NIRMAL
NIRMAL
ORGANIZATION
A Project Report Submitted to
NIRMALRAJ M
Reg.No. RA2332241010085
Under the guidance of
Chennai, Tamilnadu
APRIL – 2025
BONAFIDE CERTIFICATE
Applications
( GUIDE )
With profound gratitude to the ALMIGHTY, I take this chance to thank the people
who helped me to complete this project.
I take this as a right opportunity to say THANKS to my parents who are there to stand
with me always with the words “YOU CAN”.
I earnestly thank Dr. A. Duraisamy, Dean, Faculty of Science and Humanities, SRM
Institute of Science and Technology, who always encourage us to do novel things.
A great note of gratitude to Dr. S. Albert Antony Raj, Deputy Dean, Faculty of
Science and Humanities for his valuable guidance and constant Support to do this Project.
I express our sincere thanks to Dr. R. Jayashree, Associate Professor and Head, for
her support to execute all incline in learning.
I convey our gratitude to all the faculty members of the department who extended
their support through valuable comments and suggestions during the reviews.
Our gratitude to friends and people who are known and unknown to me who helped in
carrying out this project work a successful one.
NIRMALRAJ M (RA2332241010085)
COMPANY OFFER LETTER
PLAGIARISM CERTIFICATE
TABLE OF CONTENT
ABSTRACT 1
INTRODUCTION
CHAPTER 1 1.1 Analysis and Requirements 2
1.2 Problem Description
CHAPTER 12 CONCLUSION 73
CHAPTER 13 REFERENCES 77
APPENDIX 79
ABSTRACT
1
CHAPTER : 1
INTRODUCTION
2
1. Introduction
4
1.1 Analysis and Requirements
System-Level Requirements
5
7) Efficient Routing Protocols: Dynamic routing protocols should be
implemented to optimize data flow and ensure efficient packet delivery.
8) Load Balancing: Traffic should be distributed evenly across the network
to avoid congestion and ensure optimal performance.
Software-Level Requirements
6
1.2 Problem Description/Modules Description
7
CHAPTER : 2
8
2. Business Scenario Analysis
1) Overview
2) Scalability Requirements
With the anticipated growth of the organization, the network must be designed
to handle an increasing number of devices and users without affecting
performance. Proper IP addressing and VLAN segmentation will ensure
efficient traffic management and reduce network congestion.
The IT team needs centralized control to monitor and manage the network
efficiently. Network management tools will be deployed to enable real-time
monitoring, fault detection, and performance optimization.
8) Key Considerations
10
CHAPTER : 3
11
3. Proposed Network Design and Implementation
A study Hamid (2015) states that the possibility that every network is
rated to be perfect and error-free is very minimal supposed it is subjected to
proper expert analysis and evaluation or the attacker’s penetration capabilities.
Hence, IT administrators should always be vigilant, careful, not be too confident
and unrelactant after implementing networks because the network might seem
complete to them in terms of information security principles but when this
network is evaluated by experts or whitehat hackers, it turns out to be highly
vulnerable. Therefore, IT guys should always try to take into considerations the
disaster recovery plans, continuous updates to new technologies, managed
security solutions among other network security preventive measures.
Danilo (2018) states that the layered network design gives a three
conceptual layers of the network design and implementation in order to
improve performance, security, and to easen the network maintenance (Danilo,
2018). These three layers includes the core, distribution, and the access
12
layers that
13
provides various and different functions in the layered architecture to achieve a
specific network objective. With the help of the layered network architecture,
network engineers will have a good understanding of how to build a high
performance, scalable, secure, and easy to manage network (Sinket, 2019).
Therefore, the CyberNet Network hierarchical model is fostered together with
mesh topology that includes all nodes cooperating to distribute data amongst
each other, and also while connecting the end devices, there is star topology that
includes all nodes connecting to a central device.
15
one is down, the other redundant link is applicable (Mas-Machuca, 2016). In
this network sytem, redundancy was implemented through the use of
etherchannel and also more than two core switches/routers/firewalls and
multiple links between the devices i.e. between the access and multilayer
switches as shown in the topology.
