Network Design and Configuration Report 2022
VerifiedAdded on 2022/10/03
|21
|3613
|17
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK DESIGN AND CONFIGURATION
Network Design and Configuration
Name of the Student
Name of the University
Author Note
Network Design and Configuration
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORK DESIGN AND CONFIGURATION
Summary
According to a wide number of researches, network segmentation and internal measures for
controlling network access play a vital role in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. First this
report provides the requirement summary of the network containing the layout and allocation
of devices for the respective segments, what access restrictions are needed and different
servers installed as also specifying need for subnet calculations. Then this report shows the
network design drawn in Cisco Packet Tracer simulation software and explains the network
architecture thoroughly. Thereafter the IP addressing and classification of the subnets for the
network segments is given in an IP addressing table and discussed below as per the various
segments. The implementation of VLANs is then shown and discussed where it explains the
configuration of inter VLAN routing. Next this report talks of the set of access control list
commands used for restricting departments from accessing each other. All this security
applied with ACL commands gets shown with appropriate screenshots. After this the report
conducts tests and validation checks to verify that the network presented is meeting AML’s
requirements. Then the report discusses about IP address assigning and ends with concluding
notes.
NETWORK DESIGN AND CONFIGURATION
Summary
According to a wide number of researches, network segmentation and internal measures for
controlling network access play a vital role in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. First this
report provides the requirement summary of the network containing the layout and allocation
of devices for the respective segments, what access restrictions are needed and different
servers installed as also specifying need for subnet calculations. Then this report shows the
network design drawn in Cisco Packet Tracer simulation software and explains the network
architecture thoroughly. Thereafter the IP addressing and classification of the subnets for the
network segments is given in an IP addressing table and discussed below as per the various
segments. The implementation of VLANs is then shown and discussed where it explains the
configuration of inter VLAN routing. Next this report talks of the set of access control list
commands used for restricting departments from accessing each other. All this security
applied with ACL commands gets shown with appropriate screenshots. After this the report
conducts tests and validation checks to verify that the network presented is meeting AML’s
requirements. Then the report discusses about IP address assigning and ends with concluding
notes.
2
NETWORK DESIGN AND CONFIGURATION
Table of Contents
Introduction................................................................................................................................3
Requirements..............................................................................................................................3
Solution......................................................................................................................................5
Network Design.....................................................................................................................5
Network Subnetting and IP allocation...................................................................................6
VLAN Implementation..........................................................................................................9
VLAN Access Restrictions using Access Control List........................................................10
Validation and Tests.............................................................................................................12
Protocols for connecting devices.........................................................................................15
Conclusion................................................................................................................................16
Bibliography.............................................................................................................................18
NETWORK DESIGN AND CONFIGURATION
Table of Contents
Introduction................................................................................................................................3
Requirements..............................................................................................................................3
Solution......................................................................................................................................5
Network Design.....................................................................................................................5
Network Subnetting and IP allocation...................................................................................6
VLAN Implementation..........................................................................................................9
VLAN Access Restrictions using Access Control List........................................................10
Validation and Tests.............................................................................................................12
Protocols for connecting devices.........................................................................................15
Conclusion................................................................................................................................16
Bibliography.............................................................................................................................18
3
NETWORK DESIGN AND CONFIGURATION
Introduction
The below report highlights the crucial role played by network segmentation and
internal measures for controlling network access in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. This report
begins by providing the requirement summary of the network containing the layout and
allocation of devices for the respective segments, what access restrictions are needed and
different servers installed as also specifying need for subnet calculations. Then this report
shows the network design drawn in Cisco Packet Tracer simulation software and explains the
network architecture thoroughly. Thereafter the IP addressing and classification of the
subnets for the network segments is given in an IP addressing table and discussed below as
per the various segments. The implementation of VLANs is then shown and discussed where
it explains the configuration of inter VLAN routing. Next this report talks of the set of access
control list commands used for restricting departments from accessing each other. All this
security applied with ACL commands gets shown with appropriate screenshots. After this the
report conducts tests and validation checks to verify that the network presented is meeting
AML’s requirements. Then the report discusses about IP address assigning and ends with
concluding notes.
Requirements
ALM’s network is to contain four separate LAN networks for the four departments along
with LAN networks of the server cluster as also the wireless WLAN network.
LAN network for the server cluster comprises of the DNS server, the mail server, the web
server and the FTP server for catering to the various networking purposes.
