Abstract: An ACL is a series of IOS commands that filter packets based on information in the packet header. By default, a router does not have any ACLs configured. When an ACL is applied to an interface, the router performs the additional task of evaluating all network packets as they pass through the interface to determine if the packet can be forwarded. practice making a design network of two buildings for company security by taking the access control list to apply to the filter Several tasks and to give made the network secure.

Introduction

we have discussed on the network to have the design of two buildings for the company. this in design the building on the left is divided into three sections such as accounting marketing HR. The building on the right is divided into four to have D&R staff IT and server. the two buildings are connected to the core router and allow the device to communicate so that all devices can access the internet. then the core router is where we need to configure the access control list to ensure network security. So to ensure a secure network there must be some requirements for all staff allows access to the internet but not access to the server and only IT can telnet to all devices. whereas D&R can only connect to its web server. This network is designed to have protocols such as enter virtual LAN (inter VLAN) Open Shortest Path First Protocol (OSPF)

network Address Translation (NAT) and access control list (ACL).

 

Objectives

 

The main objective of the proposed network is wanting to design a secure network by applying an access control list on the router to block some devices not accessing devices and others to ensure to have security in the network.

 

Network Requirements

 

Design networks give security needs and have requirements such as

·       all staff allows access to the internet but not anything.

·       only IT can telnet to all devices.

·       All D&Rs can only connect to their web server but not anything.

 

 

 

 

 

 

d
Topology

The first figure is the topology we have prepared for the network design of the two buildings and all sub-interfaces are on the route (inter-Vlan). The use router on a stick The network administrator doesn’t need to create separate VLAN interfaces like g0/1 to g0/10. Instead, all the interfaces are created with a single interface. So, for building A and building B to be connected to each other, we use OSPF which is a protocol in dynamic routing. This method is simple to implement and used for small to medium-sized networks. The OSPF is one of the Interior Gateway Protocols (IGP), which helps to find the best routing path between the source and the destination router using its own shortest path first (SPF) algorithm. It is a Link-state routing protocol that is used to distribute routing information about data packets within a large Autonomous System. When it is configured, it listens to its neighbors in the networks, and it gathers all the link state data available. This data is then used to make a topology map that contains all available paths in the network. This database is saved for use, and we call it Link State Database.

 

 

 

Once the Link State Database is made, it is used to calculate the shortest path to subnets/networks using an algorithm known as Shortest Path First, developed by Edger W Dijkstra. OSPF creates 3 tables in the Routing Table Neighbor Table and topology Table. That OSPF is in our router act ESPR because it connects the inter-area, and it receives the route from any device evolution from the internal to the external. Then in order to be able to connect to the internet we must use NAT to work to translate private IP addresses in an internal network to a public IP address before packets are sent to an external network.

 

Network Devices

 

 In the network of design on the network device used are

 

·       the Cisco Catalyst 2960-S Series Switches are fixed-configuration Fast Ethernet switches that provide enterprise-class Layer 2 switching for campus and branch access applications. Cisco 2960 switches, combined in a stack with the data transmission ports at 16 Gb/s backplane capacity and Throughput is 6.5 Mpps.

·       in the network use router category 2911 has three port Gigabit Ethernet for connection into building A and building B and ISP.

·       The part building B of used switch L3

 

Building A

D&R

192.168.10.10

IT

192.168.30.10

Staff

192.168.20.10

Web server

192.168.40.10

Server

192.168.40.11

 

Building A

Accounting

192.168.70.10

Marketing

192.168.60.11

HR

192.168.50.12

 

 

List of Figures

VLAN switch0

Make VLAN in switch0.

Switch(config)#vlan 10

Switch(config-vlan)#name 10

Switch(config-vlan)#exit

Switch(config)#vlan 20

Switch(config-vlan)#name 20

witch(config-vlan)#exit

Switch(config)#vlan 30

Figure 2 22222

Switch(config-vlan)#name 30

Switch(config-vlan)#exit

If you look at figure 2 to connect the port into pc. it is port access and the port connected into the route and switch 1 is the port trunk.

Switch(config)#interface fastEthernet 0/2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 10

Switch(config-if)#spanning-tree bpduguard enable

Switch(config-if)#exit

Switch(config)#interface fastEthernet 0/3

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 20

Switch(config-if)#spanning-tree bpduguard enable

 Switch(config)#interface fastEthernet 0/4

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 30

Switch(config-if)#spanning-tree bpduguard enable

Switch(config-if)#exit itch(config-if)#exit

 

spanning tree bpduguard enable

Recommend configuring the spanning tree when connected to work station or any device  to

 

prevent looping within a network topology. STP was created to avoid the problems that arise when computers exchange data on a local area network (LAN) that contains redundant paths.

