1 NETWORK DESIGN AND CONFIGURATION Summary According to a wide number of researches, network segmentation and internal measures for controlling network access play a vital role in stopping information security threats like hackers, and other cyber security attacks from compromising networks. This report presents a network for the company ALM that comes with such segmented subnetworks and adequate security schemes applied on the segments through internal network commands. First this report provides the requirement summary of the network containing the layout and allocation of devices for the respective segments, what access restrictions are needed and different servers installed as also specifying need for subnet calculations. Then this report shows the network design drawn in Cisco Packet Tracer simulation software and explains the network architecture thoroughly. Thereafter the IP addressing and classification of the subnets for the network segments is given in an IP addressing table and discussed below as per the various segments. The implementation of VLANs is then shown and discussed where it explains the configuration of inter VLAN routing. Next this report talks of the set of access control list commands used for restricting departments from accessing each other. All this security applied with ACL commands gets shown with appropriate screenshots. After this the report conducts tests and validation checks to verify that the network presented is meeting AML’s requirements. Then the report discusses about IP address assigning and ends with concluding notes.
2 NETWORK DESIGN AND CONFIGURATION Table of Contents Introduction................................................................................................................................3 Requirements..............................................................................................................................3 Solution......................................................................................................................................5 Network Design.....................................................................................................................5 Network Subnetting and IP allocation...................................................................................6 VLAN Implementation..........................................................................................................9 VLAN Access Restrictions using Access Control List........................................................10 Validation and Tests.............................................................................................................12 Protocols for connecting devices.........................................................................................15 Conclusion................................................................................................................................16 Bibliography.............................................................................................................................18
3 NETWORK DESIGN AND CONFIGURATION Introduction The below report highlights the crucial role played by network segmentation and internal measures for controlling network access in stopping information security threats like hackers, and other cyber security attacks from compromising networks. This report presents a network for the company ALM that comes with such segmented subnetworks and adequate security schemes applied on the segments through internal network commands. This report begins by providing the requirement summary of the network containing the layout and allocation of devices for the respective segments, what access restrictions are needed and different servers installed as also specifying need for subnet calculations. Then this report shows the network design drawn in Cisco Packet Tracer simulation software and explains the network architecture thoroughly. Thereafter the IP addressing and classification of the subnets for the network segments is given in an IP addressing table and discussed below as per the various segments. The implementation of VLANs is then shown and discussed where it explains the configuration of inter VLAN routing. Next this report talks of the set of access control list commands used for restricting departments from accessing each other. All this security applied with ACL commands gets shown with appropriate screenshots. After this the report conducts tests and validation checks to verify that the network presented is meeting AML’s requirements. Then the report discusses about IP address assigning and ends with concluding notes. Requirements ALM’s network is to contain four separate LAN networks for the four departments along with LAN networks of the server cluster as also the wireless WLAN network. LAN network for the server cluster comprises of the DNS server, the mail server, the web server and the FTP server for catering to the various networking purposes.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 NETWORK DESIGN AND CONFIGURATION All of these above-mentioned servers must be able to communicate both ways with individual workstations and devices of users from every departments. SubnetcalculationandbreakdownoftheALMnetworkmustbecarriedoutbased requirements of workstations, printers and servers by the different LAN networks. The network of alm.co.uk must also have support for wireless connectivity to serve various smartphones, laptops and other wireless devices of users from the four departments. Nextthenetworkistobesegmentedbasedonthesubnetsforensuringthatthe communications over the network between the devices of all the six LAN networks are administered and controlled more effectively with predefined set of rules for network access. Every department is to be prevented from access to systems of any other department through the internally applied security mechanisms. Number and distribution of PCs and printers among the four different departments are as follows: 48 PCs along with 1 printer for Department 1, 18 PCs along with 1 printer for Department 2, 11 PCs and 1 printer for Department 3, 68 PCs as well as 1 printer for Department 4.
