Network Configuration Using Cisco OS

Divide the 172.16.10.0/24 network into eight subnets

Subnet Number Network Address Usable Host Address Range Broadcast Address
1 172.16.10.0/27 172.16.10.1 - 172.16.10.30 172.16.10.31
2 172.16.10.32/27 172.16.10.33 - 172.16.10.62 172.16.10.63
3 172.16.10.64/27 172.16.10.65 - 172.16.10.94 172.16.10.95
4 172.16.10.96/27 172.16.10.97 - 172.16.10.126 172.16.10.127
5 172.16.10.128/27 172.16.10.129 - 172.16.10.158 172.16.10.159
6 172.16.10.160/27 172.16.10.161 - 172.16.10.190 172.16.10.191
7 172.16.10.192/27 172.16.10.193 - 172.16.10.222 172.16.10.223
8 172.16.10.224/27 172.16.10.225 - 172.16.10.254 172.16.10.255

The new value of the subnet mask will be 255.255.255.224 /27
32 Adresses will exist per subnet, including the network address and broadcast adress.

Now that we have the network structured in the desired subnets, we can implement VLANs and Trunk using Cisco OS commands on the S1-Office1 and S2-Office1 switches.

Create and name VLANs as follows:
VLAN 10: Management
VLAN 20: Marketing
VLAN 30: Accounting
VLAN 100: Native

On S1-Office1 and S2office1, configure the interfaces as access mode and assign VLANS as follows:
VLAN 10: fa0/1-10
VLAN 20: fa0/11-20
VLAN 30: fa0/21-24

  1. configure the S1-Office1 to S2-Office1 interconnecting link as trunk on both
  2. Verify the Vlan and trunk configurations
  3. On both switches, Disable DTP only on access ports
            
                enable
                conf t
                vlan 10
                name Management
                exit
                vlan 20
                name Marketing
                exit

                vlan 30
                name Accounting
                exit
                vlan 100
                name Native
                exit
                do show vlan brief 


                enable
                conf t
                int range fa 0/1-10
                switchport mode access
                switchport access vlan 10
                exit
                int range fa 0/11-20
                switchport mode access
                switchport access vlan 20
                exit
                int range fa 0/21-24
                switchport mode access
                switchport access vlan 30
                exit
                do show vlan brief

                S1
                enable
                conf t
                int range gig 0/1-2
                switchport mode trunk
                switchport trunk native vlan 100
                switchport trunk allowed vlan 1,20,30,100
                exit
                exit
                show interfaces trunk



                copy running-config startup-config

                S2
                enable
                conf t
                int gig 0/1
                switchport mode trunk
                switchport trunk native vlan 100
                switchport trunk allowed vlan 1,20,30,100
                exit
                exit
                show interfaces trunk

                enable
                conf t
                int range fa 0/1-24
                switchport nonegotiate
                exit
                do show interfaces switchport

            
        

Assign the first usable ip address and apropiate subnet mask of subnet 1 to the router 3 interface connected to office3 network.
172.16.10.32/27 172.16.10.33 - 172.16.10.62 172.16.10.63

            
                R3
                enable
                conf t
                int gig 0/0
                ip address 172.16.10.1 255.255.255.224
                exit
            
        

Assign the first usable ip address and appropiate subnet mask of subnet 2 to the R3 interface connected to the office2 network.
172.16.10.32/27 172.16.10.33 - 172.16.10.62 172.16.10.63

            
                R3
                enable
                conf t
                int gig 0/1
                ip address 172.16.10.33 255.255.255.224
                exit
            
        

Assign the first and second usable ip address and appropiate subnet mask of subnet 3 to the R1 <-> R2 WAN link.
172.16.10.64/27 172.16.10.65 - 172.16.10.94 172.16.10.95

            
                R1
                enable
                conf t
                int se 0/0/1
                ip address 172.16.10.65 255.255.255.224
                exit
                
                R2
                enable
                conf t
                int se 0/0/1
                ip address 172.16.10.66 255.255.255.224
                exit
            
        

Assign the first and second usable ip address and appropiate subnet mask of subnet 4 to the R1 <-> R3 WAN link.
172.16.10.96/27 172.16.10.97 - 172.16.10.126 172.16.10.127

            
                R1
                enable
                conf t
                int se 0/0/0
                ip address 172.16.10.97 255.255.255.224
                exit
                
                R3
                enable
                conf t
                int se 0/0/0
                ip address 172.16.10.98 255.255.255.224
                exit
            
        