NETWORK DESIGN AND CONFIGURATION
Introduction
The below report highlights the crucial role played by network segmentation and
internal measures for controlling network access in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. This report
begins by providing the requirement summary of the network containing the layout and
allocation of devices for the respective segments, what access restrictions are needed and
different servers installed as also specifying need for subnet calculations. Then this report
shows the network design drawn in Cisco Packet Tracer simulation software and explains the
network architecture thoroughly. Thereafter the IP addressing and classification of the
subnets for the network segments is given in an IP addressing table and discussed below as
per the various segments. The implementation of VLANs is then shown and discussed where
it explains the configuration of inter VLAN routing. Next this report talks of the set of access
control list commands used for restricting departments from accessing each other. All this
security applied with ACL commands gets shown with appropriate screenshots. After this the
report conducts tests and validation checks to verify that the network presented is meeting
AML’s requirements. Then the report discusses about IP address assigning and ends with
concluding notes.
Requirements
ALM’s network is to contain four separate LAN networks for the four departments along
with LAN networks of the server cluster as also the wireless WLAN network.
LAN network for the server cluster comprises of the DNS server, the mail server, the web
server and the FTP server for catering to the various networking purposes.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
NETWORK DESIGN AND CONFIGURATION
All of these above-mentioned servers must be able to communicate both ways with individual
workstations and devices of users from every departments.
Subnet calculation and breakdown of the ALM network must be carried out based
requirements of workstations, printers and servers by the different LAN networks.
The network of alm.co.uk must also have support for wireless connectivity to serve various
smartphones, laptops and other wireless devices of users from the four departments.
Next the network is to be segmented based on the subnets for ensuring that the
communications over the network between the devices of all the six LAN networks are
administered and controlled more effectively with predefined set of rules for network access.
Every department is to be prevented from access to systems of any other department through
the internally applied security mechanisms.
Number and distribution of PCs and printers among the four different departments are as
follows:
48 PCs along with 1 printer for Department 1,
18 PCs along with 1 printer for Department 2,
11 PCs and 1 printer for Department 3,
68 PCs as well as 1 printer for Department 4.
NETWORK DESIGN AND CONFIGURATION
All of these above-mentioned servers must be able to communicate both ways with individual
workstations and devices of users from every departments.
Subnet calculation and breakdown of the ALM network must be carried out based
requirements of workstations, printers and servers by the different LAN networks.
The network of alm.co.uk must also have support for wireless connectivity to serve various
smartphones, laptops and other wireless devices of users from the four departments.
Next the network is to be segmented based on the subnets for ensuring that the
communications over the network between the devices of all the six LAN networks are
administered and controlled more effectively with predefined set of rules for network access.
Every department is to be prevented from access to systems of any other department through
the internally applied security mechanisms.
Number and distribution of PCs and printers among the four different departments are as
follows:
48 PCs along with 1 printer for Department 1,
18 PCs along with 1 printer for Department 2,
11 PCs and 1 printer for Department 3,
68 PCs as well as 1 printer for Department 4.
5
NETWORK DESIGN AND CONFIGURATION
Solution
Network Design
Figure 1: Network Design Diagram of alm.co.uk
The above figure presents the diagram showing a detailed view of the network design
for the small sized organization of alm.co.uk and discusses how it is operated. This network
diagram makes evident, that ALM’s network is created based on the three-layered
hierarchical model of networking architecture comprising of the core, the distribution and the
access layers and is also seen to follow a top down networking approach. From the top the
router of the company’s network obtains network from routers of the ISPs or Internet Service
Providers and forms the core layer. In this core router all the different configurations
regarding configuration of sub interfaces, creation of DHCP pools and inter VLAN routing
for all six network segments is performed. Then this routed network gets passed to the
multilayer switch which facilitates the inter VLAN routing. This switch constitutes the
distribution layer of the network. This switch distributes network access to lower level layer 2
switches of the six different LAN networks. Network connectivity for these particular
switches are ensured via their specific VLANs. The layer 2 switches directly connect the
individual devices and thus form the access layer thereby completing this three-layer model
of networking architecture. These six layers 2 switches include four for the various different
NETWORK DESIGN AND CONFIGURATION
Solution
Network Design
Figure 1: Network Design Diagram of alm.co.uk
The above figure presents the diagram showing a detailed view of the network design
for the small sized organization of alm.co.uk and discusses how it is operated. This network
diagram makes evident, that ALM’s network is created based on the three-layered
hierarchical model of networking architecture comprising of the core, the distribution and the
access layers and is also seen to follow a top down networking approach. From the top the
router of the company’s network obtains network from routers of the ISPs or Internet Service
Providers and forms the core layer. In this core router all the different configurations
regarding configuration of sub interfaces, creation of DHCP pools and inter VLAN routing
for all six network segments is performed. Then this routed network gets passed to the
multilayer switch which facilitates the inter VLAN routing. This switch constitutes the
distribution layer of the network. This switch distributes network access to lower level layer 2
switches of the six different LAN networks. Network connectivity for these particular
switches are ensured via their specific VLANs. The layer 2 switches directly connect the
individual devices and thus form the access layer thereby completing this three-layer model
of networking architecture. These six layers 2 switches include four for the various different
6
NETWORK DESIGN AND CONFIGURATION
departments of ALM and two for the server cluster and the wireless network. There server
cluster in the network consists of four servers. They are the web, DNS, mail and the FTP
servers. The network gets segmented with VLANs for every LAN network, access between
different departments is restricted by the use of access control list or ACL list of commands.
