Skip to content
Network Infrastructure Project Report – ABC Solutions Inc

NETWORK INFRASTRUCTURE PROJECT REPORT
TICKET-002

NETWORK INFRASTRUCTURE DESIGN AND DEPLOYMENT
ABC SOLUTIONS INC

1. PROJECT OVERVIEW

Project Name:
Network Infrastructure Expansion
Engineer:
Nguyen Kien Doanh
Date:
October 9, 2025
Context: Executing CEO’s Ticket #NET-LAB-002 to upgrade network infrastructure for 2-floor office expansion and R&D department setup.

2. BUSINESS REQUIREMENTS (TICKET #NET-LAB-002)

Ticket Information:
  • Sender: Chief Executive Officer (CEO)
  • Date Sent: April 9, 2026
  • Priority: Very High
  • Subject: Upgrade and expand network infrastructure to meet company growth

2.1. Seven Core Requirements from CEO

  1. Office Expansion to 2 Floors: Departments will have employees distributed across both floors, requiring the network system to ensure employees connect to the correct department network regardless of floor.
  2. Establish R&D Department: New department with 10 specialists, requiring complete isolation from other departments for security purposes.
  3. Add Device Networks:
    • Security Camera Network (IP cameras)
    • Office Device Network (printers, scanners)
    • Guest Wi-Fi Network – Internet only, isolated from internal resources
  4. Enhance Internal Network Performance: Ensure handling of large files and 24/7 camera video without causing bottlenecks.
  5. Internet Access Policy:
    • Allowed: IT, R&D, Guest Wi-Fi
    • Blocked: Sales, Marketing, Camera, Printers
  6. Server Farm Access Policy:
    • IT: Full access
    • Sales/Marketing: FTP only (port 21)
    • R&D, Device Networks, Guest: Completely blocked
  7. DHCP Reservation for IT: IT computers need fixed IP from DHCP (by MAC address).

3. SYSTEM DESIGN (DESIGN DOCUMENT)

3.1. VLAN and IP Planning

VLAN ID VLAN Name Subnet Gateway Number of Hosts Description
VLAN 10 Sales 172.16.10.0/24 172.16.10.1 254 hosts Sales Department
VLAN 20 Marketing 172.16.20.0/24 172.16.20.1 254 hosts Marketing Department
VLAN 30 IT 172.16.30.0/24 172.16.30.1 254 hosts IT Department
VLAN 40 Server Farm 172.16.40.0/24 172.16.40.1 254 hosts Centralized Servers
VLAN 50 R&D 172.16.50.0/24 172.16.50.1 254 hosts Research & Development
VLAN 60 Camera 172.16.60.0/24 172.16.60.1 254 hosts Security Camera System
VLAN 70 Printers 172.16.70.0/24 172.16.70.1 254 hosts Office Devices
VLAN 80 Guest WiFi 172.16.80.0/24 172.16.80.1 254 hosts Guest Wi-Fi Access

3.2. Topology and Equipment

Hierarchical Network Architecture

  • Core Layer: SW-CORE-L3 (Layer 3 Switch) – Inter-VLAN Routing
  • Access Layer: 4 Layer 2 Switches to support 2-floor office:
    • SW-F1-01, SW-F1-02 (Floor 1)
    • SW-F2-01, SW-F2-02 (Floor 2)
  • WAN Gateway: Router R1-Edge – Internet gateway, NAT
  • WAN Connection: Router ↔ Core Switch (10.0.0.0/30)

3.2.1. Network Topology Diagram

📊 NETWORK INFRASTRUCTURE OVERVIEW
Network Topology Diagram

Figure 1: Network infrastructure overview for ABC Solutions Inc.

