Saturday, December 10, 2016

Network design and Security (Documentation)

  
“Network Design And Security “
A major project submitted for partial fulfilmentof  requirement for  Degree of Bachelors in Engineering of Information and Technolgy(BEIT).

Project Submitted by:

KishorMaharjan
..............................



Project Supervisor:
Mr........................
Department of Computer Science and IT Engineering
Nepal College of Information and  Technology
NCIT

NEPAL COLLEGE of INFORMATION and TECHNOLOGY
NCIT

CERTIFICATE OF APPROVAL

The undersigned certify that they have read and recommended to the Department of Computer  Science and IT Engineering for acceptance, a project report entitled ……………………………………………………….. submitted by ……………………. ………………………… ………………….. …………………………… for partial fulfillment for the degree of Bachelor of Engineering in Information Technology.





…………………………..
(Mr......................)
Supervisor
Nepal College of Information and  Technology
NCIT


Acknowledgement

It gives us immense pleasure to express our deepest sense of gratitude and sincere thanks to our  respected and esteemed guide Er. ………………………., for his  valuable guidance, encouragement and help for completing this work. His  useful suggestions for this whole work and co-operative behavior are sincerely acknowledged.


We would like to express our sincere thank to Er…………………………….., for giving us this opportunity to undertake this project. We would also like to thank.
We are also grateful to our teachers  for their constant support and guidance.
At the end we would like to express our sincere thanks to all our friends and others who helped us directly or indirectly during this project work.We are obliged  to our project supervisor ,  teachers , and other friend’s who have  lended a helping hand in completion of  our final major project.



Abstract:

Computer network  an  abundant part of  advancement in computer technology is  persistently growing. In simple   lay man terms computer networking means interconnnectionof  two or more than two computers through a physical i.e.(wired/wireless)  medium. When the term network pops out , some technical jargons like router, switch,CAT 6/4/5, routing protocols like EIGRP,OSPF , RIP , wireless routers , CISCO , hub , IP addressing , Subnetting ..etc. Beside computer networking can be done in various ways , designs like Enterprise design for private companies , college/school network designs dedicated for colleges , schools.
Our current project aims towards design of network for college. We have provided a simple design concept , we have introduced all the aspects a project should have like  designs prototype . Besides network designs we also have introduced some security measures like password , ACL ,Encryption, site to site VPN,VLAN. We are aiming to provide optimal  and efficient design for our college



Table of Contents
Title                                                                                         Page no
Acknowledgement                                                                                          4
Abstract                                                                                                          5
List of figures                                                                                                 7
Abbreviation                                                                                                   8         
Introduction                                                                                                    9
1.1              Types                                                                                       10
1.2              Topology                                                                                 11-13
1.3              Routing                                                                                   13-18
1.4              VPN                                                                                        18
1.5              VLAN                                                                                     18
1.6              ACL                                                                                        19
1.7              Encryption                                                                              19
1.8              Medium                                                                                   19-20
1.9              Router/switch                                                                          21
References                                                                                                      22
Appendices
1.      Appendices I                                                                                       23-27
2.      Appendices-II                                                                                     28-51  


List of figures

Fig. number                          Page.no                                              Figure
I                                               50                                            Network topology
II                                             51                                            LAN/MAN
III                                            52                                            Physical design
IV                                            53                                            Logical design
                                                                                   
Abbreviation:
EIGRP                   Enhanced Interior Gateway Routing Protocol
OSPF                   Open Shortest Path First
RIP                       Routing Internet Protocol
IP                         Internet Protocol
VLAN                  Virtual Local Area Network
VPN                     Virtual Private Network
ACL                     Access Control List
SSH                      Secured Shell
IEEE                    Institute of Electrical and Electronic Engineers
HMAC                 Header Mac Authentication Code
MD5                     Message Digest Algorithm
ASN                     Autonomous System Number
TCP/IP                 Transmission Control Protocol Internet Protocol
DTE                     Data Terminal Equipment
DCE                       Data Circuit-terminating Equipment


Introduction:
Computer network is a part of growing and developing , advancement in field of computer science . It is simply inter connection of two or more computers through a medium . Internet is a example of extensive networking .Computer networks has list of advantages
Ø  Hardware sharing
Ø  File sharing
Ø  Resource sharing
Ø  Information Exchange
When the term network is in consideration there are various headers , constitutes that overall form  a integrated network .Some constitutes are
·         Types
·         Topology
·         Routing
·         Vpn
·         Vlan
·         Acl
·         Encryption
·         Medium
·         Router/switch







Some intel on constitutes of network are listed below.

