management, including Monitoring,
configuration, and maintenance.
We identified several challenges within Awash Bank, such as Using only one ISP, network
security, network speed, and network design like Using Router at Distribution layer Using router
on-stick Inter VLAN rather than Using the Scalable SVI inter VLAN Routing. We decided to
address the issue of network design, as it is a fundamental aspect for any organization. One of
the primary challenges we faced was budget constraints, as the costs associated with designing a
robust network system can be significant.
To enhance the network design, we proposed Using two ISP. This design approach offers a cost-
effective solution while enabling the integration of network systems. It ensures good security and
leverages high-quality devices at lower prices. Additionally, ensuring the availability of the
necessary equipment is crucial for the successful installation of all network components.
4.4. Objective
4.4.1. General objective
To design and Implement secure network system for Finance Company
4.4.2. Specific objective
To configure basic security measures on the routers, switches and
servers like hostname, password, banner message, password
encryption, disabling unused port, use DHCP address range for used
port, etc.
To Create VLANs (Virtual Local Area Network).
To configure firewall Inspection Policies
To configure firewall interface security zones and levels
To configure wireless network configuration
22
To configure VOIP
To configure Spanning tree port fast and BPDU guards
To configures Inter VLAN’s, OSPF, Ether-channel, HSRP
Configure NAT
23
4.7. Limitation
The limitation of using multiple access control technologies to protect network devices is
that we cannot achieve a complete security solution. Security is not absolute; it’s an ongoing
process. It’s essential to strike a balance between protection and availability, allowing for a
reasonable level of defense against threats. While Cisco Packet Tracer is a useful
configuration tool, it cannot match the performance of a fully deployed network.
24
enforce access control lists (ACLs) to regulate traffic between VLANs, further enhancing
security measures. (8) provides a comprehensive framework for improving cybersecurity across
critical infrastructure, outlining best practices for risk management and emphasizing the need for
continuous monitoring and assessment of security measures. (8) complements this by discussing
specific strategies for enterprise network security, including the establishment of security zones
and the implementation of robust authentication mechanisms.
As organizations evolve, so too do the threats they face. (7) note that emerging technologies,
such as cloud computing and the Internet of Things (IoT), introduce new vulnerabilities that
must be addressed in network design.
Admin can access all layer 3 Switches, switches and end user by using IP address of
management VLAN. The password that be created and encryption is done crypto command it
must be hidden from any one even authorized and unauthorized user. The ACL filter any IP
address in and out of the router through the command that be upload in it deny or permit.
VLAN connect in building or department it simply
4.10. Methodology
We observed and identified the problem of Awash bank then, gathered all necessary data and
25
information needed for design of the Data
system.
collection
And also,
method
we identified and install a software
that suitable for the design of the project i.e., Cisco packet tracer. Finally, designing the
network diagram on Cisco packet tracer, configuring all the devices, make password
encryption, create VLAN, router, Layer3 switch, switch, Wireless LAN controller
(WLC),VOIP and firewall configuration for Simulation of the network.
Observation
Literature review
This section outlines the approach to network design and beautification, emphasizing both
functionality and aesthetics.
26
Network Design involves careful planning to ensure a robust infrastructure. Key components
include selecting the appropriate topology (e.g., star or mesh) to optimize data flow, specifying
hardware like routers and switches based on performance needs, and developing an effective IP
addressing scheme to avoid conflicts. Additionally, incorporating redundancy ensures fault
tolerance and network reliability, while scalability allows for future growth without significant
reconfiguration.
4.10.2. Basic Settings to all devices + SSH + Standard ACL for SSH
This section outlines the essential configurations required for all network devices, focusing on
establishing secure management access and controlling network traffic.
Basic Settings to All Devices involve standardizing configurations across the network. This
includes setting device hostnames, configuring domain names, and ensuring consistent time
settings using protocols like NTP. Additionally, enabling password protection for console and
auxiliary access is crucial for maintaining device security.
Secure Shell (SSH) is implemented to facilitate secure remote management of devices. Unlike
Telnet, SSH encrypts data during transmission, protecting sensitive information from
interception. The setup involves generating SSH keys, enabling the SSH server on devices, and
configuring user authentication to ensure only authorized personnel can access network devices.
27
Standard Access Control Lists (ACLs) are employed to restrict SSH access to specific IP
addresses or networks. By defining rules within the ACL, we can permit or deny traffic based on
source addresses, enhancing security by limiting management access to trusted hosts only.
4.10.3. VLAN Assignment + All Access and Trunk Ports on L2 and L3 Switches
A VLAN is a logical group of workstations, servers, and network devices that appear to be on
the same Local Area Network (LAN) despite their geographical distribution. In a nutshell,
hardware on the same VLANs enable traffic between equipment to be separate and more secure.
For example, you might have an Engineering, Marketing, and Accounting department. Each
department has workers on different floors of the building or in other building, but they still need
to access and communicate information within their own department. It is essential for sharing
documents and web services.
Access and trunk ports are essential components in the configuration of Layer 2 (L2) and Layer 3
(L3) switches, particularly for VLAN management. Access ports connect end devices like
computers and printers and carry traffic for a single VLAN, tagging all packets with the same
VLAN ID. This ensures effective segmentation within the network.