🔐 SECURITY POLICIES (ACL RULES)

✅ Internet Access (Router ACL):
  • VLAN 30 (IT) → Internet
  • VLAN 50 (R&D) → Internet
  • VLAN 80 (Guest) → Internet
  • VLAN 10,20 (Sales/Mktg) → Blocked
  • VLAN 40,60,70 (Server/Devices) → Blocked
🔒 Server Farm Access (Core ACL):
  • VLAN 30 (IT) → Full Access
  • VLAN 10,20 (Sales/Mktg) → FTP Only (TCP 21)
  • VLAN 50 (R&D) → Blocked
  • VLAN 60,70,80 (Devices/Guest) → Blocked
⛔ Internal Isolation (Core ACL):
  • VLAN 50 (R&D) ↔ All Internal VLANs
  • VLAN 80 (Guest) ↔ All Internal VLANs
🖥️ Server to Departments (Core ACL):
  • VLAN 40 (Server) → All Departments
  • VLAN 40 (Server) → Guest (VLAN 80)
📌 Diagram Notes:
  • Trunk links: Use 802.1Q encapsulation, allow VLANs 10,20,30,40,50,60,70,80
  • WAN connection: Point-to-point /30 subnet (10.0.0.0/30) between Router and Core Switch
  • Management: All switches use VLAN 30 as management VLAN
  • Redundancy: Can expand with additional trunk links for EtherChannel/Link Aggregation

3.3. Security Policy Table (ACL Requirements)

Security Requirement ACL Solution Deployment Location
Only IT, R&D, Guest allow Internet ACL allow VLAN 30, 50, 80 → Internet Router (LAN Interface)
Sales/Marketing FTP only to Server Farm ACL allow TCP 21 from VLAN 10,20VLAN 40 Core Switch (SVI 10,20)
IT full access to Server Farm ACL allow all from VLAN 30VLAN 40 No ACL needed (default)
R&D complete isolation ACL block VLAN 50 ↔ all internal VLANs Core Switch (SVI 50)
Server Farm connects to all departments ACL allow from VLAN 40 → all (except Guest) Core Switch (SVI 40)
Guest Internet only ACL block VLAN 80 → all internal VLANs Core Switch (SVI 80)
Camera/Printer no Internet ACL block VLAN 60,70 → Internet Router (LAN Interface)

3.4. Routing Diagram

Routing Methods:
  • Inter-VLAN Routing: Core Switch L3 using Switch Virtual Interfaces (SVI)
  • Static Routes: Router → Internal VLANs (172.16.x.0/24 via 10.0.0.2)
  • Default Route: Core Switch → Router (0.0.0.0/0 via 10.0.0.1)
  • NAT: Router performs NAT Overload (PAT) for Internet connectivity

4. IMPLEMENTATION (IMPLEMENTATION DOCUMENT)

4.1. Lab Preparation (EVE-NG)

Install ishare2 and Download Images:

# Install ishare2
wget -O /usr/sbin/ishare2 https://raw.githubusercontent.com/ishare2-org/ishare2-cli/main/ishare2
chmod +x /usr/sbin/ishare2 && ishare2

# Download required images:
ishare2 pull qemu 1346  # Cisco vIOS (Router)
ishare2 pull qemu 1355  # Cisco vIOSL2 (Switch L3)
ishare2 pull iol 12     # IOL (Switch L2)
ishare2 pull qemu 866   # Linux VMs

4.2. Detailed Implementation Steps

Step 1: Configure Core Switch Layer 3 (SW-CORE-L3)
Main Tasks:
  • Hostname, basic security
  • Enable IP routing
  • Create 8 VLANs (10,20,30,40,50,60,70,80)
  • Configure SVI for each VLAN (Gateway)
  • Configure WAN port (Gi0/0: 10.0.0.2/30)
  • Configure Trunk ports to Access Switches
  • Default route to Router
  • Configure internal ACLs
  • SSH, VTY configuration
Step 2-5: Configure 4 Access Switches
Device Management IP Location Port Distribution
SW-F1-01 172.16.30.11 Floor 1 e0/0: Trunk, e1/0-3: Sales, e2/0-3: Marketing…
SW-F1-02 172.16.30.12 Floor 1 e0/0: Trunk, e3/0-3: IT, e4/0-3: R&D…
SW-F2-01 172.16.30.13 Floor 2 e0/0: Trunk, e5/0-3: Camera, e6/0-3: Printers…
SW-F2-02 172.16.30.14 Floor 2 e0/0: Trunk, e7/0-3: Guest WiFi…

Port Allocation for SW-F1-01 (Example)