1.1 Types:
There are primarily three types of network
1.      Lan
2.      Wan
3.      Man
LAN:
ü  it abbreviates for local area network
ü  it covers  less geographical area
ü  speed is measured in kbps
ü  bit  error  rate is 1bit in 10^9 bits
ü  it is suitable for a building, small offices
WAN:
ü  it abbreviates for wide area network
ü  it covers more geographic area
ü  speed is measured in mbps
ü  bit error rate is 1 in 10^12 bits
ü  it is suitable for large scale organization
MAN
ü  it abbreviate for metropolitan area network
ü  it interconnects multiple LAN’s
ü  it provides uplink facility to WAN, internet

1.2 Topology:
There are various types of topologies
ü  bus
ü  ring
ü  star
ü  tree
ü  mesh

Bus
In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data matches the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable is terminated on both ends and when without termination data transfer stop and when cable breaks, the entire network will be down.

Star

In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. In Star topology every node (computer workstation or any other peripheral) is connected to central node called hub or switch. The switch is the server and the peripherals are the clients. The network does not necessarily have to resemble a star to be classified as a star network, but all of the nodes on the network must be connected to one central device. All traffic that traverses the network passes through the central hub. The hub acts as a signal repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.

 

Ring

A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.

Mesh

The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law.

 

 

Tree

The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral nodes.


1.3 Routing:
It is simply technique in networking by which we expose networks inclined to others routers in connected to primary router.  There are two types of routing
ü  Static routing
ü  Dynamic Routing
Static routing is preferred  when there are just two routers in connection
Dynamic routing is preferred when there are multiple routers in converged network. It uses various protocols
ü  EIGRP
ü  OSPF
ü  RIP
Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4.[1] The updates for IPv6 are specified as OSPF Version 3 in RFC 5340.
OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in large service provider networks. The most widely used exterior gateway protocol is the Border Gateway Protocol (BGP), the principal routing protocol between autonomous systems on the Internet.
OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within a single routing domain (autonomous system). It gathers link state information from available routers and constructs a topology map of the network. The topology determines the routing table presented to the Internet Layer which makes routing decisions based solely on the destination IP address found in IP packets. OSPF was designed to support variable-length subnet masking (VLSM) or Classless Inter-Domain Routing (CIDR) addressing models.
OSPF detects changes in the topology, such as link failures, very quickly and converges on a new loop-free routing structure within seconds. It computes the shortest path tree for each route using a method based on Dijkstra's algorithm, a shortest path first algorithm.
The OSPF routing policies to construct a route table are governed by link cost factors (external metrics) associated with each routing interface. Cost factors may be the distance of a router (round-trip time), network throughput of a link, or link availability and reliability, expressed as simple unitless numbers. This provides a dynamic process of traffic load balancing between routes of equal cost.
An OSPF network may be structured, or subdivided, into routing areas to simplify administration and optimize traffic and resource utilization. Areas are identified by 32-bit numbers, expressed either simply in decimal, or often in octet-based dot-decimal notation, familiar from IPv4 address notation.
By convention, area 0 (zero) or 0.0.0.0 represents the core or backbone region of an OSPF network. The identifications of other areas may be chosen at will; often, administrators select the IP address of a main router in an area as the area's identification. Each additional area must have a direct or virtual connection to the backbone OSPF area. Such connections are maintained by an interconnecting router, known as area border router (ABR). An ABR maintains separate link state databases for each area it serves and maintains summarized routes for all areas in the network.
OSPF does not use a TCP/IP transport protocol (UDP, TCP), but is encapsulated directly in IP datagrams with protocol number 89. This is in contrast to other routing protocols, such as the Routing Information Protocol (RIP), or the Border Gateway Protocol (BGP). OSPF handles its own error detection and correction functions.

RIP routing protocol
The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.

RIP implements the split horizon, route poisoning and holddown mechanisms to prevent incorrect routing information from being propagated. These are some of the stability features of RIP. It is also possible to use the so called RMTI[1] (Routing Information Protocol with Metric-based Topology Investigation) algorithm to cope with the count-to-infinity problem. With its help, it is possible to detect every possible loop with a very small computation effort.