16
CHAPTER : 4
17
4. Addressing Scheme Design
1) IP Addressing Structure
2) Subnet Allocation
Headquarters: 172.16.1.0,172.16.2.0,172.16.3.0/24
Branch 1: 172.16.5.0,172.16.5.128/25
Branch 2: 172.16.6.0,172.16.6.128/25
Branch 3: 172.16.7.0,172.16.7.128/25
3) VLAN Assignment
18
4) Address Reservation
6) Future Scalability
-keeping ensures a smooth workflow for both donors and NGOs. Given these
operational advantages, the system is expected to be widely accepted by users.
19
CHAPTER : 5
20
5. Network Protocols and Design Strategies Discussion
5.1 Devices Choice and Naming System
In the network, all the devices including the switches, routers, firewall,
computers, printers, access points, IP Phones, tablets, and smartphones were
chosen after a thorough evaluations and all were named as per the company
naming conventions as shown below;
Firewall- Cisco ASA 5506 firewall was used in the network and was named
PERIMETER-FIREWALL
Routers- 2811 Cisco Router was chosen and has been named according to
the purpose i.e., CORE-ROUTER.
Multilayer Switches- 3650-24PS layer-3 switches were chosen and have
been named according to the purpose i.e., CORE-SW1, CORE-SW2.
Access Switches- 2960 layer-2 switches were chosen and have been
named according to the department: for example; MK-SW, HR-SW,
FIN-SW, SNM-SW, etc.
Access points- Cisco AP-PT devices were used in the network and were
named according to the departments; MK-AP, HR-AP, FIN-AP etc.
All the PCs have been named according to the department i.e., MK-PC,
HR-PC, etc
21
.5.2 Design IP Addressing and Allocation
23
5.3 Basic Device Configurations or Settings
In the network, we have carried out basic device settings using the CLI
and configured settings such as the hostnames, banner messages, line console
password, priviledge mode password, line vty password and SSH, username and
password, domain name, disabling IP domain lookup, exec timeout and logging
synchronous, and finally, encrypted all the configured passwords. The following
are a sample of basic configuration results in one of the switches.
24
5.4 VLAN Configuration
25
5.5 Inter-VLAN Routing
26
N/B--Using this command on preiviledge exec mode: show startup-config
27
5.6 EtherChannel or Link Aggregation Configuration
28
5.7 Server Farm Static IPv4 Addressing
All the server devices in the server room or data center are allocated IPv4
addresses statically using the address 10.10.1.224/27. The server room devices
were configured with the static IPv4 addresses and the connecting HQ-Switches
VLAN 199 interface IP address acted as the default gateway to the server room
LAN.
The diagram below show the static IPv4 assignment on three of the the
servers.
29
5.8 DHCP Server Configuration and Hosts Allocation
All the host devices in the the network except the server room devices are
allocated IPv4 addresses dynamically. The host devices are allocated IPv4
addresses dynamically by the dedicated DHCP server device located at the
server farm. The diagrams below show DHCP server configurations on the
DHCP server dedicated device, plus the evidence of automatic IPv4 assignment
on the host devices.
30
b) Automatic IP Address Assigment
31
d) Automatic IP Address Assignment for PC in PNET
32
N/B--Using this command on preiviledge exec mode: show ip ospf neighbor
33
5.10 Default Static Route Configuration
To facilitate route of the packets that do not match routing table entry in
the firewall, the following default route was implemented to route packets
outside. In this project, the firewall serves as the gateway between the internal
network and the external environment. To ensure seamless traffic flow, a default
static route was configured to direct packets towards the next-hop router (often
an ISP router) when no other routes match the destination IP address.
34
5.11 Site to site IPsec VPN Configuration
35
5.12 Cisco ASA Firewall Configuration
In the network, the firewall was configured to provide more security and
it’s first interface connecting to our internal network was placed at a security of
100 while the outside zone at security level 0. Hence, a zone at a lower security
level cannot initiate communication to a zone at a higher security level, as the
reverse can happen. The internal hosts were permitted to access ICMP and TCP
HTTP services from the internet. The diagram below shows firewall
configuration in the network.