Port Range VLAN Description
e0/0TrunkUplink to Core
e1/0-3VLAN 10Sales
e2/0-3VLAN 20Marketing
e3/0-3VLAN 30IT
e4/0-3VLAN 50R&D
e5/0-3VLAN 60Camera
e6/0-3VLAN 70Printers
e7/0-3VLAN 80Guest WiFi
Step 6: Configure DHCP Server (on Core Switch)

DHCP Pools Configuration:

  • Excluded addresses: .1-.49 for each subnet (reserved)
  • VLAN 10 (Sales): 172.16.10.50-200
  • VLAN 20 (Marketing): 172.16.20.50-200
  • VLAN 50 (R&D): 172.16.50.50-150
  • VLAN 60 (Camera): 172.16.60.50-200
  • VLAN 70 (Printers): 172.16.70.50-150
  • VLAN 80 (Guest): 172.16.80.100-250
  • DHCP Reservation for IT department (by MAC address)
Step 7: Configure Server Farm

Server Farm Configuration:

  • Static IP: 172.16.40.30/24
  • Gateway: 172.16.40.1
  • DNS: 8.8.8.8
Step 8: Configure Router (R1-Edge)
Interface IP Address Purpose NAT
Gi0/0 (LAN) 10.0.0.1/30 Connect Core Switch NAT Inside
Gi0/1 (WAN) DHCP from ISP Internet Connection NAT Outside

Router Configuration Tasks: Configure interfaces, Static routes to VLANs, ACL for Internet access, NAT Overload (PAT).

4.3. Detailed CLI Configuration Commands

4.3.1. Core Switch – Basic & VLAN Configuration

! ===== BASIC CONFIGURATION =====
Switch> enable
Switch# configure terminal
Switch(config)# hostname SW-CORE-L3

SW-CORE-L3(config)# no ip domain-lookup
SW-CORE-L3(config)# clock timezone GMT+7 7 0
SW-CORE-L3(config)# enable secret cisco

SW-CORE-L3(config)# line console 0
SW-CORE-L3(config-line)# password cisco
SW-CORE-L3(config-line)# login
SW-CORE-L3(config-line)# logging synchronous
SW-CORE-L3(config-line)# exec-timeout 5 0
SW-CORE-L3(config-line)# exit

! ===== ENABLE IP ROUTING =====
SW-CORE-L3(config)# ip routing

! ===== CREATE VLANs =====
SW-CORE-L3(config)# vlan 10
SW-CORE-L3(config-vlan)# name SALES
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 20
SW-CORE-L3(config-vlan)# name MARKETING
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 30
SW-CORE-L3(config-vlan)# name IT
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 40
SW-CORE-L3(config-vlan)# name SERVER-FARM
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 50
SW-CORE-L3(config-vlan)# name R&D
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 60
SW-CORE-L3(config-vlan)# name CAMERA
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 70
SW-CORE-L3(config-vlan)# name PRINTERS
SW-CORE-L3(config-vlan)# exit
SW-CORE-L3(config)# vlan 80
SW-CORE-L3(config-vlan)# name GUEST
SW-CORE-L3(config-vlan)# exit

! ===== SSH & SECURITY CONFIGURATION =====
SW-CORE-L3(config)# ip domain-name pnet.local
SW-CORE-L3(config)# username admin privilege 15 secret Pls@1234!
SW-CORE-L3(config)# crypto key generate rsa modulus 2048
SW-CORE-L3(config)# ip ssh version 2
SW-CORE-L3(config)# ip ssh time-out 60
SW-CORE-L3(config)# ip ssh authentication-retries 3

SW-CORE-L3(config)# line vty 0 15
SW-CORE-L3(config-line)# login local
SW-CORE-L3(config-line)# transport input ssh
SW-CORE-L3(config-line)# exec-timeout 10 0
SW-CORE-L3(config-line)# exit

! Disable HTTP/HTTPS services
SW-CORE-L3(config)# no ip http server
SW-CORE-L3(config)# no ip http secure-server