Network Subnetting and IP allocation
Name
of
Subne
t
IP
Addr
ess
spac
e
Requ
ired
Alloc
ated
Addr
ess
Spac
e
Subnet
Network
Address
CIDR/
Mask
Subnet
Mask
Range of
IP
Addresse
s
Subnet
Broadcas
t
Addresse
Depart
ment 1
49 62
192.168.
168.0
/26
255.255.2
55.192
192.168.1
68.1 -
192.168.1
68.62
192.168.1
68.63
Depart
ment 2
19 30
192.168.
169.0
/27
255.255.2
55.224
192.168.1
69.1 -
192.168.1
69.30
192.168.1
69.31
Depart
ment 3
12 14
192.168.
170.0
/28
255.255.2
55.240
192.168.1
70.1 -
192.168.1
70.14
192.168.1
70.15
NETWORK DESIGN AND CONFIGURATION
departments of ALM and two for the server cluster and the wireless network. There server
cluster in the network consists of four servers. They are the web, DNS, mail and the FTP
servers. The network gets segmented with VLANs for every LAN network, access between
different departments is restricted by the use of access control list or ACL list of commands.
Network Subnetting and IP allocation
Name
of
Subne
t
IP
Addr
ess
spac
e
Requ
ired
Alloc
ated
Addr
ess
Spac
e
Subnet
Network
Address
CIDR/
Mask
Subnet
Mask
Range of
IP
Addresse
s
Subnet
Broadcas
t
Addresse
Depart
ment 1
49 62
192.168.
168.0
/26
255.255.2
55.192
192.168.1
68.1 -
192.168.1
68.62
192.168.1
68.63
Depart
ment 2
19 30
192.168.
169.0
/27
255.255.2
55.224
192.168.1
69.1 -
192.168.1
69.30
192.168.1
69.31
Depart
ment 3
12 14
192.168.
170.0
/28
255.255.2
55.240
192.168.1
70.1 -
192.168.1
70.14
192.168.1
70.15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
NETWORK DESIGN AND CONFIGURATION
Depart
ment 4
69 126
192.168.
171.0
/25
255.255.2
5.128
192.168.1
71.1 -
192.168.1
71.126
192.168.1
71.127
Server
LAN
4 6
192.168.
172.0
29
255.255.2
55.248
192.168.1
72.1 -
192.168.1
72.6
192.168.1
72.7
Wireles
s
Networ
k LAN
250 254
10.11.12
.0
/24
255.255.2
55.0
10.11.12.1
-
10.11.12.2
54
10.11.12.2
55
This subnetting table created above provides the six subnets that have been calculated
for the six separate network segments through the major network 192.168.0.0/24. Here the
third octet of the IP network varies for subnetworks of every four departments as also the one
for the server cluster. The reason behind this being the access routes having been configured
via inter VLAN routing as every segment possess their own unique VLAN number that
matches the third octet. Network segments of both the server cluster and the WLAN network
is accessible from the devices of users from all departments. As the WLAN provides wireless
connectivity for the supported devices of users in all departments, a subnet with all of the
address space is allocated to that segment. The private major network used by the WLAN is
10.11.12.0/24. Thus, the different subnet networks for the six LAN networks carry the
network addresses 192.168.168.0 (Department 1), 192.168.169.0 (Department 2),
192.168.170.0 (Department 3), 192.168.171.0 (Department 4), 192.168.172.0 (server cluster)
NETWORK DESIGN AND CONFIGURATION
Depart
ment 4
69 126
192.168.
171.0
/25
255.255.2
5.128
192.168.1
71.1 -
192.168.1
71.126
192.168.1
71.127
Server
LAN
4 6
192.168.