5 NETWORK DESIGN AND CONFIGURATION Solution Network Design Figure 1: Network Design Diagram of alm.co.uk The above figure presents the diagram showing a detailed view of the network design for the small sized organization of alm.co.uk and discusses how it is operated. This network diagrammakesevident,thatALM’snetworkiscreatedbasedonthethree-layered hierarchical model of networking architecture comprising of the core, the distribution and the access layers and is also seen to follow a top down networking approach. From the top the router of the company’s network obtains network from routers of the ISPs or Internet Service Providers and forms the core layer. In this core router all the different configurations regarding configuration of sub interfaces, creation of DHCP pools and inter VLAN routing for all six network segments is performed. Then this routed network gets passed to the multilayer switch which facilitates the inter VLAN routing. This switch constitutes the distribution layer of the network. This switch distributes network access to lower level layer 2 switches of the six different LAN networks. Network connectivity for these particular switches are ensured via their specific VLANs. The layer 2 switches directly connect the individual devices and thus form the access layer thereby completing this three-layer model of networking architecture. These six layers 2 switches include four for the various different
6 NETWORK DESIGN AND CONFIGURATION departments of ALM and two for the server cluster and the wireless network. There server cluster in the network consists of four servers. They are the web, DNS, mail and the FTP servers. The network gets segmented with VLANs for every LAN network, access between different departments is restricted by the use of access control list or ACL list of commands. Network Subnettingand IP allocation Name of Subne t IP Addr ess spac e Requ ired Alloc ated Addr ess Spac e Subnet Network Address CIDR/ Mask Subnet Mask Rangeof IP Addresse s Subnet Broadcas t Addresse Depart ment 1 4962 192.168. 168.0 /26 255.255.2 55.192 192.168.1 68.1- 192.168.1 68.62 192.168.1 68.63 Depart ment 2 1930 192.168. 169.0 /27 255.255.2 55.224 192.168.1 69.1- 192.168.1 69.30 192.168.1 69.31 Depart ment 3 1214 192.168. 170.0 /28 255.255.2 55.240 192.168.1 70.1- 192.168.1 70.14 192.168.1 70.15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 NETWORK DESIGN AND CONFIGURATION Depart ment 4 69126 192.168. 171.0 /25 255.255.2 5.128 192.168.1 71.1- 192.168.1 71.126 192.168.1 71.127 Server LAN 46 192.168. 172.0 29 255.255.2 55.248 192.168.1 72.1- 192.168.1 72.6 192.168.1 72.7 Wireles s Networ k LAN 250254 10.11.12 .0 /24 255.255.2 55.0 10.11.12.1 - 10.11.12.2 54 10.11.12.2 55 This subnetting table created above provides the six subnets that have been calculated for the six separate network segments through the major network 192.168.0.0/24. Here the third octet of the IP network varies for subnetworks of every four departments as also the one for the server cluster. The reason behind this being the access routes having been configured via inter VLAN routing as every segment possess their own unique VLAN number that matches the third octet. Network segments of both the server cluster and the WLAN network is accessible from the devices of users from all departments. As the WLAN provides wireless connectivity for the supported devices of users in all departments, a subnet with all of the address space is allocated to that segment. The private major network used by the WLAN is 10.11.12.0/24. Thus, the different subnet networks for the six LAN networks carry the networkaddresses192.168.168.0(Department1),192.168.169.0(Department2), 192.168.170.0 (Department 3), 192.168.171.0 (Department 4), 192.168.172.0 (server cluster)
8 NETWORK DESIGN AND CONFIGURATION and10.11.12.0(wirelessnetwork).Subnetmasksforthesixnetworksegmentsare 255.255.255.192(Department1),255.255.255.224(Department2),255.255.255.240 (Department 3), 255.255.255.128 (Department 4), 255.255.255.248 for the (server cluster), and 255.255.255.0 (wireless network) and the particular CIDR values for the six subnets being /26, /27, /28, /25, /29 and /24 respectively. This only suggests that the IP addressing scheme in use for subnetting the ALM network Classless Inter Domain Routing (CIDR). CIDR based addressing benefits networks as opposed to traditional classful IP addressing methods in the sense the change of the CIDR value results in smaller variations to the address space made available for a given subnet. In this way CIDR assists in preventing waste of available IP addresses for allocation which is prevalent in classful IP addressing. Hence small organizations like ALM can benefits immensely from the CIDR IP addressing scheme in saving cost to acquire or implement their network.
9 NETWORK DESIGN AND CONFIGURATION VLAN Implementation Screenshot 1: Creation of VLANs in the multilayer switch This screenshot shows the different VLANs created by their number as well as the default VLAN 1. All the VLANs get added to the multilayer switch that connects with the router and also with other lower level layer 2 switches via the multiple interfaces in trunk mode. The IP assigning among the subnets of the various VLAN segments is performed using DHCP which is configured in the core router where the DHCP pools remain mapped with their particular VLANs. This makes it possible for devices from VLAN of a given network segment like the PCs and printers to access other devices of another VLAN of a different network segment like any of the servers or the smartphones connected through the wireless network. The layer
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 NETWORK DESIGN AND CONFIGURATION 2 switches are connecting individual devices like PCs, smartphones and servers through the different VLANs via respective interfaces in switchport mode access. This enables the devices in each department in communicating with each other. The six different VLANs for the six different network segments based on their numbers are 12 (WLAN), 168 (Department 1), 169 (Department 2), 170 (Department 3), 171 (Department 4) and 172 for the server cluster. VLAN Access Restrictions using Access Control List The Access control list or ACL are the list of CLI terminal commands that have been used to block access privileges like communication between devices of different departments. These ACL commands can be used to impose several kinds of network restrictions on any network that could include denying of access to HTTP servers or ping-based messages as in echo requests and replies. The screenshot below presents the list of ICMP restrictions ACL commands can make.
