Building and Configuring a Secure LAN for Shamir_Techno
VerifiedAdded on 2025/05/04
|14
|1137
|237
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

3.1 build and configure a LAN (including services) to meet a given requirement:-
The requirement that is given by the Shamir_techno Ltd. Has been fulfilled in the current design.
Local Area Network are designed for a small area to access the services within the network. LANs are
generally deployed in Building, offices etc.
Let’s discuss how we have designed the network.
Steps to Build the LAN:-
1. Create a Planning of the network:-
One should create a rough or blue print of network to monitor the efficiency of design.
2. Select the topology:-
To create a Local Area network, first step is to decide what topology should be applied in the design so
that information is flow very effectively in the network. Topology that are usually used are Mesh, Star,
Tree, Bus etc.
3. Selection of LAN Hardware and Software:-
Router:-In this design, we have used 2911 series Cisco Router on Cisco Packet Tracer. This router helps
to communicate with other network while designing a WAN network.
Switches:- In the following design we have used 2950 series Cisco Switch with the capacity of 48 ports.
Switches is used to connect end devices like PC, Laptops or servers within a network. Switch help to
establish a communication locally within a network.
Wireless Access Points (AP):- Wireless Access Points are the devices which provides wireless
connectivity to the end devices.
4. Selecting LAN Protocols:-
The protocols that we have used in this network design are:-IPv4, DNS, DHCP, HTTP and FTP.
IPv4:- Internet Protocol version4 or IPv4 is network addressing protocol which is used to identify
the device in the network. With the help of IPv4, a device can communicate with other devices.
DNS:- Domain Name System or DNS is used to convert IP address into associate name and vice-
versa. In the given design as you can see that we have deployed a DNS server to provide this
services.
DHCP:- DHCP or Dynamic Host Configuration Protocol is used to assign an range of IP addresses
Dynamically to the end device.
DHCP server has also been deployed in the network.
HTTP server or Web Server is used to access the web service on the network.
5. Selecting Security Protocols and Methods
In this design various security protocols and methodologies has been used to provide security to the
Network such as:-
The requirement that is given by the Shamir_techno Ltd. Has been fulfilled in the current design.
Local Area Network are designed for a small area to access the services within the network. LANs are
generally deployed in Building, offices etc.
Let’s discuss how we have designed the network.
Steps to Build the LAN:-
1. Create a Planning of the network:-
One should create a rough or blue print of network to monitor the efficiency of design.
2. Select the topology:-
To create a Local Area network, first step is to decide what topology should be applied in the design so
that information is flow very effectively in the network. Topology that are usually used are Mesh, Star,
Tree, Bus etc.
3. Selection of LAN Hardware and Software:-
Router:-In this design, we have used 2911 series Cisco Router on Cisco Packet Tracer. This router helps
to communicate with other network while designing a WAN network.
Switches:- In the following design we have used 2950 series Cisco Switch with the capacity of 48 ports.
Switches is used to connect end devices like PC, Laptops or servers within a network. Switch help to
establish a communication locally within a network.
Wireless Access Points (AP):- Wireless Access Points are the devices which provides wireless
connectivity to the end devices.
4. Selecting LAN Protocols:-
The protocols that we have used in this network design are:-IPv4, DNS, DHCP, HTTP and FTP.
IPv4:- Internet Protocol version4 or IPv4 is network addressing protocol which is used to identify
the device in the network. With the help of IPv4, a device can communicate with other devices.
DNS:- Domain Name System or DNS is used to convert IP address into associate name and vice-
versa. In the given design as you can see that we have deployed a DNS server to provide this
services.
DHCP:- DHCP or Dynamic Host Configuration Protocol is used to assign an range of IP addresses
Dynamically to the end device.
DHCP server has also been deployed in the network.
HTTP server or Web Server is used to access the web service on the network.
5. Selecting Security Protocols and Methods
In this design various security protocols and methodologies has been used to provide security to the
Network such as:-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VLAN: - VLAN or Virtual Local Area Network is group of virtual Network which as as different
but resides in a single Network. VLANs cannot communicate with each other until they doesn’t
provide same VLAN number.
Port-Security:- Port-security secure the port of the network device. In port-security we can bind
the existing device with its mac-address which means no other than that device can connect
with the port.
Access Control List:- ACL’s are set of rules which are defined to restrict the service within a
network. ACL’s work like a firewall in an network. When a packet is passed from an interface it’s
header is check and matched with the ACL, if it is in denying state then packet is dropped in a
network.
6. Selecting redundancy and efficient methodologies and protocols:-
Spanning Tree Protocol:- Spanning Tree Protocol or STP create a logical topology for the
Ethernet which is loop-free. STP protect the network from broadcast packets.
VTP or VLAN Trunking Protocol:- VTP is used to share the VLAN information to all switches
which are connected within a domain. VTP uses 802.1Q and ISL Trunking protocol.
7. Assigning IP Address to the devices.
Configuration of LAN
Router:-
Interface:- Fa0/0
IP Address:- 172.16.0.1
Measures:- ACL
Switches:-
IP Address:- DHCP (172.16.0.10/24)
Measures:- STP, VLAN, VTP, Port-Security, Ether channel
Network Area 1:-
Department 1:- VLAN 10
Department 2:- VLAN 20
Department 3:- VLAN 30
Server Farm:-
DHCP:-172.16.0.3
DNS:-172.16.0.2
Web:-172.16.0.4
but resides in a single Network. VLANs cannot communicate with each other until they doesn’t
provide same VLAN number.
Port-Security:- Port-security secure the port of the network device. In port-security we can bind
the existing device with its mac-address which means no other than that device can connect
with the port.
Access Control List:- ACL’s are set of rules which are defined to restrict the service within a
network. ACL’s work like a firewall in an network. When a packet is passed from an interface it’s
header is check and matched with the ACL, if it is in denying state then packet is dropped in a
network.
6. Selecting redundancy and efficient methodologies and protocols:-
Spanning Tree Protocol:- Spanning Tree Protocol or STP create a logical topology for the
Ethernet which is loop-free. STP protect the network from broadcast packets.
VTP or VLAN Trunking Protocol:- VTP is used to share the VLAN information to all switches
which are connected within a domain. VTP uses 802.1Q and ISL Trunking protocol.
7. Assigning IP Address to the devices.
Configuration of LAN
Router:-
Interface:- Fa0/0
IP Address:- 172.16.0.1
Measures:- ACL
Switches:-
IP Address:- DHCP (172.16.0.10/24)
Measures:- STP, VLAN, VTP, Port-Security, Ether channel
Network Area 1:-
Department 1:- VLAN 10
Department 2:- VLAN 20
Department 3:- VLAN 30
Server Farm:-
DHCP:-172.16.0.3
DNS:-172.16.0.2
Web:-172.16.0.4

