A Networking Model

download A Networking Model

of 29

Transcript of A Networking Model

  • 7/31/2019 A Networking Model

    1/29

    Developing a Networking model using

    Cisco related technologies

    Developed by:

    Sneha ShahPrasenjit SahaKrishnendu SahaMilan Patra

  • 7/31/2019 A Networking Model

    2/29

    Certificate

    This is to certify that , a student of 3rdyear, Electronics & Communication Engineering

    Department ,

    , has undertaken and successfully completed theproject. The working model of the project was verified and

    found to be in accordance with the following project report.

    Mr. Tariq Ahmed

    NetComms Solutions

    41- Syed Amir Ali Avenue

    Beck Bagan Crossing

    Calcutta 700019

  • 7/31/2019 A Networking Model

    3/29

    Aim:

    To develop 2 LAN models and to integrate them over

    WAN to illustrate how data flows from one business

    location to another .

    Technologies to be applied :

    i. Routing protocol( EIGRP /OSPF)ii. DHCP Software based to be installed on Windows

    XP/Windows 7

    iii.

    IPv4 based Addressingiv. VLANv. Mitigation of basic Security Threats

    vi. Access Control List(ACLs)

  • 7/31/2019 A Networking Model

    4/29

    Abstract:

    Two LANs are to be developed at 2 sites . let the first site

    be Kolkata and the second site be Delhi.

    We need to develop a LAN at Kolkata and another LAN at

    Delhi. Kolkata LAN consists of a switch , and 4 hosts

    attached to it. Delhi LAN consists of a switch and a

    server attached to it

    Since it is not possible to develop this network in real

    scenario owing to limitations of resources and

    authority, the simulated environment is created in

  • 7/31/2019 A Networking Model

    5/29

    Netcomms officewith the available resources and a

    small model of network is created. Here we have

    developed 2 LANs and have used 2 routers in order to

    make them communicate. It is assumed that one of the

    routers is in Kolkata and the other one is in Delhi

    Physical connections of the network:

    All hosts are connected to the switch via Ethernet

    interfaces using Ethernet cables. Similarly both theswitches are connected to their respective routers via an

    Ethernet cable. The 2 routers are connected via a cross

    cable through serial interface. A console cable connects

    RS232 port of one of the hosts to the host of the router.

    This host is the only host which can access router using

    Hyper-terminal.

    DHCP software installation

    The IP Addresses of machines attached to Kolkata router

    lie in 192.168.1.0 series .and the IP Addresses of

    machine attached to Delhi lies in 10.0.0.0 series.In order to assign IP Addresses to machines, DHCP

    software is installed in one of the machine .

  • 7/31/2019 A Networking Model

    6/29

    DHCP stands for Dynamic Host ConfigurationProtocol . It dynamically allocates IP Addresses

    from the server on which DHCP software is installed ,

    to the hosts from a pool of addresses set by the

    Administrator itself .

    There are many DHCP software available forWindows XP/7 and Some of them are :

    1)Alax.Info DHCP Server

    2)Antamedia Server3) DHCP Server v3

    One of the DHCP Servers :

  • 7/31/2019 A Networking Model

    7/29

    Router and switch configuration

    Routers and switches at Kolkata and Kelhi are assigned

    names Kolkata and Delhi respectively. Next step is to

    configure routing protocols in both the router. EIGRP and

    OSPF protocols are configured. EIGRP provides a back-up

    path in case of failure of OSPF.

    VLAN configuration :

    A Vlan is created and 2 of the machines are put in this

    Vlan . Machines in this Vlan can communicate onlyamong themselves . They cannot communicate with

    other machines of this network .

    Security of Network :

    To make networks more secure, Passwords are assigned .

    In order to prevent unauthorized computers from

    accessing network, Port Security is provided. In this

  • 7/31/2019 A Networking Model

    8/29

    project, with the help of Port Security only one computer

    is authorized to access one port of the switch. This is

    done by binding the Physical MAC address of the desired

    computer to the port.

    In order to deny the 1st

    host from accessing the router,

    TELNET is disabled in that host using Access Lists. Ping

    (ICMP) function is also disabled in this host.

    Similarly , to deny the protocol FTP and HTTP in 2nd

    host,FTP and HTTP is disabled in this host .

    Basic requirements of the project:

    a.SITE 1 CISCO 2600 ROUTERb.CISCO 3550(48 port Switch)c.SITE 2-CISCO 2550 ROUTERd.CISCO 2950(24 port Switch)e. LAN WIRES AND CONNECTORS

    f .FOUR COMPUTERS AND ONE SERVER

  • 7/31/2019 A Networking Model

    9/29

    Implementation of network :

    A. All physical connections are done .

    B. DHCP software Installation :

    Antamedia DHCP installer/DHCP Server 1.1 is installed in one of

    the machines.