Originally each RIP router transmitted full updates every 30 seconds. In the early deployments, routing tables were small enough that the traffic was not significant. As networks grew in size, however, it became evident there could be a massive traffic burst every 30 seconds, even if the routers had been initialized at random times. It was thought, as a result of random initialization, the routing updates would spread out in time, but this was not true in practice. Sally Floyd and Van Jacobson showed in 1994[2] that, without slight randomization of the update timer, the timers synchronized over time. In most current networking environments, RIP is not the preferred choice for routing as its time to converge and scalability are poor compared to EIGRP, OSPF, or IS-IS (the latter two being link-state routing protocols), and (without RMTI) a hop limit severely limits the size of network it can be used in. However, it is easy to configure, because RIP does not require any parameters on a router unlike other protocols (see here for an animation of basic RIP simulation visualizing RIP configuration and exchanging of Request and Response to discover new routes).




Versions
There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng.
RIP version 1
The original specification of RIP, defined in RFC 1058,[4] uses classful routing. The periodic routing updates do not carry subnet information, lacking support for variable length subnet masks (VLSM). This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks.
RIP version 2
Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was developed in 1993[5] and last standardized in 1998.[6] It included the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature  allows fine-grained interoperability adjustments.
EIGRP routing protocol
Enhanced Interior Gateway Routing Protocol - (EIGRP) is a Cisco proprietary routing protocol loosely based on their original IGRP. EIGRP is an advanced distance-vector routing protocol, with optimizations to minimize both the routing instability incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers that support EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence.
EIGRP Composite and Vector metrics

EIGRP associates six (6) different vector metrics with each route and considers only four (4) of the vector metrics in computing the Composite metric:
      Vector metric:
·         Minimum bandwidth is 64 Kbit
·         Total delay is 25000 microseconds
·         Reliability is 255/255
·         Load is 197/255  
·         Minimum MTU is 576
·         Hop count is 1
1.4  VPN:
ü  It abbreviates for virtual private networks
ü  It is a security measure adopted in  to secure communication channel
ü  To support vpn router must support version CES-K9
ü  Vpn is done site to site
1.5 VLAN:
ü  It is a type of security measure applied  in switch
ü  It is represented by a unique number
ü  Computers connected in one vlan cannot access computers in another vlan
ü  Vlan is represented by unique number and a name.
1.6 ACL:
ü  Access lists are implemented in router interfaces
ü  ACL is applied on either inbound traffic or outbound traffic
ü  Access list are useful in a traffic filtering
ü  There are various types of access lists
1.      Standard access list
2.      Extended access list
1.7 Encryption:
ü  It is a type of security measure adopted for security purpose.
ü  It encodes plain messages with a encryption key  transforming it into encrypted message and thus  same encrypted key must be used for decoding.
ü  Algorithms like rsa, md5 , hmac
1.8 Medium:
ü  In computer network  there are two types of medium wired and wireless.
ü  Referring to wired medium  twisted pair, crossover Ethernet wires, co axial cable belong to this category
ü  Referring to wireless medium wifi belongs to this category

Optical fiber

An optical fiber (or optical fiber) is a flexible, transparent fiber made of glass (silica) or plastic, slightly thicker than a human hair. It functions as a waveguide, or “light pipe”,[1] to transmit light between the two ends of the fiber.[2] The field ofapplied science and engineering concerned with the design and application of optical fibers is known as fiber optics. Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communication. Fibers are used instead of metal wires because signals travel along them with less loss and are also immune to electromagnetic interference. Fibers are also used for illumination, and are wrapped in bundles so that they may be used to carry images, thus allowing viewing in confined spaces. Specially designed fibers are used for a variety of other applications, including sensors and fiber lasers.

Optical fibers typically include a transparentcore surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by total internal reflection. This causes the fiber to act as a waveguide. Fibers that support many propagation paths or transverse modes are called multi-mode fibers (MMF), while those that only support a single mode are called single-mode fibers (SMF). Multi-mode fibers generally have a wider core diameter, and are used for short-distance communication links and for applications where high power must be transmitted. Single-mode fibers are used for most communication links longer than 1,050 meters (3,440 ft).

