CPT Project Report DN
CPT Project Report DN
NETWORK DETAILS:
Boston & Mumbai office will be having technical, finance & HR department, whereas other
locations will be having technical & HR departments respectively
Each office will be having 250 hosts (85% redundancy for their addresses)
Address for each host will be assigned dynamically by DHCP servers based at technical
department of head-quarter locations (Boston & Mumbai)
Dedicated VLAN is created for each department
Offices at different geographical locations will be connected via internet service provider(ISP)
Security feature is deployed for restricting the access to the finance department
Router redundancy is implemented at head-quarter locations & switch redundancy is done
at New York & Beijing location
OSPF network protocol is implemented for communication between different locations
MAC flooding & port security is activated for machines at HQ locations
BPDU, Port fast enabled in all machines connected to the network
Rapid spanning tree protocol is activated between redundant switches at New York & London
location
Multilayer switch at Beijing & LACP at New York are the additional features
Cost optimization:
VLAN’S for each department is configured on a single switch making the system cost
efficient
Limited utilization of DHCP servers (installed only at head quarter locations). HQ DHCP
server used for assigning IP’s to host at branch offices at London, Beijing & New York
Multilayer switch erection leading to reduction in consumption of one additional router
Dynamic Host Allocation using Dynamic Host Configuration Protocol
DCHP SERVER AT BOSTON:
Server at Boston location will assigning dynamic IP addresses to technical, finance & HR
departments of Boston & Mumbai office’s
All area borders are designated in area 0 as backbone network, whereas other routers used
within location premises are given the following numbers
o Area 1 - Boston
o Area 2 - Mumbai
o Area 3 - Beijing
o Area 4 - London
o Area 5 - New York
Frame relay helps to connect inter networks improving data quality
Machine is connected
to a port which has
VLAN access 30
Incorrect port
connected, rather than
its VLAN allocated port
OSPF:
In order to communicate between PC’S on two different networks there must be a network
protocol. Hence OSPF protocol is used here for this purpose. The following show the
utilization of OSPF in project
“OSPF” mentioned while
carrying out simulation
between inter - network
Access-list (Security):
To provide access control or security for the organization, we used access control list to
restrict access to finance department from HR & Technical department. Restriction to finance
department is applicable to both Boston’s & Mumbai’s finance departments
BOSTON
access-list 100 permit ip host 192.168.69.2 any
access-list 100 permit icmp any 192.168.70.0 0.0.0.127 echo-reply
access-list 100 permit icmp any 192.168.73.0 0.0.0.127 echo-reply
access-list 100 deny ip 193.168.69.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 193.168.71.0 0.0.0.127 192.168.70.0 0.0.0.127
access-list 100 deny ip 193.168.69.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 deny ip 193.168.71.0 0.0.0.127 192.168.73.0 0.0.0.127
access-list 100 permit ip any any
MUMBAI
access-list 100 permit ip host 192.168.72.2 any
access-list 100 permit icmp any 192.168.70.0 0.0.0.127 echo-reply
access-list 100 permit icmp any 192.168.73.0 0.0.0.127 echo-reply
access-list 100 deny ip 192.168.72.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.74.0 0.0.0.127 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.72.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 deny ip 192.168.74.0 0.0.0.127 192.168.73.0 0.0.0.127
access-list 100 permit ip any any
BEIJING
access-list 100 permit ip host 192.168.72.2 any
access-list 100 permit icmp any 192.168.70.0 0.0.0.127 echo-reply
access-list 100 permit icmp any 192.168.73.0 0.0.0.127 echo-reply
access-list 100 deny ip 192.168.75.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.76.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.75.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 deny ip 192.168.76.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 permit ip any any
LONDON
access-list 100 permit ip host 192.168.72.2 any
access-list 100 permit icmp any 192.168.70.0 0.0.0.127 echo-reply
access-list 100 permit icmp any 192.168.73.0 0.0.0.127 echo-reply
access-list 100 deny ip 192.168.77.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.78.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.77.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 deny ip 192.168.78.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 permit ip any any
NEWYORK
access-list 100 permit ip host 192.168.72.2 any
access-list 100 permit icmp any 192.168.70.0 0.0.0.127 echo-reply
access-list 100 permit icmp any 192.168.73.0 0.0.0.127 echo-reply
access-list 100 deny ip 192.168.79.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.80.0 0.0.0.255 192.168.70.0 0.0.0.127
access-list 100 deny ip 192.168.79.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 deny ip 192.168.80.0 0.0.0.255 192.168.73.0 0.0.0.127
access-list 100 permit ip any any
Unable to ping finance department of Mumbai from Boston’s technical department due
to ACL restriction
When a technical department
host is trying to access finance
department host, it is blocked at
router using ACL’s
The finance hosts are able to ping each other, since they were not restricted in access list
Redundancy Test plan:
For routers:
Hot standby routing protocol is executed at Boston & London location, so if the main router
goes down standby gets activated. For testing, we are going to disable main routers at both
the areas.
At Boston,
Secondary
router takes
charge after
main router off
goes o
At Mumbai
Switch redundancy test plan:
When a trunk port is turned off, path A is blocked. Right now a redundant path which was at
standby came into action instantly. Though the path is dropped, the VLAN’s & network works
fine due to redundant switch topology which is clearly adopted here.
BEFORE AFTER
Add-on testing:
Multilayer switch
A multilayer switch is capable of doing layer 3 roles, therefore it has the capability of doing
inter VLAN routing. In this project, a multilayer switch was implemented at Beijing location
which performs inter vlan routing.