36
5.13 Wireless Network using Access Points
37
5.14 Communication in the Network
After all the good design and configurations, the network is fully
functional and of high performance. All hosts in the network can communicate
with each other including the IP Phones. Sending a ping request from one PC is
seen receiving a ping reply from that PC as shown below; Also IP phones can
call each other
38
39
CHAPTER : 6
40
6. Network Redundancy Protocols
41
One router is elected as the Active Router, handling traffic under normal
conditions.
A second router is designated as the Standby Router, monitoring the
Active Router’s status.
If the Active Router fails, the Standby Router takes over as the default
gateway, ensuring uninterrupted communication.
Configuration Example
interface GigabitEthernet0/0
ip address 192.168.1.1 255.255.255.0
standby 1 ip 192.168.1.254
standby 1 priority 110
standby 1 preempt
42
6.3 Link Redundancy with EtherChannel
Benefits
Configuration Example
interface Ethernet0/2
channel-group 5 mode desirable
interface Ethernet0/3
channel-group 5 mode desirable
43
6.5 Dual ISP Redundancy
Disabled the primary router to test HSRP and VRRP failover times.
Verified that the standby router took over as the active router instantly,
maintaining connectivity.
2) EtherChannel Failover
3) STP Convergence
44
5) Load Balancing Verification
45
CHAPTER : 7
46
7. Security Threat Evaluation and Solutions
47
8) Lack of Network Segmentation: Allowing unrestricted access across
departments increases the attack surface.
9) Physical Security Risks: Unauthorized physical access to network devices.
10) Unpatched Systems and Software Vulnerabilities: Outdated software
exposing the network to known exploits.
48
7.3.4 Threat Detection and Prevention
Cisco ASA Firewall: Protects the internal network from external threats
and controls inbound/outbound traffic.
49
Penetration Testing: Simulated attacks were conducted to identify
vulnerabilities.
Vulnerability Scanning: Tools like Nessus scanned the network for
misconfigurations and outdated software.
Firewall Rule Audits: Ensured ACLs and firewall rules effectively
blocked unauthorized traffic.
50
7.6.2 Threat Intelligence and Patch Management
51
CHAPTER : 8
52
8. Secure Internet and Communication Design
53
NAT (Network Address Translation): Private IP addresses are
translated into public addresses, enhancing security by masking internal
network structure.
54
Access Control Lists (ACLs): Applied to router interfaces to regulate
traffic, blocking suspicious IP addresses and controlling access to
sensitive resources.
55
Intrusion Prevention Systems (IPS): Automatically blocks malicious
traffic before it reaches internal resources.
56
8.11 Redundancy and Failover
57
CHAPTER : 9
58
9. Routing Protocol Selection
Routing is the process of determining the best path for data packets to
travel across a network. In a large-scale enterprise network, selecting the
appropriate routing protocol is crucial to ensuring efficient data flow, quick
convergence, scalability, and fault tolerance. This section dives deep into the
factors behind protocol selection, compares various options, and highlights the
configuration of the chosen protocols.
9.1 Importance of Routing in Enterprise Networks
In any complex network, routers make decisions about forwarding data
based on routing tables, which contain information about available routes.
Proper routing is vital to.,
Optimize Traffic Flow: Ensuring minimal latency and balanced
bandwidth usage.
Ensure Redundancy: Rerouting traffic in case of link failures.
Support Scalability: Adapting to network expansion without
reconfiguring the entire system.
Facilitate Inter-Branch Communication: Managing traffic between
headquarters, branches, and remote sites.
9.2 Types of Routing Protocols
Routing protocols can be broadly categorized into two types:
9.2.1 Static Routing
Advantages: Simplicity, no overhead, secure since no updates are
exchanged.
Disadvantages: Doesn’t scale well, requires manual configuration.
Use Case: Used for defining default routes or for small networks.