Ethernet wires are also mode of wired communication which uses four pair of wires , it has data transfer rate from 10 mbps to 1 gbps. There are also two types of standards in Ethernet wiring ,
T568A/B to T568 A/B
T568A/B to T568 B/A
1.9 Router:
Ø it is a layer 3 device
Ø it resides in network layer
Ø its key functions are to send and receive packets from one network to another network
Ø it constitute  of  Ram, NVram , Rom , Processors , routed ports
Ø there are different vendors of routers like cisco, huawei ..etc
Switch:
Ø switch does the job of bridging two different devices of different domain/same  like router-àPC, router àrouter
Ø it routes packet at datalink layer (layer 2)
Ø some switches routes  packet at network level , commonly known as L3 switches.
Ø It isolates collision domain but extends broadcast domain
Ø Some features of switches are listed below
ü port security
ü trunking
ü security features like sticky mac








References:
  A project titled “JWD Network update” by Rosalie Murphy Marcus Wilson,Jonathan Kisor Juan Hernandez  with Joseph H. Schuessler, Ph.D. as project  manager(2011)
  Http://cisco.netacad.com  [accessed on 17/12/2012]
  Http://www.fortinet.com  [accessed on 27/11/2012]



















Appendix-I
Main switch
!
version 12.2
no service timestamps log datetimemsec
no service timestamps debug datetimemsec
no service password-encryption
!
hostname Switch
!
enable secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
username admin secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
usernamekishor secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
spanning-tree mode pvst
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
switchport trunk allowed vlan 60,70,80
!
interface FastEthernet0/4
switchport access vlan 90
switchport trunk allowed vlan 60,70,80
switchport mode access
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
switchport trunk allowed vlan 60,70,80
switchport mode access
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
switchport trunk allowed vlan 60,70,80
switchport mode trunk
!
interface FastEthernet0/21
switchport access vlan 50
switchport mode access
!
interface FastEthernet0/22
switchport access vlan 50
switchport mode access
interface FastEthernet0/23
switchport access vlan 50
switchport mode access
interface FastEthernet0/24
switchport trunk allowed vlan 50,60,70,80
switchport mode trunk
!
interface GigabitEthernet1/1
!
interface GigabitEthernet1/2
!
interface Vlan1
noip address
shutdown
!
line con 0
login local
!
linevty 0 4
login local
linevty 5 15
login
end




Appendix II
Main Router Block A
Current configuration : 3114 bytes
!
version 12.4
no service timestamps log datetimemsec
no service timestamps debug datetimemsec
no service password-encryption
!
hostnamerouterA
!
enable secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
ipdhcp excluded-address 192.168.10.100
!
ipdhcp pool SERVERPOOL
network 192.168.10.0 255.255.255.252
default-router 192.168.10.2
!
username admin privilege 15 secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
usernamekishor privilege 0 secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
cryptoisakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
!
cryptoisakmp policy 11
encr 3des
hash md5
authentication pre-share
group 2
!
cryptoisakmp key vpn@#key address 172.16.2.1
cryptoisakmp key vpn1@key address 172.16.2.6
!
cryptoipsec transform-set vpnset esp-3des esp-md5-hmac
cryptoipsec transform-set vpnset1 esp-3des esp-md5-hmac
!
crypto map vpnmap 10 ipsec-isakmp
 ! Incomplete
set peer 172.16.2.1
set transform-set vpnset
match address 100
!
crypto map vpnmap1 11 ipsec-isakmp
 ! Incomplete
set peer 172.16.2.6
set transform-set vpnset1
match address 100
!
ip domain-name router.com
!
spanning-tree mode pvst
!
class-map type inspect match-any cmap-1
match protocol http 
match protocol telnet
match protocol icmp
!
policy-map type inspect pmap-1
class type inspect cmap-1
inspect
!
zone security inside
zone security outside
zone-pair security in-out source inside destination outside
service-policy type inspect pmap-1
!
interface Loopback0
ip address 2.2.2.2 255.255.255.255
!
interface FastEthernet0/0
ip address 192.168.10.2 255.255.255.252
zone-member security outside
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 172.16.1.5 255.255.255.252
zone-member security inside
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.16.2.2 255.255.255.252
zone-member security inside
clock rate 2000000
crypto map vpnmap
!
interface Serial0/0/1
ip address 172.16.2.5 255.255.255.252
zone-member security inside
crypto map vpnmap1
!
interface Vlan1
noip address
shutdown
!
routereigrp 100
redistribute rip metric 1 0 1 1 1
redistributeospf 1 metric 1 1 1 1 1
network 2.2.2.2 0.0.0.0
network 192.128.10.0
network 172.16.2.0 0.0.0.3
network 192.168.1.0
network 192.168.2.0
network 100.10.1.0 0.0.0.3
no auto-summary
!
routerospf 1
log-adjacency-changes
redistribute rip metric 10 subnets
redistributeeigrp 100 metric 10 subnets
network 2.2.2.2 0.0.0.0 area 0
network 192.168.10.0 0.0.0.255 area 0
network 172.16.1.4 0.0.0.3 area 0
network 192.168.5.0 0.0.0.255 area 0
network 192.168.6.0 0.0.0.255 area 0
network 192.168.7.0 0.0.0.255 area 0
network 192.168.8.0 0.0.0.255 area 0
network 192.168.51.0 0.0.0.255 area 0
network 192.168.50.0 0.0.0.255 area 0
!
router rip
version 2
redistributeeigrp 100 metric 1
redistributeospf 1 metric 1
network 2.0.0.0
network 172.16.0.0
network 192.168.3.0
network 192.168.4.0
network 192.168.10.0
network 192.168.52.0
!
ip classless
!
nocdp run
!
line con 0
login local
linevty 0 4
login local
transport input ssh
!
end
Router A