172.0
29
255.255.2
55.248
192.168.1
72.1 -
192.168.1
72.6
192.168.1
72.7
Wireles
s
Networ
k LAN
250 254
10.11.12
.0
/24
255.255.2
55.0
10.11.12.1
-
10.11.12.2
54
10.11.12.2
55
This subnetting table created above provides the six subnets that have been calculated
for the six separate network segments through the major network 192.168.0.0/24. Here the
third octet of the IP network varies for subnetworks of every four departments as also the one
for the server cluster. The reason behind this being the access routes having been configured
via inter VLAN routing as every segment possess their own unique VLAN number that
matches the third octet. Network segments of both the server cluster and the WLAN network
is accessible from the devices of users from all departments. As the WLAN provides wireless
connectivity for the supported devices of users in all departments, a subnet with all of the
address space is allocated to that segment. The private major network used by the WLAN is
10.11.12.0/24. Thus, the different subnet networks for the six LAN networks carry the
network addresses 192.168.168.0 (Department 1), 192.168.169.0 (Department 2),
192.168.170.0 (Department 3), 192.168.171.0 (Department 4), 192.168.172.0 (server cluster)
8
NETWORK DESIGN AND CONFIGURATION
and 10.11.12.0 (wireless network). Subnet masks for the six network segments are
255.255.255.192 (Department 1), 255.255.255.224 (Department 2), 255.255.255.240
(Department 3), 255.255.255.128 (Department 4), 255.255.255.248 for the (server cluster),
and 255.255.255.0 (wireless network) and the particular CIDR values for the six subnets
being /26, /27, /28, /25, /29 and /24 respectively. This only suggests that the IP addressing
scheme in use for subnetting the ALM network Classless Inter Domain Routing (CIDR).
CIDR based addressing benefits networks as opposed to traditional classful IP addressing
methods in the sense the change of the CIDR value results in smaller variations to the address
space made available for a given subnet. In this way CIDR assists in preventing waste of
available IP addresses for allocation which is prevalent in classful IP addressing. Hence small
organizations like ALM can benefits immensely from the CIDR IP addressing scheme in
saving cost to acquire or implement their network.
NETWORK DESIGN AND CONFIGURATION
and 10.11.12.0 (wireless network). Subnet masks for the six network segments are
255.255.255.192 (Department 1), 255.255.255.224 (Department 2), 255.255.255.240
(Department 3), 255.255.255.128 (Department 4), 255.255.255.248 for the (server cluster),
and 255.255.255.0 (wireless network) and the particular CIDR values for the six subnets
being /26, /27, /28, /25, /29 and /24 respectively. This only suggests that the IP addressing
scheme in use for subnetting the ALM network Classless Inter Domain Routing (CIDR).
CIDR based addressing benefits networks as opposed to traditional classful IP addressing
methods in the sense the change of the CIDR value results in smaller variations to the address
space made available for a given subnet. In this way CIDR assists in preventing waste of
available IP addresses for allocation which is prevalent in classful IP addressing. Hence small
organizations like ALM can benefits immensely from the CIDR IP addressing scheme in
saving cost to acquire or implement their network.
9
NETWORK DESIGN AND CONFIGURATION
VLAN Implementation
Screenshot 1: Creation of VLANs in the multilayer switch
This screenshot shows the different VLANs created by their number as well as the default
VLAN 1. All the VLANs get added to the multilayer switch that connects with the router and
also with other lower level layer 2 switches via the multiple interfaces in trunk mode. The IP
assigning among the subnets of the various VLAN segments is performed using DHCP which
is configured in the core router where the DHCP pools remain mapped with their particular
VLANs. This makes it possible for devices from VLAN of a given network segment like the
PCs and printers to access other devices of another VLAN of a different network segment
like any of the servers or the smartphones connected through the wireless network. The layer
NETWORK DESIGN AND CONFIGURATION
VLAN Implementation
Screenshot 1: Creation of VLANs in the multilayer switch
This screenshot shows the different VLANs created by their number as well as the default
VLAN 1. All the VLANs get added to the multilayer switch that connects with the router and
also with other lower level layer 2 switches via the multiple interfaces in trunk mode. The IP
assigning among the subnets of the various VLAN segments is performed using DHCP which
is configured in the core router where the DHCP pools remain mapped with their particular
VLANs. This makes it possible for devices from VLAN of a given network segment like the
PCs and printers to access other devices of another VLAN of a different network segment
like any of the servers or the smartphones connected through the wireless network. The layer
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
NETWORK DESIGN AND CONFIGURATION
2 switches are connecting individual devices like PCs, smartphones and servers through the
different VLANs via respective interfaces in switchport mode access. This enables the
devices in each department in communicating with each other. The six different VLANs for
the six different network segments based on their numbers are 12 (WLAN), 168 (Department
1), 169 (Department 2), 170 (Department 3), 171 (Department 4) and 172 for the server
cluster.