4.3.2. Core Switch – SVI Configuration

! ===== CONFIGURE SVIs (GATEWAYS) =====
SW-CORE-L3(config)# interface vlan 10
SW-CORE-L3(config-if)# description GW-for-Sales
SW-CORE-L3(config-if)# ip address 172.16.10.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 20
SW-CORE-L3(config-if)# description GW-for-Marketing
SW-CORE-L3(config-if)# ip address 172.16.20.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 30
SW-CORE-L3(config-if)# description GW-for-IT
SW-CORE-L3(config-if)# ip address 172.16.30.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 40
SW-CORE-L3(config-if)# description GW-for-Server-Farm
SW-CORE-L3(config-if)# ip address 172.16.40.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 50
SW-CORE-L3(config-if)# description GW-for-R&D
SW-CORE-L3(config-if)# ip address 172.16.50.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 60
SW-CORE-L3(config-if)# description GW-for-Camera
SW-CORE-L3(config-if)# ip address 172.16.60.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 70
SW-CORE-L3(config-if)# description GW-for-Printers
SW-CORE-L3(config-if)# ip address 172.16.70.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 80
SW-CORE-L3(config-if)# description GW-for-Guest
SW-CORE-L3(config-if)# ip address 172.16.80.1 255.255.255.0
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit

4.3.3. Core Switch – Trunk & WAN Ports Configuration

! ===== WAN PORT (to Router) =====
SW-CORE-L3(config)# interface gigabitEthernet 0/0
SW-CORE-L3(config-if)# description WAN-to-Router
SW-CORE-L3(config-if)# no switchport
SW-CORE-L3(config-if)# ip address 10.0.0.2 255.255.255.252
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
! ===== TRUNK PORTS (to Access Switches) =====
SW-CORE-L3(config)# interface gigabitEthernet 0/1
SW-CORE-L3(config-if)# description Trunk-to-SW-F1-01
SW-CORE-L3(config-if)# switchport trunk encapsulation dot1q
SW-CORE-L3(config-if)# switchport mode trunk
SW-CORE-L3(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface gigabitEthernet 0/2
SW-CORE-L3(config-if)# description Trunk-to-SW-F1-02
SW-CORE-L3(config-if)# switchport trunk encapsulation dot1q
SW-CORE-L3(config-if)# switchport mode trunk
SW-CORE-L3(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface gigabitEthernet 0/3
SW-CORE-L3(config-if)# description Trunk-to-SW-F2-01
SW-CORE-L3(config-if)# switchport trunk encapsulation dot1q
SW-CORE-L3(config-if)# switchport mode trunk
SW-CORE-L3(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface gigabitEthernet 1/0
SW-CORE-L3(config-if)# description Trunk-to-SW-F2-02
SW-CORE-L3(config-if)# switchport trunk encapsulation dot1q
SW-CORE-L3(config-if)# switchport mode trunk
SW-CORE-L3(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80
SW-CORE-L3(config-if)# no shutdown
SW-CORE-L3(config-if)# exit
!
! ===== DEFAULT ROUTE =====
SW-CORE-L3(config)# ip route 0.0.0.0 0.0.0.0 10.0.0.1

4.3.4. Core Switch – ACL Configuration

! ===== ACLs FOR INTERNAL SECURITY =====

! ACL for SALES & MARKETING (Only FTP to Server Farm)
SW-CORE-L3(config)# ip access-list extended ACL-SALES-MARKETING-OUT
SW-CORE-L3(config-ext-nacl)# remark === Only FTP to Server Farm ===
SW-CORE-L3(config-ext-nacl)# permit tcp any 172.16.40.0 0.0.0.255 eq 21
SW-CORE-L3(config-ext-nacl)# deny ip any 172.16.40.0 0.0.0.255
SW-CORE-L3(config-ext-nacl)# permit ip any any
SW-CORE-L3(config-ext-nacl)# exit

! Apply to VLAN 10 & 20
SW-CORE-L3(config)# interface vlan 10
SW-CORE-L3(config-if)# ip access-group ACL-SALES-MARKETING-OUT in
SW-CORE-L3(config-if)# exit
!
SW-CORE-L3(config)# interface vlan 20
SW-CORE-L3(config-if)# ip access-group ACL-SALES-MARKETING-OUT in
SW-CORE-L3(config-if)# exit
!