In contrast, trunk ports connect switches and can carry traffic for multiple VLANs
simultaneously. They use protocols like IEEE 802.1Q to tag packets with their respective VLAN
IDs, allowing for efficient communication between different VLANs. On Layer 3 switches, trunk
ports facilitate inter-VLAN routing, enabling traffic to flow seamlessly without requiring
external routers. Proper configuration of access and trunk ports is crucial for optimizing network
28
199 BLACK-HOLE -
DMZ: The DMZ will be Assigned IP addresses from the range 10.11.11.0/27
PUBLIC Addresses: Addresses from the range 105.100.50.0/30 from Ethiotelecom and
197.200.100.0/30 from safaricom.
4.10.4. STP Portfast And BPDU guard configurations
This section addresses the configuration of Spanning Tree Protocol (STP) features, specifically
PortFast and BPDU Guard, to enhance network stability and security.
STP PortFast is a feature that allows switch ports connected to end devices (like computers or
printers) to bypass the usual STP listening and learning states, transitioning directly to the
forwarding state. This minimizes the time it takes for devices to connect to the network,
improving user experience. PortFast should only be enabled on ports that connect to end devices,
as it can lead to network loops if applied to switch-to-switch connections.
BPDU Guard is a protective mechanism that works in conjunction with PortFast. When
enabled, BPDU Guard will disable a port if it receives a Bridge Protocol Data Unit (BPDU).
This is crucial in preventing misconfigurations or rogue switches from impacting the network's
STP topology. By configuring BPDU Guard on PortFast-enabled ports, we ensure that any
accidental connection to another switch will trigger a port shutdown, thus maintaining network
stability.
This section covers the implementation of EtherChannel, a network technology that allows the
aggregation of multiple physical links into a single logical link. This enhances both bandwidth
and redundancy between switches or other networking devices.
29
4.10.6 HSRP and Inter VLAN
This section focuses on the implementation of Hot Standby Router Protocol (HSRP) and Inter-
VLAN routing, both of which are crucial for ensuring high availability and efficient
communication across VLANs in a network.
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol designed to
ensure high availability for IP networks. HSRP enables multiple routers to work together as a
single virtual router, providing a reliable default gateway for devices within a VLAN. Key
features include:
1) Active and Standby Routers: HSRP designates one router as the active router, which
handles traffic, while a standby router is ready to take over if the active router fails. This
minimizes downtime and ensures continuous network service.
2) Virtual IP Address: HSRP uses a virtual IP address that serves as the default gateway
for end devices. This allows for seamless failover without requiring reconfiguration on
client devices.
3) Priority and Preemption: Routers can be assigned priority values, influencing which
router becomes active. Preemption allows a higher-priority router to reclaim the active
role when it comes back online.
4) Inter-VLAN Routing is the process of enabling communication between different
VLANs within a network. This is essential in environments where devices in separate
VLANs need to communicate. Inter-VLAN routing can be achieved through:
5) Router-on-a-Stick: This method involves using a single router with a sub interface for
each VLAN. The router handles traffic between VLANs, enabling devices in different
VLANs to communicate.
6) Layer 3 Switches: Modern networks often use Layer 3 switches, which can perform
routing functions directly. This approach provides faster communication between VLANs
without the need for an external router.
By effectively implementing HSRP and Inter-VLAN routing, we can enhance network reliability
and facilitate efficient communication across different segments of the network. This ensures
that devices remain connected and that failover mechanisms are in place to minimize disruptions.
30
4.10.7 OSPF on Firewalls, Routers and Layer3 Switches
This section discusses the implementation of Open Shortest Path First (OSPF), a widely used
link-state routing protocol, across firewalls, routers, and Layer 3 switches in a network
infrastructure.
Overview of OSPF: OSPF is designed to provide efficient and dynamic routing within large and
complex networks. It uses a hierarchical structure, dividing the network into areas to optimize
route management and reduce overhead. OSPF is well-suited for both large enterprise networks
and service provider environments.
OSPF Configuration on Routers: Configuring OSPF on routers involves enabling the protocol
and defining OSPF areas. Key steps include:
1. Router ID: Assigning a unique router ID to each OSPF-enabled router, which identifies
it within the OSPF domain.
2. Area Configuration: Defining OSPF areas, typically starting with Area 0 (the backbone
area) and then adding other areas to improve scalability.
3. Network Statements: Specifying which interfaces participate in OSPF by using network
statements to associate IP address ranges with OSPF areas.
OSPF on Layer 3 Switches: Layer 3 switches can also implement OSPF to facilitate routing
between VLANs. The configuration process is similar to that of routers, focusing on enabling
OSPF and defining VLAN interfaces as OSPF-enabled networks.
31
4.10.8. Firewall Interface Security Levels and Zones
This section explores the configuration of security levels and zones in firewall systems, which
are critical for managing network security and controlling traffic flow.