VLAN Access Restrictions using Access Control List
The Access control list or ACL are the list of CLI terminal commands that have been
used to block access privileges like communication between devices of different departments.
These ACL commands can be used to impose several kinds of network restrictions on any
network that could include denying of access to HTTP servers or ping-based messages as in
echo requests and replies. The screenshot below presents the list of ICMP restrictions ACL
commands can make.
NETWORK DESIGN AND CONFIGURATION
2 switches are connecting individual devices like PCs, smartphones and servers through the
different VLANs via respective interfaces in switchport mode access. This enables the
devices in each department in communicating with each other. The six different VLANs for
the six different network segments based on their numbers are 12 (WLAN), 168 (Department
1), 169 (Department 2), 170 (Department 3), 171 (Department 4) and 172 for the server
cluster.
VLAN Access Restrictions using Access Control List
The Access control list or ACL are the list of CLI terminal commands that have been
used to block access privileges like communication between devices of different departments.
These ACL commands can be used to impose several kinds of network restrictions on any
network that could include denying of access to HTTP servers or ping-based messages as in
echo requests and replies. The screenshot below presents the list of ICMP restrictions ACL
commands can make.
11
NETWORK DESIGN AND CONFIGURATION
Screenshot 2: ACL list of ICMP access restrictions
To impose restrictions on the four departments from access or communication with
each other it should be verified that the devices of the departments fail to ping the devices of
all other departments. For accomplishing this, the access-list deny ICMP is used to block
echo requests. The commands for restricting ICMP echo message between each of the
departments with the rest through mentioning of the particular host networks are entered. The
following screenshot shows the process of restricting the network segment 192.168.168.0
from the rest. In this way communication privileges of other departments can be blocked
transfer of ping messages with other network segments.
NETWORK DESIGN AND CONFIGURATION
Screenshot 2: ACL list of ICMP access restrictions
To impose restrictions on the four departments from access or communication with
each other it should be verified that the devices of the departments fail to ping the devices of
all other departments. For accomplishing this, the access-list deny ICMP is used to block
echo requests. The commands for restricting ICMP echo message between each of the
departments with the rest through mentioning of the particular host networks are entered. The
following screenshot shows the process of restricting the network segment 192.168.168.0
from the rest. In this way communication privileges of other departments can be blocked
transfer of ping messages with other network segments.
12
NETWORK DESIGN AND CONFIGURATION
Screenshot 3: ACL command set to restrict host 192.168.168.0
Validation and Tests
To validate if the proposed network suitably meets the requirements of alm.co.uk, it is
necessary that the requirements of the network earlier mentioned get fulfilled by the network.
This is the reason the following validations are being conducted to see if the network
segments are indeed blocked from transfer of ping messages with each other and if these
devices of various departments can send or receive ping messages with the servers or access
the wireless network.
NETWORK DESIGN AND CONFIGURATION
Screenshot 3: ACL command set to restrict host 192.168.168.0
Validation and Tests
To validate if the proposed network suitably meets the requirements of alm.co.uk, it is
necessary that the requirements of the network earlier mentioned get fulfilled by the network.
This is the reason the following validations are being conducted to see if the network
segments are indeed blocked from transfer of ping messages with each other and if these
devices of various departments can send or receive ping messages with the servers or access
the wireless network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
NETWORK DESIGN AND CONFIGURATION
Screenshot 4: Attempts by Department 1 to ping rest of the departments
Screenshot 5: Attempts by Department 2 to ping rest of the departments
Screenshot 6: Attempts by Department 3 to ping rest of the departments
Screenshot 7: Attempts by Department 4 to ping rest of the departments
All four screenshots show that the devices of each department fail to ping other
departments. These tests hence validate that this network meets the network requirements of
restricting inter departmental communication.
Screenshot 8: Successful pings with all servers by Department 1 devices
NETWORK DESIGN AND CONFIGURATION
Screenshot 4: Attempts by Department 1 to ping rest of the departments
Screenshot 5: Attempts by Department 2 to ping rest of the departments
Screenshot 6: Attempts by Department 3 to ping rest of the departments
Screenshot 7: Attempts by Department 4 to ping rest of the departments
All four screenshots show that the devices of each department fail to ping other
departments. These tests hence validate that this network meets the network requirements of
restricting inter departmental communication.