59
Example Configuration
ip route 0.0.0.0 0.0.0.0 192.168.1.1
9.2.2 Dynamic Routing
Dynamic protocols automatically update routing tables when network
changes occur. They are divided into:
1) Distance Vector Protocols
Examples: RIP, EIGRP
Routing decisions are based on hop count.
2) Link-State Protocols
Example: OSPF
Each router maintains a map of the entire network.
3) Path Vector Protocols
Example: BGP
Used primarily for internet routing.
60
Vendor Interoperability: The network includes devices from multiple
vendors.
Security: Protocol authentication prevents unauthorized updates.
After careful evaluation, OSPF (Open Shortest Path First) was chosen
due to its scalability, fast convergence, and support for multi-vendor
environments.
9.5 Why OSPF?
OSPF is a link-state protocol that uses the shortest path first (SPF)
algorithm to calculate the best path. It divides large networks into areas to
optimize performance and reduce resource consumption. Key benefits include:
Fast Convergence: Reacts quickly to network changes.
Hierarchical Design: Reduces overhead by organizing routers into areas.
Load Balancing: Supports equal-cost multi-path (ECMP) routing.
Authentication Support: Prevents unauthorized route updates.
9.6 OSPF Configuration Steps
1) Enable OSPF Process: router ospf 1
2) Assign Router ID: router-id 1.1.1.1
3) Define OSPF Areas: network 192.168.1.0 0.0.0.255 area 0
4) Configure Authentication
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 secret123
5) Verify Configuration: show ip ospf neighbor
9.7 OSPF Area Design
The network is divided into multiple areas for scalability:
Area 0 (Backbone Area): Connects all other areas.
Area 1 (Headquarters): Contains core routers.
Area 2 (Branches): Connects all branch offices.
62
9.8 Failure Detection and Convergence
OSPF employs several mechanisms for fast convergence:
Hello Protocol: Detects neighbor routers.
Dead Timer: Declares neighbors down after a specified time.
SPF Algorithm: Recalculates the best path immediately after detecting
changes.
9.9 Redundancy and Load Balancing
OSPF supports equal-cost multi-path (ECMP) routing, allowing traffic to
be distributed evenly across multiple equal-cost paths, enhancing redundancy
and optimizing bandwidth utilization.
9.10 Security Considerations
To prevent unauthorized updates, the following security mechanisms
were implemented:
Message Digest Authentication: Ensures OSPF packets are
authenticated.
Passive Interfaces: Prevents unnecessary OSPF advertisements.
9.11 Performance Testing
Testing was conducted using Cisco Packet Tracer to :
Simulate link failures and measure convergence times.
Verify that OSPF re-routed traffic through backup links during failures.
Ensure optimal load balancing across redundant links.
The results confirmed that OSPF converged rapidly and maintained
network stability during failures.
9.12 Future Scalability
The network design has been meticulously crafted to ensure future
scalability, leveraging OSPF’s hierarchical area structure, modular architecture,
and dynamic routing capabilities. The use of a dedicated Backbone Area (Area
0) allows new branches to be added seamlessly by assigning them to separate
OSPF areas, reducing overhead and ensuring faster convergence. The IP
63
addressing scheme has been planned with reserved address blocks for future
growth, while DHCP facilitates dynamic IP assignment as devices increase.
Redundancy mechanisms, such as HSRP/VRRP and EtherChannel, ensure high
availability and load balancing as traffic demands grow. Security measures,
including extendable firewall rules, scalable ACLs, and site-to-site VPNs, have
been designed to evolve alongside the expanding network. Centralized
monitoring through SNMP, NetFlow, and Syslog provides real-time visibility
into performance, simplifying management as the network scales. the
infrastructure is ready for emerging technologies, supporting IPv6 adoption,
cloud integration, and IoT expansion. Testing validated that OSPF convergence
remained swift, performance stayed stable, and failover mechanisms operated
seamlessly as the network grew, ensuring the design’s long-term reliability and
efficiency.