Link aggregation & control protocol was implemented at New York office for increasing the
speed of communication between channels. Two separate channels were created for this
purpose.
OSPF is always better. It is better resourceful than RIP protocol which uses lot of memory
& complications. Moreover OSPF is best suitable for larger networks due to its better
convergence rate than RIP
Area concept in OSPF is used by the routers to know which location they belong to. They
are utilized to segment larger networks into smaller chunks in which router is assigned a
area number & connected to backbone area ‘0’
If there is no common area ‘0’, it would be difficult for routers to communicate between
each other. It should use a dedicated path for ex: 1-5,2-3,4-1 etc. This causes more
confusion & congestion in designing the network. Hence backbone area ‘0’ is used here
Router LAS is used to send the packets within the same area and won't leave the area
Network LSA is used to flood the neighboring routers within the same area.
Summary LSA is used to flood the packets between routers in different areas and provide
OSPF with a summary
ASBR Summary LSA gets the packet from one area and injects it into the area 0
ASBR external LSA packets are generated by to advertise external redistributed routes
Security plan is defined as the strategy for restricting the access between different hosts
& redundancy plan is to place standby devices to avoid single point or device failure
leading to shutdown of entire network
If 2 switches are connected without STP, then the switches will infinitely duplicate the
initial broadcast packet because nothing at the layer 2 to stop. Whereas, the STP helps in
avoiding the loopback.
STP gives a loop-free tree inconsistent topology of switches. It enables users to set the
preferred location of root and determines the cost.
PSTP is the Cisco proprietary protocol which is almost like STP, but the only difference is
that PSTP allows each VLAN to run their own STP.
RSTP provides a fast convergence rate when compared to the previous versions
CLI Commands
DHCP Configuration
Redundancy topologies
MAC flooding
BOSTON SWITCH CONFIGURATION
!
Switch> interface FastEthernet0/4
Switch> switchport access vlan 20
Switch>en switchport mode access
Switch#show run switchport port-security maximum 5
Switch#show running-config switchport port-security mac-address sticky
Building configuration... spanning-tree portfast
spanning-tree bpduguard enable
Current configuration : 2621 bytes !
! interface FastEthernet0/5
version 12.2 switchport access vlan 20
no service timestamps log datetime msec switchport mode access
no service timestamps debug datetime msec switchport port-security maximum 5
no service password-encryption switchport port-security mac-address sticky
! spanning-tree portfast
hostname Switch spanning-tree bpduguard enable
! !
! interface FastEthernet0/6
! switchport access vlan 30
! switchport mode access
! switchport port-security maximum 5
spanning-tree mode pvst switchport port-security mac-address sticky
spanning-tree extend system-id spanning-tree portfast
! spanning-tree bpduguard enable
interface FastEthernet0/1 !
switchport access vlan 10 interface FastEthernet0/7
switchport mode access switchport access vlan 30
spanning-tree portfast switchport mode access
spanning-tree bpduguard enable switchport port-security maximum 5
! switchport port-security mac-address sticky
interface FastEthernet0/2 spanning-tree portfast
switchport access vlan 10 spanning-tree bpduguard enable
switchport mode access !
switchport port-security maximum 5 interface FastEthernet0/8
switchport port-security mac-address sticky switchport trunk native vlan 30
spanning-tree portfast switchport trunk allowed vlan 2-1001
spanning-tree bpduguard enable switchport mode trunk
! !
interface FastEthernet0/3 interface FastEthernet0/9
switchport access vlan 10 switchport trunk native vlan 30
switchport mode access switchport trunk allowed vlan 2-1001
switchport port-security maximum 5 switchport mode trunk
switchport port-security mac-address sticky !
spanning-tree portfast interface FastEthernet0/10
spanning-tree bpduguard enable !
interface FastEthernet0/11 interface GigabitEthernet0/1
! !
interface FastEthernet0/12 interface GigabitEthernet0/2
! !
interface FastEthernet0/13 interface Vlan1
! no ip address
interface FastEthernet0/14 !
! interface Vlan10
interface FastEthernet0/15 mac-address 0090.0c2b.b501
! no ip address
interface FastEthernet0/16 !
! interface Vlan20
interface FastEthernet0/17 mac-address 0090.0c2b.b502
! no ip address
interface FastEthernet0/18 !
! !
interface FastEthernet0/19 !
! !
interface FastEthernet0/20 line con 0
! !
interface FastEthernet0/21 line vty 0 4
! login
interface FastEthernet0/22 line vty 5 15
! login
interface FastEthernet0/23 !
! !
interface FastEthernet0/24 !
! !
end
.
MUMBAI ABR CONFIGURATION
Thus an enterprise network was built successfully with cisco packet tracer implementing various
network protocols and output was tested successfully
References:
https://www.youtube.com/user/danscourses
https://www.youtube.com/watch?v=-H20S65OB3E&list=PLERv4HBOV-
pX966N8_sxtTXsV8MoEjosR&index=2
https://www.youtube.com/watch?v=lLnilT_WOmI
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/6208-
nssa.html
https://community.cisco.com/t5/switching/ospf-backbone-area-rule/td-p/2002048
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/1
2-2_52_se/configuration/guide/3560scg/swhsrp.html
https://networkengineering.stackexchange.com/questions/57209/how-can-i-simulate-
mac-flooding-attack-in-cisco-packet-tracer-on-windows
https://learningnetwork.cisco.com/blogs/vip-perspectives/2016/03/10/advanced-stp-
features-portfast-bpdu-guard-and-bpdu-filter