Current configuration : 2212 bytes
!
version 12.4
no service timestamps log datetimemsec
no service timestamps debug datetimemsec
no service password-encryption
!
hostnamerouterA
!
enable secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
ipdhcp excluded-address 192.168.5.100
ipdhcp excluded-address 192.168.8.100
ipdhcp excluded-address 192.168.6.100
ipdhcp excluded-address 192.168.7.100
!
ipdhcp pool STAFFPOOL
network 192.168.8.0 255.255.255.0
default-router 192.168.8.100
ipdhcp pool RECPPOOL
network 192.168.7.0 255.255.255.0
default-router 192.168.7.100
ipdhcp pool OFFICEPOOL
network 192.168.6.0 255.255.255.0
default-router 192.168.6.100
ipdhcp pool LABPOOL
network 192.168.5.0 255.255.255.0
default-router 192.168.5.100
!
username admin privilege 15 secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
usernamekishor privilege 0 secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
ip domain-name routerA.com
!
spanning-tree mode pvst
!
interface Loopback0
ip address 4.4.4.4 255.255.255.255
!
interface FastEthernet0/0
noip address
duplex auto
speed auto
!
interface FastEthernet0/0.50
description connection from VLANLAB
encapsulation dot1Q 50
ip address 192.168.5.100 255.255.255.0
!
interface FastEthernet0/0.60
description connection from OFFICEVLAN
encapsulation dot1Q 60
ip address 192.168.6.100 255.255.255.0
!
interface FastEthernet0/0.70
description connection from RECPVLAN
encapsulation dot1Q 70
ip address 192.168.7.100 255.255.255.0
!
interface FastEthernet0/0.80
description connection from STAFFVLAN
encapsulation dot1Q 80
ip address 192.168.8.100 255.255.255.0
!
interface FastEthernet0/1
ip address 172.16.1.6 255.255.255.252
duplex auto
speed auto
!
interface Vlan1
noip address
shutdown
!
routerospf 1
router-id 4.4.4.4
log-adjacency-changes
network 4.4.4.4 0.0.0.0 area 0
network 172.16.1.4 0.0.0.3 area 0
network 192.168.5.0 0.0.0.255 area 0
network 192.168.6.0 0.0.0.255 area 0
network 192.168.7.0 0.0.0.255 area 0
network 192.168.8.0 0.0.0.255 area 0
network 192.168.50.0 0.0.0.255 area 0
network 192.168.51.0 0.0.0.255 area 0
!
router rip
!
ip classless
!
nocdp run
!
line con 0
login local
linevty 0 4
login local
transport input ssh
!
end