64
CHAPTER : 10
65
10. Network Management Methods
66
Performance Management: Monitoring bandwidth, latency, and device
health.
Security Management: Protecting network infrastructure from threats.
Components
10.3.2 Syslog
Configuration
67
10.3.3 NetFlow
Configuration
Benefits
Automates backups.
Tracks configuration changes.
Provides rollback options.
68
10.4.3 Traffic Analysis
69
10.8 Incident Response
70
10.11 Testing and Validation
71
CHAPTER : 11
72
11. Implementation and Testing
A well-structured implementation and rigorous testing process are
essential for ensuring the reliability, security, and performance of the network.
This section outlines the step-by-step process of deploying the designed
network and the comprehensive testing procedures used to validate its
functionality.
11.1 Implementation Overview
The implementation phase involved translating the network design into a
functional infrastructure. The process was carried out in several stages to
minimize risks and ensure smooth integration into the existing environment.
The stages included:
1) Pre-Implementation Planning: Reviewing the network design, creating
a rollout plan, and ensuring resource availability.
2) Hardware Deployment: Installing routers, switches, firewalls, and
access points across all sites.
3) Initial Configuration: Applying basic configurations to all devices,
including hostname assignments, interface IP addressing, and access
control measures.
4) Routing Protocol Configuration: Implementing OSPF for dynamic
routing across the enterprise.
5) Security Configuration: Applying firewall rules, VPN tunnels, and
intrusion prevention systems.
6) Testing and Optimization: Verifying the network’s performance and
security through comprehensive testing.
11.2 Hardware and Software Installation
Router and Switch Installation: Installed Cisco ISR routers and
Catalyst switches in the headquarters and branch offices.
Firewall Deployment: Positioned Cisco ASA Firewalls at the perimeter
to control traffic flow.
Access Points: Deployed wireless access points to provide mobility for
employees and guests.
Software Setup: Installed monitoring tools like Cisco Packet Tracer,
Wireshark, and SNMP monitoring utilities for performance tracking.
73
11.3 Device Configuration
Each network device underwent several stages of configuration to ensure
secure and optimal functionality:
1) Basic Device Configuration
Assigned hostnames.
Configured IP addresses on interfaces.
Disabled unused ports to prevent unauthorized access.
2) VLAN Configuration
Segmented traffic into different VLANs for better security and traffic
management.
Assigned access ports to appropriate VLANs.
3) Inter-VLAN Routing
Configured Layer 3 switches to handle inter-VLAN routing.
4) OSPF Configuration
Set up OSPF across the network for efficient dynamic routing.
5) Access Control Lists (ACLs)
Applied ACLs on router interfaces to filter unwanted traffic.
6) VPN Configuration
Established site-to-site IPsec VPN tunnels between branches to secure
communication over public networks.
Sample Configuration
router ospf 1
network 192.168.0.0 0.0.0.255 area 0
11.4 Security Implementation
Security measures were enforced to protect the network from potential
threats:
Firewall Configuration: Defined security zones, created NAT rules, and
configured inspection policies.
SSH Access: Disabled Telnet and enabled SSH for secure remote access.
Port Security: Restricted MAC addresses per port to prevent
unauthorized device connections.
Monitoring and Alerts: Configured SNMP and Syslog for continuous
monitoring.
74
11.5 Testing Methodology
Testing was performed in multiple phases to validate performance,
reliability, security, and redundancy. The key tests included:
1) Connectivity Testing
Verified end-to-end connectivity between devices across VLANs and
between branches using ICMP ping tests.
2) Routing Verification
Ensured OSPF correctly propagated routes across the network using the
show ip route command.
3) Failover and Redundancy Testing
Simulated device failures to ensure redundant links and backup routers
took over without disrupting service.
4) Security Testing
Tested ACLs by attempting unauthorized access from blocked subnets.
Verified firewall policies by attempting to access restricted services from
external networks.
5) Load and Stress Testing
Simulated peak traffic conditions to evaluate performance under load.
Measured latency, packet loss, and throughput.
6) VPN Verification
Tested VPN tunnels to ensure encrypted communication between remote
sites.