Screenshot 8: Successful pings with all servers by Department 1 devices
14
NETWORK DESIGN AND CONFIGURATION
Screenshot 9: Successful pings with all servers by Department 2 devices
Screenshot 10: Successful pings with all servers by Department 3 devices
Screenshot 11: Successful pings with all servers by Department 4 devices
Screenshot 12: Successful pings with all servers by WLAN devices
All the five screenshots show that devices of every department can access every
server present in the server cluster. The smartphones connected to WLAN network are also
pinging the web, file sharing, DNS and mail servers. Therefore, the tests successfully show
the network meeting the requirements of making four servers accessible users of every
department.
This suggests the internal security measures of ALM network are properly in place as
the necessary restrictions have successfully been implemented with the ACL set of
commands for respective network segments.
NETWORK DESIGN AND CONFIGURATION
Screenshot 9: Successful pings with all servers by Department 2 devices
Screenshot 10: Successful pings with all servers by Department 3 devices
Screenshot 11: Successful pings with all servers by Department 4 devices
Screenshot 12: Successful pings with all servers by WLAN devices
All the five screenshots show that devices of every department can access every
server present in the server cluster. The smartphones connected to WLAN network are also
pinging the web, file sharing, DNS and mail servers. Therefore, the tests successfully show
the network meeting the requirements of making four servers accessible users of every
department.
This suggests the internal security measures of ALM network are properly in place as
the necessary restrictions have successfully been implemented with the ACL set of
commands for respective network segments.
15
NETWORK DESIGN AND CONFIGURATION
Protocols for connecting devices
The DHCP protocol is used to automatically assign the IP addresses to devices
belonging to any of the six network segments. The devices hosted by the four departments are
roughly 150 in number. The WLAN is serving about 250 devices plus the four servers
account for a broad range of systems in the network and so it turns extremely troublesome for
the network admins to manually specify IP address allocation for these systems. As DHCP
automatically selects the appropriate IP address for the said system, the excess burden of
network admins gets lifted. This way DHCP makes the network admins more available in
performing other critical activities like monitoring of the network traffic and prevention of
network threats.
NETWORK DESIGN AND CONFIGURATION
Protocols for connecting devices
The DHCP protocol is used to automatically assign the IP addresses to devices
belonging to any of the six network segments. The devices hosted by the four departments are
roughly 150 in number. The WLAN is serving about 250 devices plus the four servers
account for a broad range of systems in the network and so it turns extremely troublesome for
the network admins to manually specify IP address allocation for these systems. As DHCP
automatically selects the appropriate IP address for the said system, the excess burden of
network admins gets lifted. This way DHCP makes the network admins more available in
performing other critical activities like monitoring of the network traffic and prevention of
network threats.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16
NETWORK DESIGN AND CONFIGURATION
Screenshot 13: Successful DHCP configuration for wireless devices
The screenshot clearly validates that supported wireless devices like smartphones
being able to have the IP addresses automatically assigned via DHCP requests successfully.
However, this not just holds for wireless devices only. Devices of every network segment
including the fixed ones with wired network connections have their IPs assigned similarly
through DHCP.
Conclusion
The below report highlights the crucial role played by network segmentation and
internal measures for controlling network access in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. This report
begins by providing the requirement summary of the network containing the layout and
allocation of devices for the respective segments, what access restrictions are needed and
different servers installed as also specifying need for subnet calculations. Then this report
shows the network design drawn in Cisco Packet Tracer simulation software and explains the
network architecture thoroughly. Thereafter the IP addressing and classification of the
subnets for the network segments is given in an IP addressing table and discussed below as
per the various segments. The implementation of VLANs is then shown and discussed where
it explains the configuration of inter VLAN routing. Next this report talks of the set of access
control list commands used for restricting departments from accessing each other. All this
security applied with ACL commands gets shown with appropriate screenshots. After this the
report conducts tests and validation checks to verify that the network presented is meeting
AML’s requirements. Then the report ends after touching on IP address assigning via DHCP.
NETWORK DESIGN AND CONFIGURATION
Screenshot 13: Successful DHCP configuration for wireless devices
The screenshot clearly validates that supported wireless devices like smartphones
being able to have the IP addresses automatically assigned via DHCP requests successfully.
However, this not just holds for wireless devices only. Devices of every network segment
including the fixed ones with wired network connections have their IPs assigned similarly
through DHCP.