! ACL for R&D (Complete Isolation)
SW-CORE-L3(config)# ip access-list extended ACL-R&D-OUT
SW-CORE-L3(config-ext-nacl)# remark === Deny all internal, allow Internet ===
SW-CORE-L3(config-ext-nacl)# deny ip any 172.16.0.0 0.0.255.255
SW-CORE-L3(config-ext-nacl)# permit ip any any
SW-CORE-L3(config-ext-nacl)# exit

SW-CORE-L3(config)# interface vlan 50
SW-CORE-L3(config-if)# ip access-group ACL-R&D-OUT in
SW-CORE-L3(config-if)# exit
!

! ACL for GUEST (Internet Only)
SW-CORE-L3(config)# ip access-list extended ACL-GUEST-OUT
SW-CORE-L3(config-ext-nacl)# remark === Guest only to Internet ===
SW-CORE-L3(config-ext-nacl)# deny ip any 172.16.0.0 0.0.255.255
SW-CORE-L3(config-ext-nacl)# permit ip any any
SW-CORE-L3(config-ext-nacl)# exit

SW-CORE-L3(config)# interface vlan 80
SW-CORE-L3(config-if)# ip access-group ACL-GUEST-OUT in
SW-CORE-L3(config-if)# exit
!

! ACL for SERVER FARM (Allow to all except Guest)
SW-CORE-L3(config)# ip access-list extended ACL-SERVER-FARM-OUT
SW-CORE-L3(config-ext-nacl)# remark === Deny to Guest, Permit all else ===
SW-CORE-L3(config-ext-nacl)# deny ip any 172.16.80.0 0.0.0.255
SW-CORE-L3(config-ext-nacl)# permit ip any any
SW-CORE-L3(config-ext-nacl)# exit

SW-CORE-L3(config)# interface vlan 40
SW-CORE-L3(config-if)# ip access-group ACL-SERVER-FARM-OUT in
SW-CORE-L3(config-if)# exit
!

! Save configuration
SW-CORE-L3(config)# end
SW-CORE-L3# write memory

4.3.5. Access Switch Configuration (Example: SW-F1-01)

! ===== SW-F1-01 CONFIGURATION =====
Switch> enable
Switch# configure terminal
Switch(config)# hostname SW-F1-01

SW-F1-01(config)# no ip routing
SW-F1-01(config)# no ip domain-lookup
SW-F1-01(config)# clock timezone GMT+7 7 0
SW-F1-01(config)# enable secret cisco

SW-F1-01(config)# line console 0
SW-F1-01(config-line)# password cisco
SW-F1-01(config-line)# login
SW-F1-01(config-line)# logging synchronous
SW-F1-01(config-line)# exec-timeout 5 0
SW-F1-01(config-line)# exit

! ===== CREATE VLANs =====
SW-F1-01(config)# vlan 10
SW-F1-01(config-vlan)# name SALES
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 20
SW-F1-01(config-vlan)# name MARKETING
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 30
SW-F1-01(config-vlan)# name IT
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 40
SW-F1-01(config-vlan)# name SERVER-FARM
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 50
SW-F1-01(config-vlan)# name R&D
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 60
SW-F1-01(config-vlan)# name CAMERA
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 70
SW-F1-01(config-vlan)# name PRINTERS
SW-F1-01(config-vlan)# exit
SW-F1-01(config)# vlan 80
SW-F1-01(config-vlan)# name GUEST
SW-F1-01(config-vlan)# exit

! ===== TRUNK PORT (Uplink to Core) =====
SW-F1-01(config)# interface ethernet 0/0
SW-F1-01(config-if)# description Trunk-to-SW-CORE-L3
SW-F1-01(config-if)# switchport mode trunk
SW-F1-01(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70,80
SW-F1-01(config-if)# no shutdown
SW-F1-01(config-if)# exit

! ===== ACCESS PORTS (Example for Sales, Marketing, etc) =====
! SALES (VLAN 10)
SW-F1-01(config)# interface range ethernet 1/0 - 3
SW-F1-01(config-if-range)# description Sales-Department
SW-F1-01(config-if-range)# switchport mode access
SW-F1-01(config-if-range)# switchport access vlan 10
SW-F1-01(config-if-range)# spanning-tree portfast
SW-F1-01(config-if-range)# no shutdown
SW-F1-01(config-if-range)# exit

! ... (Configure other ports similarly for VLAN 20, 30, 50, 60, 70, 80) ...