7) Performance Monitoring
Monitored bandwidth usage, CPU loads, and memory utilization during
testing using SNMP and NetFlow.
11.6 Test Results
The testing phase produced the following key findings:
Connectivity: All devices maintained stable communication across the
network.
OSPF Convergence: OSPF converged in under 5 seconds during
simulated link failures.
75
Failover Mechanisms: Redundant links and backup routers took over
instantly upon primary link failure.
Security Measures: ACLs effectively blocked unauthorized access
attempts.
VPN Performance: VPN tunnels maintained stable encryption with no
noticeable performance degradation.
Bandwidth Utilization: Traffic was evenly distributed across redundant
links, preventing congestion.
11.7 Troubleshooting and Optimization
During testing, a few minor issues were identified and resolved:
VLAN Mismatch: Detected on trunk links and corrected using the
switchport trunk allowed vlan command.
High CPU Utilization on Core Routers: Optimized OSPF timers and
reduced SPF calculations.
Redundant Link Configuration: One EtherChannel group showed
intermittent failures, resolved by reconfiguring the port-channel
interfaces.
11.8 Documentation and Knowledge Transfer
To ensure proper network management after deployment.
Topology Diagrams: Documented the physical and logical topology.
Configuration Backups: Saved configurations for all devices.
Standard Operating Procedures (SOPs): Created SOPs for adding new
devices and troubleshooting.
Training Sessions: Conducted training for IT staff to manage the
network and handle incidents.
11.9 Final Deployment
After resolving identified issues and verifying all test results, the network
was fully deployed. The following steps completed the implementation process:
1) Deployment Sign-Off: Approval from stakeholders after reviewing test
results.
2) Live Migration: Gradual migration of user traffic to the new network.
3) 24-Hour Monitoring Period: Continuous monitoring to ensure stability
post-migration.
4) Handover: Official handover of the project to the IT team.
76
CHAPTER : 12 CONCLUSION
77
12. Conclusion
The design and implementation of this secure enterprise network aimed to
address the organization's growing need for scalability, reliability, and security.
From the initial stages of business scenario analysis to the final deployment and
testing, each phase was meticulously planned to align with industry best
practices. The project not only delivered a functional network but also laid the
groundwork for future growth and resilience in the face of evolving security
threats.
The primary objectives of the project were to
Establish a secure communication channel across multiple
branches.
Implement redundancy mechanisms to prevent single points of
failure.
Optimize network performance with efficient routing protocols.
Protect sensitive data through multi-layered security measures.
Ensure scalability to support organizational growth.
12.1 Key Achievements
Several key achievements highlight the project’s success in fulfilling its
objectives:
Scalable Architecture: The hierarchical design using core, distribution,
and access layers ensures ease of expansion.
Redundancy and High Availability: Implementation of redundancy
protocols like HSRP, VRRP, and EtherChannel minimizes downtime
during device or link failures.
Enhanced Security: Deployment of access control lists (ACLs), VPNs,
and Cisco ASA firewalls provides robust protection against unauthorized
access and cyberattacks.
Optimized Routing: OSPF’s dynamic routing capabilities ensure
efficient traffic management and fast convergence during topology
changes.
Improved Network Visibility: Integration of SNMP and Syslog allows
real-time monitoring and alerts, enabling proactive management.
12.2 Challenges and Solutions
Several challenges were encountered during the implementation, each
addressed with appropriate solutions:
1) VLAN Misconfiguration
78
Challenge: Incorrect VLAN assignment on trunk links caused
communication issues.
79
Solution: Corrected the VLAN mappings and verified using show vlan
brief commands.
2) OSPF Convergence Delays
Challenge: Suboptimal OSPF timers caused slower convergence during
failover testing.
Solution: Tuned OSPF hello and dead intervals for faster convergence.
3) Redundant Link Failures
Challenge: EtherChannel intermittently failed to aggregate links.
Solution: Reconfigured Port-Channel interfaces and ensured both ends
used the same protocol (LACP).