Conclusion
The below report highlights the crucial role played by network segmentation and
internal measures for controlling network access in stopping information security threats like
hackers, and other cyber security attacks from compromising networks. This report presents a
network for the company ALM that comes with such segmented subnetworks and adequate
security schemes applied on the segments through internal network commands. This report
begins by providing the requirement summary of the network containing the layout and
allocation of devices for the respective segments, what access restrictions are needed and
different servers installed as also specifying need for subnet calculations. Then this report
shows the network design drawn in Cisco Packet Tracer simulation software and explains the
network architecture thoroughly. Thereafter the IP addressing and classification of the
subnets for the network segments is given in an IP addressing table and discussed below as
per the various segments. The implementation of VLANs is then shown and discussed where
it explains the configuration of inter VLAN routing. Next this report talks of the set of access
control list commands used for restricting departments from accessing each other. All this
security applied with ACL commands gets shown with appropriate screenshots. After this the
report conducts tests and validation checks to verify that the network presented is meeting
AML’s requirements. Then the report ends after touching on IP address assigning via DHCP.
17
NETWORK DESIGN AND CONFIGURATION
NETWORK DESIGN AND CONFIGURATION
18
NETWORK DESIGN AND CONFIGURATION
Bibliography
Ashraf, Z. and Yousaf, M., 2016. SECURE INTER-VLAN IPv6 ROUTING:
IMPLEMENTATION & EVALUATION. Science International, 28(3).
Bassey, D.E., Okon, B.E. and Umunnah, R., 2016. „The Security Implications of Virtual
Local Area Network (VLAN), Niger Mills, Calabar, Nigeria‟. International Journal of
Scientific & Engineering Research (IJSER), 7(3), pp.1187-1194.
Bull, R., Matthews, J.N. and Trumbull, K.A., 2016. VLAN hopping, ARP poisoning and
man-in-the-middle attacks in virtualized environments. DEF CON, 24, p.9.
Chou, T.S., Baker, S. and Vega-Herrera, M., 2016, June. A comparison of network
simulation and emulation virtualization tools. In Proc. ASEE Annu. Conf. Expo. (pp. 1-9).
Jenkins, H., Moran, D. and Hester, E., 2018. Architecting DHCP and the Internet Using Top.
International Journal of Software Systems Research and Methodology, 1(1).
Kelley, M., Grimes, K., Martin, P. and Reynolds, H., 2018. On the Deployment of DHCP.
Journal of Computer Science and Software Engineering, 9(4).
Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo.
International Journal of Software Systems Research and Methodology, 3(1).
Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo.
International Journal of Software Systems Research and Methodology, 3(1).
Liu, X., Holden, B. and Wu, D., 2017, July. Automated synthesis of access control lists. In
2017 International Conference on Software Security and Assurance (ICSSA) (pp. 104-109).
IEEE.
NETWORK DESIGN AND CONFIGURATION
Bibliography
Ashraf, Z. and Yousaf, M., 2016. SECURE INTER-VLAN IPv6 ROUTING:
IMPLEMENTATION & EVALUATION. Science International, 28(3).
Bassey, D.E., Okon, B.E. and Umunnah, R., 2016. „The Security Implications of Virtual
Local Area Network (VLAN), Niger Mills, Calabar, Nigeria‟. International Journal of
Scientific & Engineering Research (IJSER), 7(3), pp.1187-1194.
Bull, R., Matthews, J.N. and Trumbull, K.A., 2016. VLAN hopping, ARP poisoning and
man-in-the-middle attacks in virtualized environments. DEF CON, 24, p.9.
Chou, T.S., Baker, S. and Vega-Herrera, M., 2016, June. A comparison of network
simulation and emulation virtualization tools. In Proc. ASEE Annu. Conf. Expo. (pp. 1-9).
Jenkins, H., Moran, D. and Hester, E., 2018. Architecting DHCP and the Internet Using Top.
International Journal of Software Systems Research and Methodology, 1(1).
Kelley, M., Grimes, K., Martin, P. and Reynolds, H., 2018. On the Deployment of DHCP.
Journal of Computer Science and Software Engineering, 9(4).
Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo.
International Journal of Software Systems Research and Methodology, 3(1).
Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo.
International Journal of Software Systems Research and Methodology, 3(1).
Liu, X., Holden, B. and Wu, D., 2017, July. Automated synthesis of access control lists. In
2017 International Conference on Software Security and Assurance (ICSSA) (pp. 104-109).
IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19
NETWORK DESIGN AND CONFIGURATION
Mikroyannidis, A., Kear, K., Smith, A., Jones, A., Rosewell, J., Donelan, H., Wermelinger,
M., Sanders, C., Third, A. and Connolly, T., 2018, October. The Open Networking Lab:
Hands-on Vocational Learning in Computer Networking. In 2018 IEEE Frontiers in
Education Conference (FIE) (pp. 1-5). IEEE.
Nguyen, V.G. and Kim, Y.H., 2016. SDN-Based Enterprise and Campus Networks: A Case
of VLAN Management. Journal of Information Processing Systems, 12(3).