Security Levels: In a firewall, interfaces are assigned security levels that determine the level of
trust associated with each interface. This is typically represented on a scale from 0 to 100, where:
Level 0: Represents the least trusted interface, such as the internet-facing interface. This zone is
highly scrutinized and closely monitored.
Level 100: Represents the most trusted interface, such as the internal network. Traffic from this
zone is considered safe and subject to fewer restrictions.
The assignment of security levels helps the firewall determine the rules for allowing or denying
traffic between interfaces. For example, traffic is generally allowed from a higher security level
to a lower security level, while traffic in the reverse direction is restricted unless explicitly
permitted.
Security Zones: Firewalls can also be configured into zones, which are logical groupings of
interfaces that share similar security policies. Common zones include:
Inside Zone: Represents the trusted internal network where devices are typically considered
secure.
Outside Zone: Represents the untrusted external network, usually the internet, where threats are
more prevalent.
DMZ (Demilitarized Zone): An optional zone that hosts publicly accessible services (e.g., web
servers) while providing a buffer between the internal network and the outside world.
Traffic Control: Configuring security levels and zones enables granular control over traffic
flow. Rules can be established to dictate how traffic is permitted or denied between zones. This
setup helps in:
1. Access Control: Defining which devices or users can communicate across zones based on
established security policies.
32
2. Threat Mitigation: Reducing the attack surface by isolating less secure areas (like the DMZ)
from the trusted internal network.
This section outlines the configuration of firewall inspection policies, which are essential for
managing and controlling the flow of traffic through a network firewall while ensuring security
and compliance.
Overview of Inspection Policies: Firewall inspection policies define how different types of
traffic are handled by the firewall. These policies analyze incoming and outgoing traffic to
enforce security measures, detect threats, and maintain network integrity. The primary goals are
to prevent unauthorized access, protect sensitive data, and ensure legitimate traffic is permitted.
Configuration Steps:
1. Traffic Classification: The first step involves identifying and classifying traffic types
(e.g., HTTP, HTTPS, FTP, DNS). This classification helps in applying appropriate
inspection rules tailored to the nature of the traffic.
2. Stateful Inspection: Implementing stateful inspection allows the firewall to track the
state of active connections and make decisions based on the context of the traffic. This
means that the firewall can recognize and permit return traffic for established sessions,
enhancing security without hindering performance.
3. Policy Definition: Each inspection policy should clearly define rules for various traffic
types. This includes:
Permit/Deny Rules: Establishing which traffic is allowed or blocked based on
source, destination, and application type.
Deep Packet Inspection (DPI): Enabling deeper analysis of packets to detect
malicious content or anomalies beyond the header information.
4. Logging and Alerts: Configuring logging for traffic that matches inspection policies
helps in monitoring network activity and detecting potential threats. Alerts can also be set
up to notify administrators of suspicious activities or policy violations.
33
5. Policy Testing and Optimization: After configuration, it’s important to test the
inspection policies to ensure they function as intended. Continuous monitoring and
optimization may be necessary to adapt to evolving threats and changing network
conditions.
In this section, we detail the configuration of the wireless network, which is critical for providing
secure and reliable connectivity. The following steps outline the methodology for setting up the
wireless network:
1. SSID Configuration: Assign a unique Service Set Identifier (SSID) to the wireless
network to allow users to identify and connect to it easily. Default SSIDs should be
avoided to enhance security.
2. Security Protocols: Implement robust security measures by utilizing WPA2 or WPA3
with AES encryption. This ensures secure communication and prevents unauthorized
access. Appropriate authentication methods, such as Pre-Shared Key (PSK) or Extensible
Authentication Protocol (EAP), should also be configured.
3. Channel Selection: Analyze the wireless environment to select the optimal channel for
the network. This minimizes interference from neighboring networks and improves
overall performance.
4. Power Settings: Adjust the transmission power of access points to effectively manage
coverage. This helps eliminate dead zones and reduces signal overlap in areas with
multiple access points.
5. Guest Network Configuration: Establish a separate guest network to isolate guest
traffic from the main internal network. This protects sensitive resources while providing
internet access to guests.
34
6. Quality of Service (QoS): Implement QoS settings to prioritize critical traffic types, such
as voice and video, ensuring consistent performance for these applications.
7. Monitoring and Management: Continuously monitor the wireless network for
performance issues and security threats. Utilize network management tools for real-time
analysis and troubleshooting to maintain optimal network performance.
By following these steps, we aim to create a secure, efficient, and user-friendly wireless network
that meets the needs of all users while protecting organizational resources.
This section outlines the configuration of Voice over IP (VoIP) systems, which are essential for
enabling efficient communication within organizations. Proper configuration ensures high-
quality voice calls and integrates seamlessly with existing network infrastructure. The following
steps are key to setting up VoIP:
35
6. Testing and Validation: Conduct thorough testing of the VoIP system, including making
test calls to evaluate call quality, connection stability, and latency. Address any issues
before full deployment.
7. User Training and Support: Provide training for users on how to utilize the VoIP
system effectively. Ensure that support resources are available for troubleshooting and
assistance.
By following these steps, we aim to establish a reliable and secure VoIP system that enhances
communication within the organization while optimizing network resources.