    DHCP Server 1.1 :

    Step 1:Run installer AlaxInfoDhcpServerSetup.msi

    Step 2: Open the installed application

  • 7/31/2019 A Networking Model

    10/29

    Step 3:Double click on the application icon on the system tray

    Step 4:Select enable under Status

    Step 5:Under Network tab set the pool of first and last IP address

    Step 6: For Adapter IP address

    Step 6.1: Go to control panel Network and InternetViewnetwork status and taskchange adapter setting Local Area

    connection

    Step 6.2: Right click on local area connection and go to

    properties

    Step 6.3: Go to TCP/Ipv4

    Step 6.4: Set IP address for the PC manually and set default

    gateway as 192.168.1.1

    Step 7:Go to Options tabStep 8: Set router gateway as 192.168.1.1

    Step 9: DHCP is now configured for usage

    Here the 1st

    ip address of the pool is assigned as 192.168.1.10

    And the last address is assigned as 192.168.1.100

    As a result DHCP allots the ip addresses to all the machines under

    Kolkata router.

    The first machine gets an ip address- 192.168.1.10

    The second machine gets an ip address- 192.168.1.20

    The third machine gets an ip address- 192.168.1.30

    The fourth machine gets an ip address- 192.168.1.40

    C.Configuration of Routers :

    Now routers need to be configured. To configure therouters, following steps are undertaken in the hosts

    connected by console port to each router

  • 7/31/2019 A Networking Model

    11/29

    Start-> all programs-> accessories->communications-> Hyper-terminal

    Hyper-terminal Parameters :

    Establishing the connection

    2.Setting the port as COM1

  • 7/31/2019 A Networking Model

    12/29

    3.Restore the port parameters to default

    Now on clicking on ok, a window appears. All the

    commands are entered in this window.

  • 7/31/2019 A Networking Model

    13/29

    . Assigning names to Routers :To assign host name to the Kolkata router,

    Router>en

    Router#config terminal

    Router(config)#hostname Kolkata

    Similarly to assign host name to Delhi router,

    Router>en

    Router#config terminal

    Router(config)#hostname delhi

    . Routing protocol Configuration :1.OSPF configuration :

    a.Configure OSPF on Kolkata router : Place the serial interface and Ethernet interface in area 0 .

    Kolkata>en

  • 7/31/2019 A Networking Model

    14/29

    Kolkata#config terminal

    Kolkata(config)#router ospf 5

    Kolkata(config-router)#network 1.0.0.0 0.255.255.255 area 0

    Kolkata(config-router)#network 192.168.1.0 0.0.0.255 area 0

    b. Configure OSPF on Delhi router :

    Place serial interface and Ethernet interface in area 0Delhi>en

    Delhi#config terminal

    Delhi(config)#router ospf 5

    Delhi(config-router)#network 1.0.0.0 0.255.255.255 area 0

    Delhi(config-router)#network 10.0.0.0 0.255.255.255 area 0

    2.EIGRP configuration :- Use AS Number 10

    - Disable auto summarization

    Configure EIGRP on Kolkata router :Kolkata>en

    Kolkata#config terminal

    Kolkata(config)#router eigrp 10

    Kolkata(config-router)#network 192.168.1.0

    Kolkata(config-router)#network 1.0.0.0

  • 7/31/2019 A Networking Model

    15/29

    Kolkata(config-router)# no auto-summary

    Kolkata(config-router)#exit

    b.Configure EIGRP on Delhi router :Delhi >enDelhi#config terminal

    Delhi(config)#router eigrp 10

    Delhi(config-router)#network 10.0.0.0

    Delhi(config-router)#network 1.0.0.0

    Delhi(config-router)# no auto-summary

    Delhi(config-router)#exit

    Routing table of Kolkata router is :

  • 7/31/2019 A Networking Model

    16/29

    Since EIGRP has lower administrative distance than

    OSPF , EIGRP is currently the working protocol

    because of lower Administrative Distance compared

    to OSPF .

    D. Configuration of switches:

    To assign names to Kolkata and delhi switches:

    Kolkata : Delhi :

    SW3550>en SW3550>en

    SW3550#config terminal SW3550#config terminal

    SW3550(config)# hostname Kolkata SW3550(config)# hostname Delhi

    E. VLAN configuration :

    A Vlan is created in Kolkata site and the name

    Management is given to it. 3

    rd

    and 4

    th

    machines areput in this vlan . These machines are in the port number

    29 and port number 30 of the switch respectively.

    Kolkata>en

  • 7/31/2019 A Networking Model

    17/29

    Kolkata#config terminal

    Kolkata(config)#VLAN 10

    Kolkata(config-vlan)#name Management

    Kolkata(config-vlan)#exit

    Kolkata(config)#interface range Fa0/29-30

    Kolkata(config-if-range)#switchport mode access

    Kolkata(config-if-range)#switchport access VLAN 10

    Kolkata(config-if-range)#exit

    F. Security!

    Port security:-

    In order to make switch ports secure , Port Security in

    shutdown mode is assigned to all the switch ports . port

    security is configured in both the switches.