Switch(config)#interface gigabitEthernet 0/1

Switch(config-if)#switchport mode access

Switch(config-if)# switchport trunk allowed vlan 10,20,30,40

Switch(config-if)#exit

Switch(config)#interface fastEthernet 0/1

Switch(config-if)#switchport mode access

Switch(config-if)# switchport mode trunk

Switch(config-if)#exit

 

VLAN switch1

 

Switch1(config)#vlan 40

Switch1(config-vlan)#name 40

Switch1(config-vlan)#exit

Switch(config)#interface range fastEthernet 0/2-3

Switch(config-if)#switchport mode access

Switch(config-if)# switchport access vlan 40

Switch(config-if)#exit

Switch(config)#interface fastEthernet 0/1

Switch(config-if)#switchport mode access

Switch(config-if)# switchport mode trunk

Switch(config-if)#exit

 


Switch layer 3

 

Switch(config)#vlan 50

Switch(config-vlan)#name 50

Switch(config-vlan)#exit

Switch(config)#vlan 60

Switch(config-vlan)#name 60

Switch(config-vlan)#exit


 

Switch(config)#vlan 70

Switch(config-vlan)#name 70

Switch(config-vlan)#exit

Switch(config)#interface vlan 50

Switch(config-if)#ip address 192.168.50.12 255.255.255.0

Switch(config-if)#no shut

Switch(config)#interface vlan 60

Switch(config-if)#ip address 192.168.60.11 255.255.255.0

Switch(config-if)#no shut

Switch(config)#interface vlan 70

Switch(config-if)#ip address 192.168.70.10 255.255.255.0

Switch(config-if)#no shut

Switch(config)#interface fastEthernet 0/1

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 70

Switch(config-if)#spanning-tree bpduguard enable

Switch(config-if)#exit

Switch(config)#interface fastEthernet 0/2

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 60

Switch(config-if)#spanning-tree bpduguard enable

 Switch(config)#interface fastEthernet 0/3

Switch(config-if)#switchport mode access

Switch(config-if)#switchport access vlan 50

Switch(config-if)#spanning-tree bpduguard enable

Switch(config-if)#exit itch(config-if)#exit

 

Configure the sub-interface on the router

 

Router(config)#interface gigabitEthernet 0/1.10

Router(config-subif)#encapsulation dot1q 10

Router(config-subif)#ip address 192.168.10.1 255.255.255.0

Router(config-subif)#exit

 

Router(config)#interface gigabitEthernet 0/1.20

Router(config-subif)#encapsulation dot1q 20

Router(config-subif)#ip address 192.168.20.1 255.255.255.0

Router(config-subif)#exit

Router(config)#interface gigabitEthernet 0/1.30

Router(config-subif)#encapsulation dot1q 30

Router(config-subif)#ip address 192.168.30.1 255.255.255.0

Router(config-subif)#exit

Router(config)#interface gigabitEthernet 0/1.40

Router(config-subif)#encapsulation dot1q 40

Router(config-subif)#ip address 192.168.40.1 255.255.255.0

Router(config-subif)#exit

 

encapsulation dot1q

 

What are encapsulation dot1q and we command it to do?

Where the client sends a plot through the switch, it will take the frame then when it’s up to the router by the router is a layer 3 device that cannot take the frame.  the encapsulation dot1q deletes the taking frame and encapsulates the IP. when it comes out of the router it will take the fame back.

Configure OSPF

 

In building A connect building B to use protocol OSPF. OSPF on the router to have many such as internal router ABR and ASBR. So, this lab acts ASBR because it is connected inter-area and outside receives redistribution. Then inter-area routing interface to connect area1 you need to configure it to be area1.


Configure Router

 

Router(config)#interface gigabitEthernet 0/0

Router(config-if)#ip address 172.16.0.1 255.255.255.0

Router(config)#route ospf 1

Router(config-router)#network 172.16.0.1 0.0.0.255 area 1

Router(config-router)#exit

Router(config)#route ospf 1

Router(config-router)#network 192.168.10.0 0.0.0.255 area 0

Router(config-router)#network 192.168.20.0 0.0.0.255 area 0

Router(config-router)#network 192.168.30.0 0.0.0.255 area 0

Router(config-router)#network 192.168.40.0 0.0.0.255 area 0

Router(config-router)#exit

Router(config)#interface gigabitEthernet 0/0

Router(config-if)#ip ospf network point-to-point

 

 Configure Layer 3

 