36
4.11. System design
Internet
ISP ISP
R R
FW FW
SW
L3 S L3 S WLC R
SW SW SW SW SW
SW
PC PC PC PC PC
SERVER
37
In the above diagram, the first step in establishing physical security is to define who is authorized
to install, remove, move, and update network devices such as routers and firewalls. This includes
determining who can connect directly to the router via console or other access ports. A well-
planned network design enhances both security and functionality, ensuring that device placement
and cabling minimize unauthorized access while optimizing performance. It is crucial to
implement a comprehensive password policy for all network devices, including minimum
character lengths for administrator and user passwords, and to enable SSH for secure remote
management. Standard Access Control Lists (ACLs) should be configured to restrict access
based on user roles and responsibilities, providing an additional layer of security. Proper VLAN
assignment and the configuration of access and trunk ports on Layer 2 and Layer 3 switches play
a vital role in segmenting network traffic, limiting access to sensitive resources, and enhancing
overall security. Additionally, implementing Spanning Tree Protocol (STP) features like PortFast
and BPDU Guard prevents network loops, ensuring topology stability. Configuring
EtherChannel increases bandwidth and provides redundancy, which is essential for maintaining a
reliable network. Effective subnetting and IP addressing improve network management and
allow for better control over communication pathways. The implementation of Hot Standby
Router Protocol (HSRP) provides redundancy across VLANs, while Open Shortest Path First
(OSPF) enhances routing efficiency within the network. Firewalls should be configured with
appropriate security levels and zones to control traffic flow, and inspection policies must be
established to analyze traffic and enforce security measures, preventing unauthorized access.
Furthermore, secure wireless configurations and robust VoIP setups are essential to protect
wireless communications and voice traffic. To safeguard access to network devices, it is
imperative to configure and enable secret passwords for console, auxiliary, and VTY ports,
encrypting all passwords using the service password-encryption command to thwart
recovery attempts. Disabling the password recovery feature further protects against unauthorized
access during a router reboot. Lastly, controlling Virtual Terminal Lines (VTYs) is critical; each
VTY should accept connections only through necessary protocols, and the last VTY can be
restricted to specific administrative workstations, ensuring that access remains tightly controlled.
By integrating these strategies, we can establish a secure, efficient, and reliable network
infrastructure that meets organizational needs while minimizing the risks associated with
unauthorized access.
38
4.12 Material Requirement
To carry out the project there are both hardware and software requirements needs to be fulfilled.
4.12.1. Hardware Requirements:
Routers (Router-PT),
Layer 3 Switches
Switches (2960),
Printers
Computers and PC
Firewalls
IP Phones
39
program that distributes web pages on request. The basic purpose of a web server is
to store, process and deliver web pages to the users. This intercommunication is
done using the Hypertext Transfer protocol.
Router: is a component of network that sends data Packets over a network or the Internet to the
destination, through a process known as routing. The process of roughing occurs at layers 3
(network layer such as internet protocol) protocol stack of the seven-layer OSI. Router serve as a
liaison between two or more network to carry data from one network to another.
Layer 3 Switch: is a switch that operates at the network layer of the OSI model and combines
the functionalities of both a switch and a router. Unlike traditional Layer 2 switches, which only
forward data based on MAC addresses, Layer 3 switches can route traffic between different
VLANs (Virtual Local Area Networks) using IP addresses. This capability allows them to
perform inter-VLAN routing, reducing the need for separate routers and improving overall
network efficiency. Layer 3 switches also support advanced routing protocols, enabling them to
handle complex network topologies.
Switch: is a device that sends data in the form of packets from one user to another user by
looking at the physical device address i.e. MAC address or Media Access Control. It determines
to which MAC address the packet belong to and if the packet belong to none of the port then it
sends the packet to all the ports. A switch has an advantage to function as Router as well.
ISP (Internet service provider); is a company that provides its customers access to the internet
and other web services. In addition to maintaining a direct line to the internet, the company
usually maintains web servers.
4.12.2. Software Requirement
Packet tracer
Cisco® Packet Tracer® is software developed by Cisco® and serves to help
simulate the network topology and configuration. Version to be used is
Cisco® Packet Tracer® version 5.3.3.0019. Features that are provided by
packet tracer are to be able to create logical and physical topology and its
configuration on each element. Element – element includes network devices
such as cables, routers, switches, hubs, and end users.
40
4.13. Result and discussion
4.13.1. Result
This chapter is all about results we get while simulating our work on packet tracer software.
Some screenshots are included just for simple understanding of the idea and giving visual
understanding of the designed project.
41
Figure 4.5 Encryption of password
42
Fig 4.7 Phone call Checkup over IP Phone
4.13.2. Discussion
We have discussed secure network design for Enterprise Network and configure each network
device to protect from external and internal unauthorized user using some technique that is
43
necessary. Filter every packet in and out of The Firewall’s with in source Ip address correctly.