Ø   
Router B
Current configuration : 2464 bytes
!
version 12.4
no service timestamps log datetimemsec
no service timestamps debug datetimemsec
no service password-encryption
!
hostnameRouterB
!
enable secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
ipdhcp excluded-address 192.168.1.100
ipdhcp excluded-address 192.168.2.100
!
ipdhcp pool EXAMPOOL
network 192.168.1.0 255.255.255.0
default-router 192.168.1.100
ipdhcp pool STUDENT_LAB_POOL
network 192.168.2.0 255.255.255.0
default-router 192.168.2.100
ipdhcp pool EXAMSERVER
network 100.10.1.0 255.255.255.252
default-router 100.10.1.1
!
username admin privilege 15 secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
usernamekishor privilege 0 secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
!
cryptoisakmp policy 10
encr 3des
hash md5
authentication pre-share
group 2
!
cryptoisakmp key vpn@#key address 172.16.2.2
!
cryptoipsec transform-set vpnset esp-3des esp-md5-hmac
!
crypto map vpnmap 10 ipsec-isakmp
 ! Incomplete
set peer 172.16.2.2
set transform-set vpnset
match address 100
!
!
!
spanning-tree mode pvst
!
interface Loopback0
ip address 1.1.1.1 255.255.255.255
!
interface FastEthernet0/0
ip address 172.16.1.1 255.255.255.248
duplex auto
speed auto
!
interface FastEthernet0/1
noip address
duplex auto
speed auto
!
interface FastEthernet0/1.10
description connection from EXAMVLAN
encapsulation dot1Q 10
ip address 192.168.1.100 255.255.255.0
!
interface FastEthernet0/1.20
description connection from STUDENTVLAN
encapsulation dot1Q 20
ip address 192.168.2.100 255.255.255.0
!
interface Serial0/0/0
ip address 172.16.2.1 255.255.255.252
crypto map vpnmap
!
interface Serial0/0/1
noip address
clock rate 2000000
!
interface Ethernet0/1/0
ip address 100.10.1.1 255.255.255.252
ip access-group 1 in
ip access-group 1 out
duplex auto
speed auto
!
interface Vlan1
noip address
shutdown
!
routereigrp 100
network 1.1.1.1 0.0.0.0
network 172.16.2.0 0.0.0.3
network 192.168.1.0
network 192.168.2.0
network 100.10.1.0 0.0.0.3
auto-summary
!
router rip
!
ip classless
!
access-list 1 deny 192.168.2.0 0.0.0.255
access-list 1 deny 192.168.3.0 0.0.0.255
access-list 1 deny 192.168.5.0 0.0.0.255
access-list 1 deny 192.168.7.0 0.0.0.255
access-list 1 deny 192.168.8.0 0.0.0.255
access-list 1 deny 192.168.51.0 0.0.0.255
access-list 1 deny 192.168.52.0 0.0.0.255
access-list 1 deny 192.168.50.0 0.0.0.255
access-list 1 permit any
!
line con 0
login local
linevty 0 4
login local
!
End







Router D
Current configuration : 1927 bytes
!
version 12.4
no service timestamps log datetimemsec
no service timestamps debug datetimemsec
no service password-encryption
!
hostnameRouterD
!
enable secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
!
ipdhcp excluded-address 192.168.3.100
ipdhcp excluded-address 192.168.4.100
!
ipdhcp pool BBAPOOL
network 192.168.4.0 255.255.255.0
default-router 192.168.4.100
ipdhcp pool STAFFPOOL
network 192.168.3.0 255.255.255.0
default-router 192.168.3.100
!
username admin privilege 15 secret 5 $1$mERr$vTbHul1N28cEp8lkLqr0f/
usernamekishor privilege 0 secret 5 $1$mERr$9d8ljQ53KL8GWUrgU49rp.
username login privilege 15 secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
cryptoisakmp policy 11
encr 3des
hash md5
authentication pre-share
group 2
!
cryptoisakmp key vpn1@#key address 172.16.2.5
!
cryptoipsec transform-set vpnset1 esp-3des esp-md5-hmac
!
crypto map vpnmap1 11 ipsec-isakmp
 ! Incomplete
set peer 172.16.2.5
set transform-set vpnset1
match address 100
!
spanning-tree mode pvst
!
interface Loopback0
ip address 3.3.3.3 255.255.255.255
!
interface FastEthernet0/0
ip address 172.16.1.3 255.255.255.248
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.100 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1.30
description connection from VLANBBA
encapsulation dot1Q 30
ip address 192.168.3.100 255.255.255.0
!
interface FastEthernet0/1.40
encapsulation dot1Q 40
ip address 192.168.4.100 255.255.255.0
!
interface Serial0/0/0
noip address
clock rate 2000000
!
interface Serial0/0/1
ip address 172.16.2.6 255.255.255.252
clock rate 2000000
crypto map vpnmap1
!
interface Vlan1
noip address
shutdown
!
router rip
version 2
network 3.0.0.0
network 172.16.0.0
network 192.168.3.0
network 192.168.4.0
network 192.168.52.0
no auto-summary
!
ip classless
!
line con 0
login local
linevty 0 4
login local
end
Network Topologies:

Fig no. I







LAN/MAN:
Fig no II
Physical network design
Fig no. III





Logical design
Fig no. IV