Router(config)#interface gigabitEthernet 0/1

Router(config-if)#ip address 172.16.0.2 255.255.255.0

Router(config)#route ospf 1

Router(config-router)#network 172.16.0.2 0.0.0.255 area 1

Router(config-router)#exit

Router(config)#route ospf 1

Router(config-router)#network 192.168.500.0 0.0.0.255 area 1

Router(config-router)#network 192.168.60.0 0.0.0.255 area 1

Router(config-router)#network 192.168.70.0 0.0.0.255 area 1

Router(config-router)#exit

Router(config)#interface gigabitEthernet 0/1

Router(config-if)#ip ospf network point-to-point


 

Configure NAT

 

            All devices can route into the internet you need a protocol Network address translation (NAT). because all device is to have private IPs. NAT is a service that enables private IP networks to use the internet and cloud. NAT translates private IP addresses in an internal network to a public IP address before packets are sent to an external network. With NAT, an organization needs one IP address or one limited public IP address to represent an entire group of devices as they connect outside their network. Port Address Translation (PAT) enables one single IP to be shared by multiple hosts using IP and port address translation.

Router ISP

Router(config)#interface gigabitEthernet 0/0

Router(config-if)#ip address 1.1.1.1 255.255.255.252

Router(config-if)#no shutdown

Router(config-if)#exit

Router(config)# interface loopback 0

Router(config)#ip address 8.8.8.8 255.255.255.255


 

Router(config)#ip nat inside source list NAT interface gigabitEthernet 0/2 overload

Router 1

Router(config)#interface gigabitEthernet 0/2

Router(config-if)#ip address 1.1.1.2 255.255.255.252

Router(config-if)#exit

Router(config)# ip route 0.0.0.0 0.0.0.0 1.1.1.1

Router(config)#ip nat inside source list NAT interface gigabitEthernet 0/2 overload

Router(config-if)#ip address nat outside

Router(config-if)#exit

Router(config)# interface gigabitEthernet 0/1.10

Router(config-if)#ip address nat inside

Router(config-if)#exit

Router(config)# interface gigabitEthernet 0/1.20

Router(config-if)#ip address nat inside

Router(config-if)#exit

Router(config)# interface gigabitEthernet 0/1.30

Router(config-if)#ip address nat inside

Router(config-if)#exit

Router(config)# interface gigabitEthernet 0/1.40

Router(config-if)#ip address nat inside

Router(config-if)#exit

Router(config)#interface gigabitEthernet 0/0

Router(config-if)#ip address nat inside

Router(config-if)#exit

Router(config)#route ospf 1

Router(config-router)#default-information originate

default-information originate

S* 0.0.0.0/0 [1/0] via 1.1.1.2

 


Any OSPF router can originate default routes injected into a normal area. The OSPF router does not create a default route into the OSPF domain by default. The ‘default-information originate’ command is required for OSPF to generate a default route In our example above, router R1 is directly connected to the Internet. It’s a common enterprise setup where all Internet traffic breaks out from a single site. In R1, we have a static route configured pointing to the ISP/Internet next hop device.

Configure access control list.

 

All devices have access to the internet but have to D&R does not access the internet. Network D&R 192.168.10.0 255.255.255.0 

 

Router(config)# ip access-list standard NAT

Router(config-std-nacl)#10 deny 192.168.10.0 .0.0.0.255

Router(config-std-nacl)#20 permit any

Router(config-std-nacl)#eixt

All devices are not telnet, only IT can telnet to all devices.

Router(config)# ip access-list standard TELNET

Router(config-std-nacl)# permit 192.168.30.0 0.0.0.255

Router(config)#line vty 5 15

Router(config-line)#password 12345

Router(config-line)#login

Router(config-line)#access-class TELNET in

 

All non-D&R devices cannot access the web server only connect to their web server.

 

Router(config)#ip access-list extended D&R

Router(config-ext-nacl)#permit tcp host 192.168.10.10 host 192.168.40.10 eq 80

Router(config-ext-nacl)#permit ip any host 192.168.40.10

Router(config-ext-nacl)#exit

Router(config)#interface gigabitEthernet 0/1.40

Router(config-subif)#ip access-group D&R out

Router(config-subif)#exit

 

 

all staff allows access to the internet but not anything by network 192.168.20.10 denies any

Router(config)#ip access-list standard staff.

Router(config-std-nacl)#deny 192.168.20.0 0.0.0.255

Router(config-std-nacl)#permit any

Router(config)#interface gigabitEthernet 0/1.10

Router(config-subif)#ip access-group staff out

Router(config-subif)#exit

Router(config)#interface gigabitEthernet 0/1.30

Router(config-subif)#ip access-group staff out

Router(config-subif)#exit

Router(config)#interface gigabitEthernet 0/0

Router(config-subif)#ip access-group staff in

Router(config-submit)#exit

 

Result