Conclusion
This project is deal about secure Enterprise network design of the finance company network has
been established in a simulated environment. The routers, Firewalls, DMZ, Switches, WLC,
VOIP, Servers and the computer system were configured accordingly. Packets were sent from
one computer to the other and the transmission of such data to their destination was successful in
an efficient manner. Through the network, emails and files can be sent and received within staff
members as well as outside world of the institution in desired way. In order to provide security to
the network various methods are implemented. Password encryption is also applied on the
switches and router for restricted usage. The authentication is done within the network. The ACL
allows only those files to flow from the server that are allowed for the staff. With addition to this
VLANs are installed for the better security and protection of the network. And also, remote
access is allowed for management VLAN only, The HSRP also used in traffic management.
Recommendation
This project has been successfully done with simulation using packet tracer, but it is better to
implement the hardware design in the future works for the project to be more applicable, relevant
and also it can be extended to additional observing framework by including an SSH/Telnet client
like Putty (Software which is used to remotely access and configure network device). Security
can be provided by creating filters based on source addresses, destination addresses, protocol,
port number and other features are used for packet-based filtering for packets that traverse the
network in the future. In addition, we will add branches by using advanced routing protocols like
SDWAN.
44
CHAPTER FIVE
45
5.2.2. To the University
• Before sending a student to internship, the university should inform the student where
and what kind of place he/she has to go out. facilitate the place where the student has to
go out and work, or if it is possible should expand the laboratory in the campus. we
recommend this.
46
References
1. S.C, Awash Bank. wikipedia. [Online] november 29, 1994. [Cited: Julay 25, 2024.]
https://en.wikipedia.org/wiki/Awash_International_Bank.
2. bank, awash. www.awashbank.com. www.awashbank.com. [Online] october 1, 2024.
http://www.awashbank.com/.
3. cisco. study ccna. ccna.com. [Online] september 26, 2024. https://study-ccna.com/.
4. center, Cisco Certifications & Training. cisco networking academy. www.netacad.com.
[Online] october 1, 2024. https://www.netacad.com/.
5. Maughan, M. Designing secure Networks:a Guide to network security principles. s.l. :
Springer, 2019.
6. W., Stalling. network Security Essentials: Applications And Standards. 2020.
7. Zwick, R. Enterprise network security architecture : A Comprensive Guide to design and
implementation . 2020.
8. Sullivan, D. The Complete Guide to Network Security. s.l. : Packet Publishing, 2021.
47
APPENDEX
48
Router(config-if)#no sh
Router(config-if)#int g0/0/2
Router(config-if)#ip add 30.30.30.1 255.255.255.252
Router(config-if)#no sh
Router(config)#int gig0/0/0
Router(config-if)#ip routing
Router(config-if)#no sh
Router(config-if)#router ospf 35
Router(config-router)#router-id 1.1.4.4
Router(config-router)#network 30.30.30.0 0.0.0.3 area 0
Router(config-router)#network 197.200.100.0 0.0.0.3 area 0
Router(config-router)#network 197.200.100.4 0.0.0.3 area 0
Router(config-router)#do wr
Configurations on cluster router
Router>en
Router#conf t
Router(config)#int gig0/0/0
Router(config-if)#ip add 20.20.20.2 255.255.255.252
Router(config-if)#no sh
Router(config-if)#int g0/0/1
Router(config-if)#ip add 30.30.30.2 255.255.255.252
Router(config-if)#no sh
Router(config-if)#int g0/0/2
Router(config-if)#ip add 8.0.0.1 255.0.0.0
Router(config-if)#no sh
Router(config)#int gig0/0/0
Router(config-if)#ip routing
Router(config-if)#no sh
Router(config-if)#router ospf 35
Router(config-router)#router-id 1.1.5.5
Router(config-router)#network 8.0.0.0 0.255.255.255 area 0
49
Router(config-router)#network 20.20.20.0 0.0.0.3 area 0
Router(config-router)#network 30.30.30.0 0.0.0.3 area 0
Router(config-router)#do wr
Configurations on first Firewall
ciscoasa>en
Password:
ciscoasa#conf t
ciscoasa(config)#hostname FRW
FRW(config)#int gig1/3
FRW(config-if)#no sh
FRW(config-if)#ip add 10.2.2.2 255.255.255.252
FRW(config-if)#nameif INSIDE1
FRW(config-if)#SECUrity-level 100
FRW(config-if)#EX