Assign the first and second usable ip address and appropiate subnet mask of subnet 5 to the R2 <-> R3 WAN link.
172.16.10.128/27 172.16.10.129 - 172.16.10.158 172.16.10.159

            
                R2
                enable
                conf t
                int se 0/0/0
                ip address 172.16.10.129 255.255.255.224
                exit
                
                R3
                enable
                conf t
                int se 0/0/1
                ip address 172.16.10.130 255.255.255.224
                exit
            
        

Assign IPs to the CEO devices in the subnet 172.16.10.160/27, with usable IPs ranging from 172.16.10.161 to 172.16.10.190, a subnet mask of 255.255.255.224, and the default gateway set to 172.16.10.161. Note that a router-on-a-stick setup is required for Layer 3 connectivity.

        
            CEO1
            netsh interface ip set address name="FastEthernet0" static 172.16.10.190 255.255.255.224 172.16.10.161
        

            CEO2
            netsh interface ip set address name="FastEthernet0" static 172.16.10.189 255.255.255.224 172.16.10.161

        
    

Assign IPs to the Copyrighter devices in the subnet 172.16.10.192/27, with a usable IP range of 172.16.10.193 - 172.16.10.222, a subnet mask of 255.255.255.224, and the default gateway set to 172.16.10.193.

        
            netsh interface ip set address name="FastEthernet0" static 172.16.10.222 255.255.255.224 172.16.10.193

            netsh interface ip set address name="FastEthernet0" static 172.16.10.221 255.255.255.224 172.16.10.193

        
    

Assign the last usable IP addresses of subnet 172.16.10.224/27 to the Office1 network Dialer end devices, with a usable IP range of 172.16.10.225 - 172.16.10.254, a subnet mask of 255.255.255.224, and the default gateway set to 172.16.10.225.

        
            netsh interface ip set address name="FastEthernet0" static 172.16.10.254 255.255.255.224 172.16.10.225

            netsh interface ip set address name="FastEthernet0" static 172.16.10.253 255.255.255.224 172.16.10.225

        
    

Assign IPs to Office2 and Office3 devices: For Office2 (Subnet 2 - 172.16.10.32/27), the usable IP range is 172.16.10.33 - 172.16.10.62, the default gateway is 172.16.10.33, and the subnet mask is 255.255.255.224.

        
            //Email Server
            netsh interface ip set address name="FastEthernet0" static 172.16.10.30 255.255.255.224 172.16.10.1

            //Syslog/NTP Server
            netsh interface ip set address name="FastEthernet0" static 172.16.10.29 255.255.255.224 172.16.10.1

            //Admin
            netsh interface ip set address name="FastEthernet0" static 172.16.10.28 255.255.255.224 172.16.10.1


        
    

Configure R1 for Inter-VLAN Routing

  1. Enable the Gig 0/0 interface on R1.
  2. Create sub-interfaces for VLANs 10, 20, and 30 on Gig 0/0 (sub-interface 10 for VLAN 10, sub-interface 20 for VLAN 20, sub-interface 30 for VLAN 30).
  3. Set the correct encapsulation type and VLAN ID for each sub-interface.
  4. Assign IP addresses and subnet masks to each sub-interface based on the provided addressing table.
  5. Use the appropriate show commands to verify the configuration on R1.
  6. On S1-Office1, configure both Gig interfaces as trunk with the correct native VLAN. On S2-Office1, configure only Gig 0/1 as trunk with the correct native VLAN.
  7. Verify trunking and connectivity.
  8. Test inter-VLAN routing by pinging Copyrighter1 and Dialer1 from CEO1 PC.
        
            S1
            enable 
            conf t
            int gig 0/1
            switchport mode trunk
            exit

            S2 
            enable 
            conf t
            int gig 0/1
            switchport trunk native vlan 100
            exit




            R1
            enable
            conf t
            int gig 0/0
            no shutdown
            exit
            int gig 0/0.10
            encapsulation dot1q 10
            ip address 172.16.10.161 255.255.255.224
            exit
            int gig 0/0.20
            encapsulation dot1q 20
            ip address 172.16.10.193 255.255.255.224
            exit
            int gig 0/0.30
            encapsulation dot1q 30
            ip address 172.16.10.225 255.255.255.224
            exit

            show run

            copy running-config startup-config



        
    