O'Connor, T.J., 2019. Network Access Control through Host and Application Analysis.
Odi, A.C., Nwogbaga, N.E. and Chukwuka, N.O., 2015. The Proposed Roles of VLAN and
Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State
University. International Journal of Science and Research, (7), pp.2608-2615.
Ranathunga, D., Roughan, M., Nguyen, H., Kernick, P. and Falkner, N., 2016. Case studies
of scada firewall configurations and the implications for best practices. IEEE Transactions
on Network and Service Management, 13(4), pp.871-884.
Rentschler, M., Trsek, H. and Dürkop, L., 2016, July. OPC UA extension for IP auto-
configuration in cyber-physical systems. In 2016 IEEE 14th International Conference on
Industrial Informatics (INDIN) (pp. 26-31). IEEE.
Rosewell, J., Kear, K., Jones, A., Smith, A., Donelan, H., Mikroyannidis, A., Peasgood, A.,
Sanders, C., Third, A., Wermelinger, M. and Moss, N., 2018. Open Networking Lab: online
practical learning of computer networking.
Sari, L.M.I., Hatta, P., Wihidayat, E.S. and Xiao, F.E.N.G., 2018. A comparison between the
Use of Cisco packet tracer and graphical network simulator 3 as learning media on students’
achievement. Jurnal Pendidikan Teknologi dan Kejuruan, 24(1), pp.132-136.
NETWORK DESIGN AND CONFIGURATION
Mikroyannidis, A., Kear, K., Smith, A., Jones, A., Rosewell, J., Donelan, H., Wermelinger,
M., Sanders, C., Third, A. and Connolly, T., 2018, October. The Open Networking Lab:
Hands-on Vocational Learning in Computer Networking. In 2018 IEEE Frontiers in
Education Conference (FIE) (pp. 1-5). IEEE.
Nguyen, V.G. and Kim, Y.H., 2016. SDN-Based Enterprise and Campus Networks: A Case
of VLAN Management. Journal of Information Processing Systems, 12(3).
O'Connor, T.J., 2019. Network Access Control through Host and Application Analysis.
Odi, A.C., Nwogbaga, N.E. and Chukwuka, N.O., 2015. The Proposed Roles of VLAN and
Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State
University. International Journal of Science and Research, (7), pp.2608-2615.
Ranathunga, D., Roughan, M., Nguyen, H., Kernick, P. and Falkner, N., 2016. Case studies
of scada firewall configurations and the implications for best practices. IEEE Transactions
on Network and Service Management, 13(4), pp.871-884.
Rentschler, M., Trsek, H. and Dürkop, L., 2016, July. OPC UA extension for IP auto-
configuration in cyber-physical systems. In 2016 IEEE 14th International Conference on
Industrial Informatics (INDIN) (pp. 26-31). IEEE.
Rosewell, J., Kear, K., Jones, A., Smith, A., Donelan, H., Mikroyannidis, A., Peasgood, A.,
Sanders, C., Third, A., Wermelinger, M. and Moss, N., 2018. Open Networking Lab: online
practical learning of computer networking.
Sari, L.M.I., Hatta, P., Wihidayat, E.S. and Xiao, F.E.N.G., 2018. A comparison between the
Use of Cisco packet tracer and graphical network simulator 3 as learning media on students’
achievement. Jurnal Pendidikan Teknologi dan Kejuruan, 24(1), pp.132-136.
20
NETWORK DESIGN AND CONFIGURATION
Shirmarz, A. and Sabaei, M., 2016. Evaluation and comparison of binary trie base IP lookup
algorithms with real edge router IP prefix dataset. Evaluation, 7(6).
Smith, G., Reynolds, D. and McPherson, J., 2018. A Methodology for the Evaluation of
DHCP. Software engineering and CS Journal, 3(1).
Stojchevski, T., Dimovski, T. and Rendevski, N., 2016. Virtual Private Network
Implementation with GRE Tunnels and EIGRP Protocol. In International conference on
Applied Internet and Information Technologies (pp. 206-212).
NETWORK DESIGN AND CONFIGURATION
Shirmarz, A. and Sabaei, M., 2016. Evaluation and comparison of binary trie base IP lookup
algorithms with real edge router IP prefix dataset. Evaluation, 7(6).
Smith, G., Reynolds, D. and McPherson, J., 2018. A Methodology for the Evaluation of
DHCP. Software engineering and CS Journal, 3(1).
Stojchevski, T., Dimovski, T. and Rendevski, N., 2016. Virtual Private Network
Implementation with GRE Tunnels and EIGRP Protocol. In International conference on
Applied Internet and Information Technologies (pp. 206-212).
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.