11 NETWORK DESIGN AND CONFIGURATION Screenshot 2: ACL list of ICMP access restrictions To impose restrictions on the four departments from access or communication with each other it should be verified that the devices of the departments fail to ping the devices of all other departments. For accomplishing this, the access-list deny ICMP is used to block echo requests. The commands for restricting ICMP echo message between each of the departments with the rest through mentioning of the particular host networks are entered. The following screenshot shows the process of restricting the network segment 192.168.168.0 from the rest. In this way communication privileges of other departments can be blocked transfer of ping messages with other network segments.
12 NETWORK DESIGN AND CONFIGURATION Screenshot 3: ACL command set to restrict host 192.168.168.0 Validation and Tests To validate if the proposed network suitably meets the requirements of alm.co.uk, it is necessary that the requirements of the network earlier mentioned get fulfilled by the network. This is the reason the following validations are being conducted to see if the network segments are indeed blocked from transfer of ping messages with each other and if these devices of various departments can send or receive ping messages with the servers or access the wireless network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 NETWORK DESIGN AND CONFIGURATION Screenshot 4: Attempts by Department 1 to ping rest of the departments Screenshot 5: Attempts by Department 2 to ping rest of the departments Screenshot 6: Attempts by Department 3 to ping rest of the departments Screenshot 7: Attempts by Department 4 to ping rest of the departments All four screenshots show that the devices of each department fail to ping other departments. These tests hence validate that this network meets the network requirements of restricting inter departmental communication. Screenshot 8: Successful pings with all servers by Department 1 devices
14 NETWORK DESIGN AND CONFIGURATION Screenshot 9: Successful pings with all servers by Department 2 devices Screenshot 10: Successful pings with all servers by Department 3 devices Screenshot 11: Successful pings with all servers by Department 4 devices Screenshot 12: Successful pings with all servers by WLAN devices All the five screenshots show that devices of every department can access every server present in the server cluster. The smartphones connected to WLAN network are also pinging the web, file sharing, DNS and mail servers. Therefore, the tests successfully show the network meeting the requirements of making four servers accessible users of every department. This suggests the internal security measures of ALM network are properly in place as thenecessaryrestrictionshavesuccessfullybeenimplementedwiththeACLsetof commands for respective network segments.
15 NETWORK DESIGN AND CONFIGURATION Protocols for connecting devices The DHCP protocol is used to automatically assign the IP addresses to devices belonging to any of the six network segments. The devices hosted by the four departments are roughly 150 in number. The WLAN is serving about 250 devices plus the four servers account for a broad range of systems in the network and so it turns extremely troublesome for the network admins to manually specify IP address allocation for these systems. As DHCP automatically selects the appropriate IP address for the said system, the excess burden of network admins gets lifted. This way DHCP makes the network admins more available in performing other critical activities like monitoring of the network traffic and prevention of network threats.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16 NETWORK DESIGN AND CONFIGURATION Screenshot 13: Successful DHCP configuration for wireless devices The screenshot clearly validates that supported wireless devices like smartphones being able to have the IP addresses automatically assigned via DHCP requests successfully. However, this not just holds for wireless devices only. Devices of every network segment including the fixed ones with wired network connections have their IPs assigned similarly through DHCP. Conclusion The below report highlights the crucial role played by network segmentation and internal measures for controlling network access in stopping information security threats like hackers, and other cyber security attacks from compromising networks. This report presents a network for the company ALM that comes with such segmented subnetworks and adequate security schemes applied on the segments through internal network commands. This report begins by providing the requirement summary of the network containing the layout and allocation of devices for the respective segments, what access restrictions are needed and different servers installed as also specifying need for subnet calculations. Then this report shows the network design drawn in Cisco Packet Tracer simulation software and explains the network architecture thoroughly. Thereafter the IP addressing and classification of the subnets for the network segments is given in an IP addressing table and discussed below as per the various segments. The implementation of VLANs is then shown and discussed where it explains the configuration of inter VLAN routing. Next this report talks of the set of access control list commands used for restricting departments from accessing each other. All this security applied with ACL commands gets shown with appropriate screenshots. After this the report conducts tests and validation checks to verify that the network presented is meeting AML’s requirements. Then the report ends after touching on IP address assigning via DHCP.