Port Security - Enable port security on the ports connected to end devices in S1-Office1 and S2-Office1 switches (Note: do not implement port security on trunk ports). Secure authorized MAC addresses using sticky learning, verify the port security configuration with appropriate show commands, and then disable all remaining unused ports and save the configuration.Set the violation mode to restrict

        
            enable 
            conf t 
            int fa 0/1
            switchport mode access
            switchport port-security
            switchport port-security violation restrict
            switchport port-security mac-address sticky
            exit
            int fa 0/11
            switchport mode access
            switchport port-security
            switchport port-security violation restrict
            switchport port-security mac-address sticky
            exit 
            int fa0/21
            switchport mode access
            switchport port-security
            switchport port-security violation restrict
            switchport port-security mac-address sticky
            exit 

            show run or show port-security

            enable 
            conf t
            int range fa 0/2-10
            shutdown
            exit
            int range fa 0/12-20
            shutdown
            exit

            copy running-config startup-config
 
        
    

Configure OSPF: Enable OSPF on R1, R2, and R3 to allow communication across all subnets.

  1. Turn on the connected serial interfaces on each router with the no shutdown command.
  2. Turn on the connected gigabit interfaces on R3 with the no shutdown command.
  3. Configure OSPF on each router with:
    • Process ID
    • Network IP for each network
    • Router ID: R1: 1.1.1.1, R2: 2.2.2.2, R3: 3.3.3.3
    • Area 0
  4. Set LAN-connected interfaces as passive.
  5. Verify the OSPF configuration on R1 with appropriate show commands and save the configuration
        
            R1                                            
            enable                                       
            conf t                                      
            router ospf 1
            router-id 1.1.1.1
            network 172.16.10.160 0.0.0.31 area 0
            network 172.16.10.192 0.0.0.31 area 0
            network 172.16.10.224 0.0.0.31 area 0
            network 172.16.10.96 0.0.0.31 area 0
            network 172.16.10.64 0.0.0.31 area 0
            passive-interface gig 0/0
            exit
            
            R2
            enable                                       
            conf t                                      
            router ospf 1
            router-id 2.2.2.2
            network 172.16.10.64 0.0.0.31 area 0
            network 172.16.10.128 0.0.0.31 area 0
            exit
            
            R3
            enable                                       
            conf t                                      
            router ospf 1
            router-id 3.3.3.3
            network 172.16.10.128 0.0.0.31 area 0
            network 172.16.10.96 0.0.0.31 area 0
            network 172.16.10.32 0.0.0.31 area 0
            network 172.16.10.0 0.0.0.31 area 0
            passive-interface gig 0/0
            passive-interface gig 0/1
            exit
            


        
    

Configure ACLs on R3 to prevent guests from connecting to the NTP/Syslog server. First, create a numbered extended ACL where traffic from the guest PC to the NTP/Syslog server is denied, while all other network traffic is permitted. Apply the ACL on the correct interface and traffic direction. Then, verify the ACL configuration with a show command (note that IP addresses may vary based on assignments). Finally, test the ACL from the guest PC by pinging both the NTP server and the email server.

        

            enable
            conf t
            ip access-list extended 100
            exit
            access-list 100 deny ip host 172.16.10.62 host 172.16.10.29
            access-list 100 permit ip any any
            interface gig 0/1
            ip access-group 100 in
            exit


        
    

Initial and Security Settings for Network Devices - Configure all network devices with basic security settings to prevent unauthorized access. First, configure the console line to use the local username Admin and password ACDC1973 for access. Then, secure privileged mode access with the password beatles1960. Next, encrypt all passwords on the device and configure the following security message (MOTD Banner): "Only authorized personnel are allowed accessing this device!". Finally, save all running configurations to NVRAM on all routers and switches.

        

           enable 
            conf t
            username Admin password ACDC1973
            enable password beatles1960
            banner motd #Only authorized personnel are allowed accessing this device!#
            line console 0
            login local
            exit
            service password-encryption
            exit
            copy run start

            service password-encryption


        
    

Secure Remote Access - Configure SSHv2 services on all routers (R1, R2, and R3) to enable remote administration. First, set the IP domain name to Cyber.local. Then, generate secure keys with a minimum key length of 1024 bits and enable SSHv2. Next, configure the VTY lines to use local login credentials and allow only incoming SSH sessions. Verify the configuration using appropriate show commands. Afterward, set the correct default gateway on the admin PC and test SSH access to the routers using the command ssh -l . Finally, on Employee2's PC, try to ping Copyrighter1 and Dialer1; if the connection fails, troubleshoot the issue.

            
    
                enable
                conf t
                ip domain-name Cyber.local
                line vty 0 15
                login local
                motd-banner
                transport input ssh
                exit
                ip ssh version 2
                crypto key generate rsa
                exit
                exit
                copy run start
                
                show ip ssh