FTP:- 172.16.0.4
Router Configuration:-
R1# configure terminal
R1(config)#int fa0/0
R1(config-if)#ip address 172.16.0.1 255.255.0.0
R1(config-if)#no shutdown
3.2 implement network security on a LAN
ACL configuration:-
R1# config terminal
R1(config)# access-list 101 deny tcp any eq telnet any
R1(config)# interface fa0/0
R1(config-if)# ip access-group 101 in
Switch Configuration
VLAN
S1# config terminal
S1(config)# vlan 10
S1(vlan)#name Department_1
S1(config)# vlan 20
S1(vlan)#name Department_2
S1(config)# vlan 30
S1(vlan)#name Department_3
S2#config terminal
S2(config)# int fa0/6
S2(config-if)# switchport mode access
Router Configuration:-
R1# configure terminal
R1(config)#int fa0/0
R1(config-if)#ip address 172.16.0.1 255.255.0.0
R1(config-if)#no shutdown
3.2 implement network security on a LAN
ACL configuration:-
R1# config terminal
R1(config)# access-list 101 deny tcp any eq telnet any
R1(config)# interface fa0/0
R1(config-if)# ip access-group 101 in
Switch Configuration
VLAN
S1# config terminal
S1(config)# vlan 10
S1(vlan)#name Department_1
S1(config)# vlan 20
S1(vlan)#name Department_2
S1(config)# vlan 30
S1(vlan)#name Department_3
S2#config terminal
S2(config)# int fa0/6
S2(config-if)# switchport mode access
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

S2(config-if)# switchport access vlan 10
S2(config)# int fa0/7
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 20
S2(config)# int fa0/8
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 30
STP
S1(config)#spanning-tree vlan 1 root primary
S2(config)# int fa0/7
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 20
S2(config)# int fa0/8
S2(config-if)# switchport mode access
S2(config-if)# switchport access vlan 30
STP
S1(config)#spanning-tree vlan 1 root primary
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VTP Server
S1#config
S1(config)# vtp domain cisco
S1(config)# vtp mode server
S1#config
S1(config)# vtp domain cisco
S1(config)# vtp mode server

VTP client
S2#config
S2(config)# vtp domain test
S2(config)# vtp mode client
S2#config
S2(config)# vtp domain test
S2(config)# vtp mode client
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Port-Security
S1(config)# int fa0/5
S1(config-if)# switchport port-security
S1(config-if)# switchport port-security mac-address sticky
S1(config)# int fa0/5
S1(config-if)# switchport port-security
S1(config-if)# switchport port-security mac-address sticky
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Ether Channel
Switch1> enable
Switch1# configure terminal
S1(config)# interface range fa0/2-3
S1(config-if-range)# switchport mode access
S1(config-if-range)# switchport access vlan 10
S1(config-if-range)# channel-group 5 mode desirable
S1(config-if-range)# end
Switch1> enable
Switch1# configure terminal
S1(config)# interface range fa0/2-3
S1(config-if-range)# switchport mode access
S1(config-if-range)# switchport access vlan 10
S1(config-if-range)# channel-group 5 mode desirable
S1(config-if-range)# end

3.3 critically review and test a LAN
Review and test a LAN
Now we are going to check whether the configuration of LAN is working or not. Basic step to review any
LAN is to check whether the Systems are communication with each other or not.
Source Destination Ping Result
Department 1 Department 2 Failed(Successful
Implementation of VLAN)
Department 2 Department 3 Failed(Successful
Implementation of VLAN)
DHCP server Client Successful IP distribution
Web Server Client Successfully accessing of
website
STP reviewing:-
On shutting down on port from switch 1 to switch 2 it doesn’t affect the network as standby line is up.
Output:-Successful Completion
Review and test a LAN
Now we are going to check whether the configuration of LAN is working or not. Basic step to review any
LAN is to check whether the Systems are communication with each other or not.
Source Destination Ping Result
Department 1 Department 2 Failed(Successful
Implementation of VLAN)
Department 2 Department 3 Failed(Successful
Implementation of VLAN)
DHCP server Client Successful IP distribution
Web Server Client Successfully accessing of
website
STP reviewing:-
On shutting down on port from switch 1 to switch 2 it doesn’t affect the network as standby line is up.
Output:-Successful Completion
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4.1 monitor and troubleshoot a LAN
Using Sniffer
Using Network Simulation:-
Using Packet Header
Using Sniffer
Using Network Simulation:-
Using Packet Header
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Using Show command:-

Ping:-
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.