FRW(config)#int gig1/4
FRW(config-if)#no sh
FRW(config-if)#ip add 10.2.2.10 255.255.255.252
FRW(config-if)#nameif INSIDE2
FRW(config-if)#SECURity-level 100
FRW(config-if)#EX
FRW(config)#int gig1/5
FRW(config-if)#no sh
FRW(config-if)#ip add 10.11.11.1 255.255.255.224
FRW(config-if)#nameif DMZ
FRW(config-if)#security-level 70
FRW(config-if)#ex
FRW(config)#int gig1/1
FRW(config-if)#no sh
FRW(config-if)#ip add 105.100.50.2 255.255.255.252
FRW(config-if)#nameif OUTSIDE1
FRW(config-if)#security-level 0
50
FRW(config-if)#EXIT
FRW(config)#int gig1/2
FRW(config-if)#no sh
FRW(config-if)#ip add 197.200.100.2 255.255.255.252
FRW(config-if)#nameif OUTSIDE2
FRW(config-if)#security-level 0
FRW(config-if)#ex
FRW(config)#wr mem
FRW(config)#route outside1 0.0.0.0 0.0.0.0 105.100.50.1
FRW(config)#route outside2 0.0.0.0 0.0.0.0 197.200.100.1 70
FRW(config)#router ospf 35
FRW(config-router)#router-id 1.1.8.8
FRW(config-router)#network 105.100.50.0 255.255.255.252 area 0
FRW(config-router)#network 197.200.100.0 255.255.255.252 area 0
FRW(config-router)#network 10.11.11.0 255.255.255.224 area 0
FRW(config-router)#network 10.2.2.0 255.255.255.224 area 0
FRW(config-network-object)#object network INSIDE1-OUTSIDE1
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDE2-OUTSIDE1
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDEw1-OUTSIDEw1
FRW(config-network-object)#SUBnet 10.20.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDEw2-OUTSIDEw1
FRW(config-network-object)#SUBnet 10.20.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDE1-OUTSIDE2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE2) dynamic interface
51
FRW(config-network-object)#object network INSIDE2-OUTSIDE2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network INSIDEw1-OUTSIDEw2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network INSIDEw2-OUTSIDEw2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network DMZ-OUTSIDE1
FRW(config-network-object)#SUBnet 10.11.0.0 255.255.0.0
FRW(config-network-object)#nat (DMZ,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network DMZ-OUTSIDE2
FRW(config-network-object)#SUBnet 10.11.0.0 255.255.0.0
FRW(config-network-object)#nat (DMZ,OUTSIDE2) dynamic interface
FRW(config)#access-list RES extended permit tcp any any eq 80
FRW(config)#access-list RES extended permit tcp any any eq 53
FRW(config)#access-list RES extended permit udp any any eq 53
FRW(config)#access-group RES in interface DMZ
FRW(config)#access-group RES in interface OUTSIDE1
FRW(config)#access-group RES in interface OUTSIDE2
Configurations on second Firwall
ciscoasa>en
Password:
ciscoasa#conf t
ciscoasa(config)#hostname FRW
FRW(config)#int gig1/3
FRW(config-if)#no sh
FRW(config-if)#ip add 10.2.2.6 255.255.255.252
FRW(config-if)#nameif INSIDE1
FRW(config-if)#SECUrity-level 100
52
FRW(config-if)#EX
FRW(config)#int gig1/4
FRW(config-if)#no sh
FRW(config-if)#ip add 10.2.2.14 255.255.255.252
FRW(config-if)#nameif INSIDE2
FRW(config-if)#SECURity-level 100
FRW(config-if)#EX
FRW(config)#int gig1/1
FRW(config-if)#no sh
FRW(config-if)#ip add 105.100.50.6 255.255.255.252
FRW(config-if)#nameif OUTSIDE1
FRW(config-if)#security-level 0
FRW(config-if)#EXIT
FRW(config)#int gig1/2
FRW(config-if)#no sh
FRW(config-if)#ip add 197.200.100.6 255.255.255.252
FRW(config-if)#nameif OUTSIDE2
FRW(config-if)#security-level 0
FRW(config-if)#ex
FRW(config)#wr mem
FRW(config)#route outside2 0.0.0.0 0.0.0.0 197.200.100.5
FRW(config)#route outside1 0.0.0.0 0.0.0.0 105.100.50.5 70
FRW(config)#router ospf 35
FRW(config-router)#router-id 1.1.9.9
FRW(config-router)#network 105.100.50.4 255.255.255.252 area 0
FRW(config-router)#network 197.200.100.4 255.255.255.252 area 0
FRW(config-router)#network 10.2.2.4 255.255.255.252 area 0
FRW(config-router)#network 10.2.2.12 255.255.255.252 area 0
FRW(config-network-object)#object network INSIDE1-OUTSIDE1
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE1) dynamic interface
53
FRW(config-network-object)#object network INSIDE2-OUTSIDE1
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDEw1-OUTSIDEw1
FRW(config-network-object)#SUBnet 10.20.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDEw2-OUTSIDEw1
FRW(config-network-object)#SUBnet 10.20.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE1) dynamic interface
FRW(config-network-object)#object network INSIDE1-OUTSIDE2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network INSIDE2-OUTSIDE2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network INSIDEw1-OUTSIDEw2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE1,OUTSIDE2) dynamic interface