! ===== MANAGEMENT VLAN =====
SW-F1-01(config)# interface vlan 30
SW-F1-01(config-if)# description Management-Interface
SW-F1-01(config-if)# ip address 172.16.30.11 255.255.255.0
SW-F1-01(config-if)# no shutdown
SW-F1-01(config-if)# exit

SW-F1-01(config)# ip default-gateway 172.16.30.1

SW-F1-01(config)# end
SW-F1-01# write memory

4.3.6. DHCP Configuration (on Core Switch)

! ===== DHCP SERVER CONFIGURATION =====

! Exclude Gateway and Static IPs
SW-CORE-L3(config)# ip dhcp excluded-address 172.16.10.1 172.16.10.49
SW-CORE-L3(config)# ip dhcp excluded-address 172.16.20.1 172.16.20.49
! ... (Repeat for other VLANs) ...

! DHCP Pool for SALES (VLAN 10)
SW-CORE-L3(config)# ip dhcp pool VLAN10-SALES
SW-CORE-L3(dhcp-config)# network 172.16.10.0 255.255.255.0
SW-CORE-L3(dhcp-config)# default-router 172.16.10.1
SW-CORE-L3(dhcp-config)# dns-server 8.8.8.8
SW-CORE-L3(dhcp-config)# exit
!
! ... (Configure other Pools: VLAN20, VLAN50, VLAN60, VLAN70, VLAN80) ...
!
! DHCP Reservation for IT (Example: PC-IT-01)
SW-CORE-L3(config)# ip dhcp pool IT-PC-01-RESERVED
SW-CORE-L3(dhcp-config)# host 172.16.30.50 255.255.255.0
SW-CORE-L3(dhcp-config)# client-identifier 0100.5079.6668.01
SW-CORE-L3(dhcp-config)# default-router 172.16.30.1
SW-CORE-L3(dhcp-config)# dns-server 8.8.8.8
SW-CORE-L3(dhcp-config)# exit

4.3.7. Router Configuration (Internet Gateway & NAT)

! ===== ROUTER R1-EDGE CONFIGURATION =====
Router> enable
Router# configure terminal
Router(config)# hostname R1-Edge
! ... (Basic Security Config) ...

! ===== LAN INTERFACE (to Core Switch) =====
R1-Edge(config)# interface gigabitEthernet 0/0
R1-Edge(config-if)# description LAN-to-Core-Switch
R1-Edge(config-if)# ip address 10.0.0.1 255.255.255.252
R1-Edge(config-if)# ip nat inside
R1-Edge(config-if)# no shutdown
R1-Edge(config-if)# exit
!
! ===== WAN INTERFACE (to ISP/Internet) =====
R1-Edge(config)# interface gigabitEthernet 0/1
R1-Edge(config-if)# description WAN-to-ISP
R1-Edge(config-if)# ip address dhcp
R1-Edge(config-if)# ip nat outside
R1-Edge(config-if)# no shutdown
R1-Edge(config-if)# exit
!
! ===== STATIC ROUTES (to Internal VLANs) =====
R1-Edge(config)# ip route 172.16.10.0 255.255.255.0 10.0.0.2
R1-Edge(config)# ip route 172.16.20.0 255.255.255.0 10.0.0.2
! ... (Repeat for all internal subnets) ...

! ===== ACL FOR INTERNET ACCESS =====
! Only IT (30), R&D (50), Guest (80) allowed to Internet
R1-Edge(config)# ip access-list extended ACL-INTERNET-IN
R1-Edge(config-ext-nacl)# remark === Only IT, R&D, Guest can access Internet ===
R1-Edge(config-ext-nacl)# permit ip 172.16.30.0 0.0.0.255 any
R1-Edge(config-ext-nacl)# permit ip 172.16.50.0 0.0.0.255 any
R1-Edge(config-ext-nacl)# permit ip 172.16.80.0 0.0.0.255 any
R1-Edge(config-ext-nacl)# deny ip 172.16.0.0 0.0.255.255 any
R1-Edge(config-ext-nacl)# permit ip any any
R1-Edge(config-ext-nacl)# exit

! Apply ACL to LAN interface (inbound)
R1-Edge(config)# interface gigabitEthernet 0/0
R1-Edge(config-if)# ip access-group ACL-INTERNET-IN in
R1-Edge(config-if)# exit