    Kolkata>enKolkata#config terminal

    Kolkata(config)#interface Fa0/8

    Kolkata(config-if)#switchport mode access

    Kolkata(config-if)#switchport port-security

  • 7/31/2019 A Networking Model

    18/29

    Kolkata(config-if)#switchport port-security mac-

    address sticky

    Kolkata(config-if)#switchport port-security

    maximum 1Kolkata(config-if)#switchport port-security

    violation shutdown

    Kolkata(config-if)#exit

    Kolkata(config)#exit

    Kolkata#show port-security

    Similarly all ports of switches are assigned port

    security. If any other machine tries to access a secured

    port, security violation occurs.

    Security Violation Table :

  • 7/31/2019 A Networking Model

    19/29

    Password assignment:

    Kolkata>en

    Kolkata#config termina

    Kolkata(config)#line console 0

    Kolkata(config-line)#login

    Kolkata(config-line)#password cisco123

    Virtual terminal password assignment :Kolkata>en

    Kolkata#config terminal

    Kolkata(config)#line vty 0 4

    Kolkata(config-line)#login

    Kolkata(config-line)#password cisco123

    Enable password :Kolkata>en

    Kolkata#config terminal

  • 7/31/2019 A Networking Model

    20/29

    Kolkata(config)#enable password cisco123

    Content of startup-configuration as viewed after passwordassignments:

    Access lists:

    Access lists allows some of the protocols to some of the PCs

    and other protocols to other PCs.

    Kolkata>en

    Kolkata#config terminal

    Kolkata(config)#access-list 120 deny tcp host

  • 7/31/2019 A Networking Model

    21/29

    192.168.1.10 host 192.168.1.1 eq 23

    Kolkata(config)#access-list 120 permit ip any any

    Kolkata(config)#interface Fa0/0

    Kolkata(config-if)#ip access-group 120 in

    Kolkata(config-if)#exit

    Kolkata(config)#exit

    Kolkata#show access-lists

    As viewed from Hyper-terminal :

    Kolkata>en

    Kolkata#config terminal

  • 7/31/2019 A Networking Model

    22/29

    Kolkata(config)#access-list 120 deny icmp host

    192.168.1.10 any echo

    Kolkata(config)#access-list 120 deny icmp host

    192.168.1.10 any echo reply

    Kolkata(config)#access-list 120 permit ip any any

    Kolkata(config)#interface Fa0/0

    Kolkata(config-if)#ip access-group 120 in

    Kolkata(config-if)#exit

    Kolkata(config)#exit

    Kolkata#show access-lists

    From Hyper terminal :

  • 7/31/2019 A Networking Model

    23/29

    Kolkata>en

    Kolkata#config terminal

    Kolkata(config)#access-list 110 deny tcp host

    192.168.1.20 host 10.0.0.20 eq 20

    Kolkata(config)#access-list 110 deny tcp host

    192.168.1.20 host 10.0.0.20 eq 21

    Kolkata(config)#access-list 110 permit ip any any

    Kolkata(config)#interface Fa0/0

    Kolkata(config-if)#ip access-group 110 in

    Kolkata(config)#access-list 110 deny tcp host

    192.168.1.10 host 10.0.0.20 eq 80

    Kolkata(config)#access-list 110 permit ip any any

    Kolkata(config)#interface Fa0/0

  • 7/31/2019 A Networking Model

    24/29

    Kolkata(config-if)#ip access-group 110 in

    Kolkata(config-if)#exit

    Kolkata(config)#exit

    Kolkata#show access-lists

    As seen from web browser of third host :

    Startup-configuration is a file which stores all theconfigurations of the network

    The content of startup-config can be viewed by the command :

    Kolkata# show startup-config

  • 7/31/2019 A Networking Model

    25/29

    Testing of developed wan network

    All the physical connections are checkedPing :ping is a command which is used to check

    if the machines in the network are

    communicating with each other.

  • 7/31/2019 A Networking Model

    26/29

    Eg.

    In the command window of one of the host

    Ping 192.168.1.10 is typed the following result

    is obtained.

    This shows that machines are communicating with

    each other.

    Routing tables of both the Routers arechecked

    Eg. This window shows that routing tables are not

    working properly.

  • 7/31/2019 A Networking Model

    27/29

    Hence physical connection are checked and

    existing errors are fixed.

    Blocking of TELNET :Since we blocked one of the hosts from telnet,

    checking can be done to see if the blocking is

    working properly.

    This can be done from command window ofthe blocked host

    Blocking of HTTP :Since we blocked one of the hosts from http,

    checking can be done to see if the blocking is

    working properly.

  • 7/31/2019 A Networking Model

    28/29

    This can be done from the browser of the

    blocked host

    http site as viewed from the browser of the blocked host

    HTTP site as viewed from the browser of host other than

    the blocked host .

  • 7/31/2019 A Networking Model

    29/29

    References

    1.CCNA Study Guide by Todd Lammle2.Cisco Packet Tracer 5.3.3 (for Simulation of the topology)