FRW(config-network-object)#object network INSIDEw2-OUTSIDEw2
FRW(config-network-object)#SUBnet 172.16.0.0 255.255.0.0
FRW(config-network-object)#nat (INSIDE2,OUTSIDE2) dynamic interface
FRW(config)#access-list RES extended permit tcp any any eq 80
FRW(config)#access-list RES extended permit tcp any any eq 53
FRW(config)#access-list RES extended permit udp any any eq 53
FRW(config)#access-group RES in interface OUTSIDE1
FRW(config)#access-group RES in interface OUTSIDE2
Configurations on voip router
Router>EN
Router#CONF T
Router(config)#int fa0/0.70
Router(config-subif)#ip add 172.30.0.1 255.255.0.0
54
Router(config-subif)#encapsulation dot1Q 70
Router(config-subif)#ip add 172.30.0.1 255.255.0.0
Router(config-subif)#exit
Router(config)#service dhcp
Router(config)#ip dhcp pool VOIP-POOL
Router(dhcp-config)#NEtwork 172.30.0.0 255.255.0.0
Router(dhcp-config)#default-router 172.30.0.1
Router(dhcp-config)#option 150 ip 172.30.0.1
Router(config)#telephony-service
Router(config-telephony)#max-ephones 30
Router(config-telephony)#max-dn 30
Router(config-telephony)#ip source-address1 172.30.0.1 port 1000
Router(config-telephony)#auto assign 1 to 30
Router(config)#ephone-dn 1
Router(config-ephone-dn)#number 401
Router(config)#ephone-dn 2
Router(config-ephone-dn)#number 402
Router(config)#ephone-dn 3
Router(config-ephone-dn)#number 403
Router(config)#ephone-dn 4
Router(config-ephone-dn)#number 404
Router(config)#ephone-dn 5
Router(config-ephone-dn)#number 405
Router(config)#ephone-dn 6
Router(config-ephone-dn)#number 406
Router(config)#ephone-dn 7
Router(config-ephone-dn)#number 407
Router(config)#ephone-dn 8
Router(config-ephone-dn)#number 408
Router(config)#ephone-dn 9
Router(config-ephone-dn)#number 409
55
Router(config)#ephone-dn 10
Router(config-ephone-dn)#number 410
Configurations on multilayer switch 1
CORE-SW(config)#interface range gig1/0/3-8
CORE-SW(config-if-range)#switchport mode trunk
CORE-SW(config-if-range)#vlan 10
CORE-SW(config-vlan)#name MGT
CORE-SW(config-vlan)#vlan 20
CORE-SW(config-vlan)#name LAN
CORE-SW(config-vlan)#vlan 50
CORE-SW(config-vlan)#name WLAN
CORE-SW(config-vlan)#vlan 70
CORE-SW(config-vlan)#name VOIP
CORE-SW(config-vlan)#vlan 90
CORE-SW(config-vlan)#name INSIDE_SERVERS
CORE-SW(config)#int range gig1/0/9-11
CORE-SW(config-if-range)#channel-group 1 mode passive
Creating a port-channel interface Port-channel 1
CORE-SW(config-if-range)#interface Port-channel 1
CORE-SW(config-if)#switchport mode trunk
CORE-SW(config-if)#do wr
CORE-SW(config)#ip routing
CORE-SW(config)#int gig1/0/1
CORE-SW(config-if)#no switchport
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip address 10.2.2.1 255.255.255.252
CORE-SW(config-if)#int gig1/0/2
CORE-SW(config-if)#no switchport
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip address 10.2.2.5 255.255.255.252
CORE-SW(config-vlan)#int vlan 10
56
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 192.168.10.3 255.255.255.0
CORE-SW(config-if)#standby 10 ip 192.168.10.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 20
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 172.16.0.3 255.255.0.0
CORE-SW(config-if)#standby 20 ip 172.16.0.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 50
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 10.20.0.2 255.255.0.0
CORE-SW(config-if)#standby 50 ip 10.20.0.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 90
CORE-SW(config-if)#no sh
COR-SW(config-if)#ip add 10.11.11.34 255.255.255.224
CORE-SW(config-if)#standby 90 ip 10.11.11.33
CORE-SW(config-if)#exit
CORE-SW(config-if)#do wr
CORE-SW(config)#int gig01/0/2
CORE-SW(config)#ip routing
CORE-SW(config)#router ospf 35
CORE-SW(config-router)#router-id 1.1.1.1
CORE-SW(config-router)#network 10.2.2.0 0.0.0.3 area 0
CORE-SW(config-router)#network 10.2.2.4 0.0.0.3 area 0
CORE-SW(config-router)#network 192.168.12.0 0.0.0.255 area 0
CORE-SW(config-router)#network 172.16.0.0 0.0.255.255 area 0
57
CORE-SW(config-router)#network 10.20.0.0 0.0.255.255 area 0
CORE-SW(config-router)#network 10.11.11.32 0.0.0.31 area 0
CORE-SW(config-router)#do wr
CORE-SW(config-router)#do sh star
Configurations on multilayer switch 2
CORE-SW(config)#ip routing
CORE-SW(config)#int gig1/0/1
CORE-SW(config-if)#no switchport
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip address 10.2.2.9 255.255.255.252