12.4 Lessons Learned
The project provided several valuable lessons
Thorough Planning Reduces Errors: Properly planning the IP
addressing scheme and VLAN segmentation prevented potential conflicts
during deployment.
Redundancy Is Crucial: Implementing backup routes and redundant
devices ensured uninterrupted service during simulated failures.
Security Is an Ongoing Process: Regular audits and patch management
are crucial to maintaining the integrity of security measures.
Monitoring Enhances Proactive Management: Integrating tools like
SNMP, NetFlow, and Syslog gave administrators real-time insights into
network performance, allowing them to detect anomalies early.
12.5 Testing and Validation Outcomes
Testing played a pivotal role in validating the network’s performance and
security.
Connectivity: Verified stable end-to-end communication across all sites.
Redundancy: Successfully simulated device and link failures, with
HSRP providing seamless failover.
Security: Confirmed that ACLs and firewalls effectively blocked
unauthorized access attempts.
Performance: Measured latency, throughput, and packet loss under load,
ensuring the network met expected performance benchmarks.
The testing process confirmed the network’s resilience, with redundancy protocols
ensuring uninterrupted service and security measures effectively protecting
against unauthorized access.
80
12.6 Future Considerations
The current design supports future expansion, but several areas for
enhancement were identified.
Cloud Integration: Exploring cloud-based monitoring and management
tools can provide enhanced visibility and remote troubleshooting
capabilities.
Zero Trust Architecture: Implementing a zero-trust model will further
strengthen security by verifying every access attempt, regardless of
origin.
Automated Configuration Management: Adopting automation tools
such as Ansible or Cisco DNA Center can streamline configuration
updates and reduce human error.
Machine Learning for Anomaly Detection: Integrating AI-driven tools
can enable the network to detect unusual patterns and automatically
respond to potential threats.
IPv6 Migration: As the need for global addressing grows, planning for
IPv6 adoption will future-proof the network.
12.7 Final Thoughts
This project successfully delivered a secure, scalable, and high-
performing enterprise network. The implementation of redundancy protocols,
dynamic routing, and multi-layered security measures ensures that the network
is resilient against failures and protected against security threats. Additionally,
the hierarchical network design simplifies future expansion, making the network
adaptable to the organization’s evolving needs. The use of industry-standard
tools and protocols such as OSPF, HSRP, EtherChannel, and IPsec VPN
ensured that the network adhered to best practices. Continuous monitoring and
real-time alerts through SNMP and Syslog give administrators the ability to
identify and resolve issues proactively. From the initial business scenario
analysis to the final testing and validation, this project exemplifies the
importance of a structured, methodical approach to network design. The newly
implemented network not only meets the current needs of the organization but
also provides a solid foundation for future growth and technological
advancements.
In conclusion, the project’s outcomes align with the organization’s vision
of building a secure, reliable, and scalable infrastructure. Moving forward,
regular maintenance, timely software updates, and ongoing training for IT staff
will be essential to maintaining the network’s integrity and performance. The
knowledge and insights gained throughout this project will serve as a valuable
81
reference for future network upgrades and expansions.
82
CHAPTER : 13
REFERENCES
83
13 References
84
APPENDIX
85
CODE SNIPPETS
**************FIREWALL GUI
CONFIGURATION**************
86
87
****************L3 SWITCH CONFIGURATION****************
R13#show start
R13#show startup-config
Using 992 out of 524288 bytes, uncompressed size = 1623 bytes
!
! Last configuration change at 09:18:17 UTC Fri Mar 21 2025
!
version 15.2
service timestamps debug datetime
msec service timestamps log datetime
msec no service password-encryption
service compress-config
!
hostname R13
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
!
!
!
!
!
no ip icmp rate-limit unreachable
88
!
!
!
no ip domain-lookup
ip cef
no ipv6 cef
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
interface Port-channel5
!
interface Ethernet0/0
!
interface Ethernet0/1
no switchport
ip address 10.10.4.25 255.255.255.252
!
interface Ethernet0/2
channel-group 5 mode desirable
!
interface Ethernet0/3
channel-group 5 mode desirable
!
