docs hp1 final
docs hp1 final
– PrfTech
Introduction
We can also see the excellent extensibility in the smart factory around Warehouse 5. In this
expansion, two new branch offices in Sydney and Melbourne are being established. The
Melbourne office is a two-story space with capacity for 300 employees, while the Sydney office
is a four-story building that can fit up to 1,000 employees.
Our goal with this project is to establish a robust network solution that provides reliable
connectivity, centralized management, and secure access between both locations. As proposed,
the design of the network is in accordance with industry best practices, applying Cisco’s
hierarchical model to provision expeditious yet maintainable LAN topologies. These components
include logical and physical network topologies, an IP addressing plan, VLAN segmentation,
BYOD support with Wireless LAN Controllers (WLCs), and a secure Wide Area Network
(WAN) link between sites.
The final report outlines all stages of the network setup, including analysis, planning, design, and
implementation, giving an overall view of how the network will align with PrfTech’s business
operations and future growth within the Australian region.
Representing the interests of PrfTech, a prestigious IT organization based in the United States
and operating worldwide, the company now welcomes new branches in Australia, located in
Sydney and Melbourne. The network will support business operations and future growth;
therefore, each branch must be equipped with a robust, secure, and scalable Local Area Network
(LAN). The hard copy documents create a network of the Melbourne branch and the security
implementation. The Melbourne office is a two-story building that can hold up to 300
employees and encompasses a range of departments, including Human Resources (HR),
Information Technology (IT), Sale, and Marketing.
This document will explain how the physical and logical-network will be utilized, placements
for hardware, IP addressing to be used, cabling specification, as well as a detailed network
security plan. Overall, we want to provide high availability, redundancy, and performance, and
security to all employees in the Melbourne branch (including servers) and systems.
Configuration:
R1:
Router(config)#do show run
Building configuration...
R2:
MLS-1:
Switch#show run
Building configuration...
Switch#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
30 enet 100030 1500 - - - - - 0 0
40 enet 100040 1500 - - - - - 0 0
50 enet 100050 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
Switch#show int tr
Port Mode Encapsulation Status Native vlan
Fa0/1 on 802.1q trunking 1
Fa0/2 on 802.1q trunking 1
Fa0/3 on 802.1q trunking 1
MLS-2:
Switch#show run
Building configuration...
Switch#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
30 enet 100030 1500 - - - - - 0 0
40 enet 100040 1500 - - - - - 0 0
50 enet 100050 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
MLS:
Switch#show run
Building configuration...
Switch#show vlan
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
1 enet 100001 1500 - - - - - 0 0
10 enet 100010 1500 - - - - - 0 0
20 enet 100020 1500 - - - - - 0 0
30 enet 100030 1500 - - - - - 0 0
40 enet 100040 1500 - - - - - 0 0
50 enet 100050 1500 - - - - - 0 0
1002 fddi 101002 1500 - - - - - 0 0
1003 tr 101003 1500 - - - - - 0 0
1004 fdnet 101004 1500 - - - ieee - 0 0
1005 trnet 101005 1500 - - - ibm - 0 0
VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
Switch#how int tr
^
% Invalid input detected at '^' marker.
Switch#
Switch#show int tr
Port Mode Encapsulation Status Native vlan
Fa0/1 on 802.1q trunking 1
Fa0/2 on 802.1q trunking 1
Fa0/3 on 802.1q trunking 1
Fa0/4 on 802.1q trunking 1
Fa0/5 on 802.1q trunking 1
Port Vlans allowed on trunk
Fa0/1 1-1005
Fa0/2 1-1005
Fa0/3 1-1005
Fa0/4 1-1005
Fa0/5 1-1005
Testing:
C:\>ping 10.0.1.1
C:\>ping 10.0.2.1
C:\>ping 10.0.3.1
C:\>ping 10.0.4.1
C:\>ping 10.0.5.1
C:\>ping 10.0.5.2
C:\>ping 10.0.5.3
C:\>ping 10.0.6.1
Branches:
Human Resources (HR)
Information Technology (IT)
Sales Department
Marketing Department
More Fun Jobs in Conference Rooms/Open Workspaces
All departments have wired Ethernet access as well as wireless access points throughout the
building.
Cable trays and protective conduits minimize EMI and provide physical security for all cabling.
SSID Configurations:
Melb-Staff: For employees. It implements WPA3-Enterprise security with RADIUS
authentication.
Melb-Guest: For HR, IT, Sales, Market users. Compliant with internet-only access: WPA2 ·
(PSK).
And it has Client Isolation turned on for lateral communication prevention on the guest network.
2.5 Addressing and VLAN structure
An IP subnet and VLAN dedicated per department This improves network segmentation and
security.
IEEE 802.1Q is used for trunking from distribution and core switches to access switches for
each VLAN.
It is recommended that:
Regularly update all firmware and software
Review and test security policies on a quarterly basis
Staff are trained on cybersecurity awareness
VPN and firewall configurations periodically reviewed
The logical and physical security options outlined in this document collectively form a robust
basis for PrfTech's successful penetration of the Australian market.
IP Address Table:
Table 1. Sydney branch network (Router-2)
Allocated Subnet address and Subnet Mask 300
Network address 10.0.5.0/24
Default Gateway address 10.0.5.1
Valid host address range 10.0.5.1- 10.0.6.254
Broadcast address 10.0.6.255
WLC:
Melbourne Branch Wireless LAN Controller (WLC)
As part of the Bring Your Own Device (BYOD) policy at the Melbourne branch of PrfTech, a
Wireless LAN Controller (WLC) would be integrated into the network to address the
management and security concerns associated with wireless devices. Other infrastructure devices
are also involved, including core switch, firewall, and DHCP server, which are in the main
network server room on the ground floor where the WLC is placed. This allows advantageous
wired connectivity to each deployed wireless AP throughout the building.