CORE-SW(config-if)#int gig1/0/2
CORE-SW(config-if)#no switchport
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip address 10.2.2.13 255.255.255.252
CORE-SW(config-vlan)#int vlan 10
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 192.168.10.2 255.255.255.0
CORE-SW(config-if)#standby 10 ip 192.168.10.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 20
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 172.16.0.2 255.255.0.0
CORE-SW(config-if)#standby 20 ip 172.16.0.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 50
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 10.20.0.3 255.255.0.0
CORE-SW(config-if)#standby 50 ip 10.20.0.1
CORE-SW(config-if)#ip helper-address 10.11.11.38
58
CORE-SW(config-if)#exit
CORE-SW(config-vlan)#int vlan 90
CORE-SW(config-if)#no sh
CORE-SW(config-if)#ip add 10.11.11.35 255.255.255.224
CORE-SW(config-if)#standby 90 ip 10.11.11.33
CORE-SW(config-if)#exit
CORE-SW(config-if)#do wr
CORE-SW(config)#int gig01/0/6
CORE-SW(config)#ip routing
CORE-SW(config)#router ospf 35
CORE-SW(config-router)#router-id 1.1.2.2
CORE-SW(config-router)#network 10.2.2.8 0.0.0.3 area 0
CORE-SW(config-router)#network 10.2.2.12 0.0.0.3 area 0
CORE-SW(config-router)#network 192.168.12.0 0.0.0.255 area 0
CORE-SW(config-router)#network 172.16.0.0 0.0.255.255 area 0
CORE-SW(config-router)#network 10.20.0.0 0.0.255.255 area 0
CORE-SW(config-router)#network 10.11.11.32 0.0.0.31 area 0
CORE-SW(config-router)#do wr
CORE-SW(config-router)#do sh star
Configuration on switchs one, two, three, four, five
Switch>en
Switch#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#hostname SM-SW
SM-SW(config)#line consol 0
SM-SW(config-line)#password cisco
SM-SW(config-line)#login
SM-SW(config-line)#exec-timeout 3 0
SM-SW(config-line)#login
SM-SW(config-line)#logging synchronous
SM-SW(config-line)#exit
59
SM-SW(config)#
SM-SW(config)#enable password cisco
SM-SW(config)#banner motd #no unautorized access!#
SM-SW(config)#no ip domain lookup
SM-SW(config)#service password-encryption
SM-SW(config)#username cisco password cisco
SM-SW(config)#ip domain-name cisco.com
SM-SW(config)#crypto key generate rsa general-keys modulus 1024
SM-SW(config)#ip ssh version 2
SM-SW(config)#line vty 0 15
SM-SW(config-line)#login local
SM-SW(config-line)#transport input ssh
SM-SW(config-line)#exit
SM-SW(config)#do wr
SM-SW(config)#access-list 1 permit 192.168.10.0 0.0.0.255
SM-SW(config)#access-list 1 deny any
SM-SW(config)#line vty 0 15
SM-SW(config-line)#access-class 1 in
SM-SW(config-line)#do wr
SM-SW(config)#interface range fa0/1-2
SM-SW(config-if-range)#switchport mode trunk
SM-SW(config-if-range)#vlan 10
SM-SW(config-vlan)#name MGT
SM-SW(config-vlan)#vlan 20
SM-SW(config-vlan)#name LAN
SM-SW(config-vlan)#vlan 50
SM-SW(config-vlan)#name WLAN
SM-SW(config-vlan)#vlan 70
SM-SW(config-vlan)#name VOIP
SM-SW(config-vlan)#vlan 199
SM-SW(config-vlan)#name BLACKHOLE
60
SM-SW(config)#int range fa0/3-4
SM-SW(config-if-range)#switchport mode access
SM-SW(config-if-range)#switchport access vlan 20
SM-SW(config-if-range)#int rang fa0/5-6
SM-SW(config-if-range)#switchport voice vlan 70
SM-SW(config-if-range)#int fa0/7
SM-SW(config-if)#switchport mode access
SM-SW(config-if)#switchport access vlan 50
SM-SW(config-if)#int range fa0/8-24,gig0/1-2
SM-SW(config-if-range)#switchport mode access
SM-SW(config-if-range)#switchport access vlan 199
SM-SW(config-if-range)#shutdown
SM-SW(config-if-range)#do wr
SM-SW(config)#int range fa0/3-24
SM-SW(config-if-range)#spanning-tree portfast
SM-SW(config-if-range)#spanning-tree bpduguard enable
SM-SW(config-if-range)#do wr
Configuration on Server Switch
SM-SW(config)#interface range fa0/1-2,fa0/7
SM-SW(config-if-range)#switchport mode trunk
SM-SW(config-if-range)#vlan 10
SM-SW(config-vlan)#name MGT
SM-SW(config-vlan)#vlan 20
SM-SW(config-vlan)#name LAN
SM-SW(config-vlan)#vlan 50
SM-SW(config-vlan)#name WLAN
SM-SW(config-vlan)#vlan 70
SM-SW(config-vlan)#name VOIP
SM-SW(config-vlan)#vlan 90
SM-SW(config-vlan)#name INSIDE_SERVERS
SM-SW(config)#int range fa0/3-5
61
SM-SW(config-if-range)#switchport mode access
SM-SW(config-if-range)#switchport access vlan 90
SM-SW(config-if-range)#int fa0/6
SM-SW(config-if-range)#switchport mode access
SM-SW(config-if-range)#switchport access vlan 50
SM-SW(config)#int range fa0/3-6, fa0/8-24
SM-SW(config-if-range)#spanning-tree portfast
SM-SW(config-if-range)#spanning-tree bpduguard enable
SM-SW(config-if-range)#do wr
62