89
interface Ethernet1/0
!
interface Ethernet1/1
!
interface Ethernet1/2
--More--
*Mar 23 10:11:25.541: %LINK-3-UPDOWN: Interface Vlan10, changed state
to up
*Mar 23 10:11:25.542: %LINK-3-UPDOWN: Interface Vlan20, changed state to
up
*Mar 23 10:11:26.543: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Vlan10, changed state to up
*Mar 23 10:11:26.543: %LINEPROTO-5-UPDOWN: Line protocol on
Interface Vlan20, changed state to up
!
interface Ethernet1/3
!
interface Vlan10
ip address 172.16.5.1 255.255.255.128
standby 10 ip 172.16.5.3
standby 10 priority 110
standby 10 preempt
!
interface Vlan20
ip address 172.16.5.129 255.255.255.128
standby 20 ip 172.16.5.131
standby 20 priority 90
standby 20 preempt
!
90
router ospf 10
network 10.10.4.24 0.0.0.3 area 0
network 172.16.5.0 0.0.0.127 area 0
network 172.16.5.128 0.0.0.127 area 0
!
ip forward-protocol nd
!
ip tcp synwait-time 5
ip http server
!
ip route 0.0.0.0 0.0.0.0 10.10.4.26
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
!
control-plane
!
!
line con 0
exec-timeout 0 0
privilege level 15
logging synchronous
line aux 0
exec-timeout 0 0
91
privilege level 15
logging synchronous
line vty 0 4
login
*********L2 SWITCH CONFIGURATION*********
R9#show startup-config
Using 759 out of 524288 bytes, uncompressed size = 1181 bytes
!
! Last configuration change at 11:01:37 UTC Thu Mar 20 2025
!
version 15.2
service timestamps debug datetime
msec service timestamps log datetime
msec no service password-encryption
service compress-config
!
hostname R9
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
!
!
!
92
!
!
no ip icmp rate-limit unreachable
!
!
!
no ip domain-lookup
ip cef
no ipv6 cef
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
interface Ethernet0/0
switchport access vlan 10
switchport mode access
!
interface Ethernet0/1
switchport access vlan 10
switchport mode access
!
interface Ethernet0/2
93
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface Ethernet0/3
switchport trunk encapsulation dot1q
switchport mode trunk
!
ip forward-protocol nd
!
ip tcp synwait-time 5
ip http server
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
!
control-plane
!
!
line con 0
exec-timeout 0 0
privilege level 15
logging synchronous
line aux 0
94
exec-timeout 0 0
privilege level 15
logging synchronous
line vty 0 4
login
!
!
!
End
*******ROUTER CONFIGURATION*******
Router#show startup-config
Using 1046 bytes
!
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime
msec no service password-encryption
!
hostname Router
!
!
!
!
no ip cef
no ipv6 cef
license udi pid CISCO2811/K9 sn FTX1017505Z-
spanning-tree mode pvst
95
!
!
!
!
!
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface Serial0/1/0
ip address 200.100.50.30 255.255.255.252
clock rate 2000000
!
interface Serial0/1/1
no ip address
clock rate 2000000
shutdown
!
interface Serial0/3/0
ip address 200.100.50.34 255.255.255.252
96
clock rate 2000000
!
interface Serial0/3/1
ip address 200.100.50.38 255.255.255.252
!
interface Vlan1
no ip address
shutdown
!
router ospf 10
log-adjacency-changes
network 200.100.50.32 0.0.0.3 area 0
network 200.100.50.36 0.0.0.3 area 0
network 200.100.50.28 0.0.0.3 area 0
!ip classless
!
ip flow-export version 9
!
!
!
line con 0!
line aux 0
!
line vty 0 4
login
!
End
97
ScreenShots
CISCO PACKET TRACER TOPOLOAGY
98
COMMUNICATION TEST WITH REAL GOOGLE SERVER
99
BRANCH TO BRANCH COMMUNICATION
10
0