The Wireless LAN Controller (WLC) serves as a centralized management device for all the
access points that you have deployed in your office. In place of configuring each AP separately,
the WLC enables IT administrators to configure and monitor all APs from one interface. These
may include wireless SSID broadcasting, security policy enforcement, client authentication,
bandwidth management, and firmware upgrades. The WLC also provides centralized control
over wireless access points (APs), and allows users to roam smoothly between APs without
losing their connections — a critical capability in an enterprise in which users frequently migrate
around the premises with personal devices.
The two-story building will be served by eight enterprise-grade dual-band access points — four
per floor — to provide coverage throughout. APs will be deployed close to the HR and IT
departments on the ground floor and deployed near the Sales and Marketing departments on the
first floor. These APs will connect to the PoE-enabled switches, to draw power and provide the
data connection. There are two main SSIDs that the WLC manages and those are for Staff
(PrfTech-Staff) and guests (PrfTech-Guest). WPA2-Enterprise security on a staff SSID integrated
with a RADIUS server to provide 802.1X authentication. It enables per-user access controls and
VLAN mappings per-department. However, to be secure and to guarantee fair usage, the guest
SSID is a time, and bandwidth limited access to the internet only.
Each WLC is configured to dynamically assign a VLAN to a wireless client based on which
department they belong to. For instance, HR will be on VLAN 10 (Subnet: 192.168.10.0/24), IT
on VLAN 20 (192.168.20.0/24), Sales on VLAN 30, and Marketing on VLAN 40. Guest
accounts are placed into VLAN 50 and given a subnet that allows access only to the internet.
This means traffic between departments is isolated from each other, as is traffic from internal
users and guests, which helps improve security.
For example, security is the most important concern of the WLC deployment. It provides
WPA2/WPA3 enterprise-level wireless encryption, rogue AP detection, MAC address filtering,
client isolation for guests, and automatic AP firmware upgrades. Rogue APs are proactively
scanned, with flagged devices being blocked from the network to eliminate unwanted wireless
connections. Moreover, WLC restricts unauthenticated users, advising the device to authenticate
before allowing the device on the internal wireless LAN and thus makes sure no sensitive
company data is compromised.
Day 1 includes DHCP and the firewall also integrates with the WLC. In this case WLC handle
APs & control of wireless clients while the nether DHCP server assigns the clients the IP
address depends on the VLAN. The firewall provides internal users with access to internal
servers and applications, while guest access is limited through ACL (Access Control Lists) and
NAT (Network Address Translation) rules that prevent unauthorized access.
In this case, a standby WLC will be designed to facilitate high AVAILABILITY and business
continuity; it will take TRENNEN automatically when the primary controller fails to meet less
frustration. This guarantees uninterrupted wireless services, even during hardware failure or
maintenance. It is also scalable; when you want to expand your network, you add new APs, and
they'll automatically be detected and configured by the WLC.
The WLC has an inbuilt dashboard that makes monitoring and troubleshooting easier with real-
time visibility to AP performance, client distribution, signal strength, and interference levels.
Alerts and logs are sent off to a centralized Syslog server and SNMP manager, finding and fixing
issues and optimizing performance before user impact. Wi-Fi heat maps and usage reports are
also available to help you identify blind spots or outlier areas that can be improved upon for the
quality of wireless service provided.
The Wireless LAN Controller is deployed in the Melbourne office for centralized management,
secure wireless access, seamless roaming capabilities, and BYOD support for the organization. It
promotes scale, reduces administrative burden, and maintains the highest level of performance
and security for all the organizations wireless users.
Conclusion:
Main features: Logical / Physical network topologies, IP addressing plans, VLAN segmentation,
BYOD with Wireless LAN Controllers (WLCs), and secured WAN link between sites. The
presented design and simulation of the network for PrfTech’s new Sydney and Melbourne
branches successfully exhibit a secure, scalable and efficient infrastructure that would provide
proper support for both current business requirements and future growth. Through utilization of
Cisco’s layered network design, the design guarantees efficient performance, seamless
management and high availability at each layer across all aspects of networking. By intelligently
designing their IP addressing schema, segmenting users on various VLANs, integrating their
wireless networks, as well as wide area connectivity, both branch offices will support the needs
of up to 1,300 users in total. Data protection and access control is achieved by implementing
mechanisms like ACLs, firewalls, port security, wireless encryption, and VPN technologies.
Ultimately, not only does this project support PrfTech's technical and organizational
requirements, but it allows for a broadly flexible roadmap for future technological
development/enhancement. What is shown in Packet Tracer is a hands-on simulation to confirm
that the network is operating and can be able to run in a realistic setting.
References:
[1] Cisco Systems, “Cisco Enterprise Architecture Model”, Cisco, 2023. [Online]. [Access Date:
October 2023] https://www.cisco.com/c/en/us/solutions/enterprise/design-zone-architecture.html
T. Lammle, CCNA 200-301 Official Cert Guide, First Edition, 2020. [2] Indianapolis, IN, USA:
Wiley; 2020.
[3] W. Stallings, Network Security Essentials: Applications and Standards, 6th ed. Boston, MA,
USA: Pearson. 2020.
[4] IEEE Std 802.11, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications,” IEEE-SA Standards Board, 2020.
Computer Networks, 5th ed. New York, NY, USA: Pearson, 2010.
Steps 21-24: Infrastructure Design & SimulationDocument two — Huyskamer 3 142 03 October
2023 with orders_DATE_TIME