17 NETWORK DESIGN AND CONFIGURATION
18 NETWORK DESIGN AND CONFIGURATION Bibliography Ashraf,Z.andYousaf,M.,2016.SECUREINTER-VLANIPv6ROUTING: IMPLEMENTATION & EVALUATION.Science International,28(3). Bassey, D.E., Okon, B.E. and Umunnah, R., 2016. „The Security Implications of Virtual Local Area Network (VLAN), Niger Mills, Calabar, Nigeria‟.International Journal of Scientific & Engineering Research (IJSER),7(3), pp.1187-1194. Bull, R., Matthews, J.N. and Trumbull, K.A., 2016. VLAN hopping, ARP poisoning and man-in-the-middle attacks in virtualized environments.DEF CON,24, p.9. Chou,T.S.,Baker,S.andVega-Herrera,M.,2016,June.Acomparisonofnetwork simulation and emulation virtualization tools. InProc. ASEE Annu. Conf. Expo.(pp. 1-9). Jenkins, H., Moran, D. and Hester, E., 2018. Architecting DHCP and the Internet Using Top. International Journal of Software Systems Research and Methodology,1(1). Kelley, M., Grimes, K., Martin, P. and Reynolds, H., 2018. On the Deployment of DHCP. Journal of Computer Science and Software Engineering,9(4). Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo. International Journal of Software Systems Research and Methodology,3(1). Laing, R., Smith, S., Sixtus, J. and Hardy, J., 2019. Deconstructing DHCP Using Zobo. International Journal of Software Systems Research and Methodology,3(1). Liu, X., Holden, B. and Wu, D., 2017, July. Automated synthesis of access control lists. In 2017 International Conference on Software Security and Assurance (ICSSA)(pp. 104-109). IEEE.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19 NETWORK DESIGN AND CONFIGURATION Mikroyannidis, A., Kear, K., Smith, A., Jones, A., Rosewell, J., Donelan, H., Wermelinger, M., Sanders, C., Third, A. and Connolly, T., 2018, October. The Open Networking Lab: Hands-onVocationalLearninginComputerNetworking.In2018IEEEFrontiersin Education Conference (FIE)(pp. 1-5). IEEE. Nguyen, V.G. and Kim, Y.H., 2016. SDN-Based Enterprise and Campus Networks: A Case of VLAN Management.Journal of Information Processing Systems,12(3). O'Connor, T.J., 2019. Network Access Control through Host and Application Analysis. Odi, A.C., Nwogbaga, N.E. and Chukwuka, N.O., 2015. The Proposed Roles of VLAN and Inter-VLANRoutinginEffectiveDistributionofNetworkServicesinEbonyiState University.International Journal of Science and Research, (7), pp.2608-2615. Ranathunga, D., Roughan, M., Nguyen, H., Kernick, P. and Falkner, N., 2016. Case studies of scada firewall configurations and the implications for best practices.IEEE Transactions on Network and Service Management,13(4), pp.871-884. Rentschler, M., Trsek, H. and Dürkop, L., 2016, July. OPC UA extension for IP auto- configuration in cyber-physical systems. In2016 IEEE 14th International Conference on Industrial Informatics (INDIN)(pp. 26-31). IEEE. Rosewell, J., Kear, K., Jones, A., Smith, A., Donelan, H., Mikroyannidis, A., Peasgood, A., Sanders, C., Third, A., Wermelinger, M. and Moss, N., 2018. Open Networking Lab: online practical learning of computer networking. Sari, L.M.I., Hatta, P., Wihidayat, E.S. and Xiao, F.E.N.G., 2018. A comparison between the Use of Cisco packet tracer and graphical network simulator 3 as learning media on students’ achievement.Jurnal Pendidikan Teknologi dan Kejuruan,24(1), pp.132-136.
20 NETWORK DESIGN AND CONFIGURATION Shirmarz, A. and Sabaei, M., 2016. Evaluation and comparison of binary trie base IP lookup algorithms with real edge router IP prefix dataset.Evaluation,7(6). Smith, G., Reynolds, D. and McPherson, J., 2018. A Methodology for the Evaluation of DHCP.Software engineering and CS Journal,3(1). Stojchevski,T.,Dimovski,T.andRendevski,N.,2016.VirtualPrivateNetwork Implementation with GRE Tunnels and EIGRP Protocol. InInternational conference on Applied Internet and Information Technologies(pp. 206-212).