! ===== NAT CONFIGURATION =====
R1-Edge(config)# ip access-list standard ACL-NAT
R1-Edge(config-std-nacl)# permit 172.16.0.0 0.0.255.255
R1-Edge(config-std-nacl)# exit
R1-Edge(config)# ip nat inside source list ACL-NAT interface gigabitEthernet 0/1 overload

! Save configuration
R1-Edge(config)# end
R1-Edge# write memory

4.3.8. Verification Commands

! ===== CORE SWITCH VERIFICATION =====
show vlan brief
show ip interface brief
show ip route
show ip access-lists
show interface trunk
show spanning-tree summary
show ip dhcp binding
show ip dhcp pool

! ===== ROUTER VERIFICATION =====
show ip interface brief
show ip route
show ip nat translations
show ip nat statistics
show ip access-lists

! ===== ACCESS SWITCH VERIFICATION =====
show vlan brief
show interface trunk
show interface status
show spanning-tree

5. TESTING & VERIFICATION

5.1. Critical Test Cases

TC ID Test Description Source Destination Expected Result Reason
TC-001 R&D ping Sales PC-R&D-01 172.16.10.50 FAIL R&D isolated
TC-008 R&D ping Router PC-R&D-01 10.0.0.1 SUCCESS R&D allows Internet
TC-010 Sales ping Internet PC-SALES-01 8.8.8.8 FAIL Sales no Internet
TC-017 Sales FTP Server PC-SALES-01 172.16.40.30:21 SUCCESS ACL allows TCP 21
TC-018 Sales ping Server PC-SALES-01 172.16.40.30 FAIL FTP only, no ICMP
TC-034 IT ping Internet PC-IT-01 8.8.8.8 SUCCESS IT allows Internet
TC-037 Server ping IT Server-Farm 172.16.30.50 SUCCESS Server connects all dept
TC-040 Guest ping Sales Guest-PC 172.16.10.50 FAIL Guest internal isolation
TC-042 Guest ping Internet Guest-PC 8.8.8.8 SUCCESS Guest allows Internet
TC-045 Camera ping Internet Camera-01 8.8.8.8 FAIL Camera no Internet

5.2. Show Commands for Verification

Core Switch Verification:

  • show ip route
  • show ip interface brief
  • show vlan brief
  • show ip access-lists
  • show ip interface vlan X | include access list
  • show spanning-tree

Router Verification:

  • show ip route
  • show ip nat translations
  • show ip access-lists
  • show ip interface brief
  • show ip dhcp binding (if DHCP on router)

6. OPERATIONS & MAINTENANCE

6.1. Adding New Computers

Procedure for adding new PC:

  1. Identify available port on corresponding Access Switch
  2. Assign to appropriate department VLAN
  3. Configure port mode access
  4. Enable spanning-tree portfast
  5. Test connectivity and DHCP
  6. Update documentation

6.2. Adding New VLAN/Department

Expansion procedure:

  1. Plan new subnet (e.g., 172.16.90.0/24)
  2. Create VLAN on all switches
  3. Configure SVI on Core Switch
  4. Update Trunk allowed VLANs
  5. Create DHCP pool
  6. Update ACLs if needed
  7. Test and verify

6.3. Configuration Backup

Backup Procedure:
  • Run show running-config on each device
  • Save backup files with timestamp
  • Upload to cloud storage or NAS
  • Perform weekly backups
  • Test restore procedure regularly

7. CONCLUSION

Project Achievement Summary

✅ Successfully completed all requirements from Ticket #NET-LAB-002:

  • 2-Floor Expansion: Successfully deployed 4 Access Switches supporting 2-floor office with capability for employees to connect to correct department VLAN regardless of floor.
  • R&D Department: Complete isolation of VLAN 50 from all internal VLANs, allowing only Internet access.
  • Device Networks: Successfully deployed VLAN 60 (Camera), VLAN 70 (Printers), VLAN 80 (Guest WiFi).
  • Network Performance: Core Switch Layer 3 ensures efficient Inter-VLAN routing, supporting high traffic from cameras and file servers.
  • Internet Policy: Only IT, R&D, Guest access Internet through Router ACLs.
  • Server Farm Policy: IT full access, Sales/Marketing FTP only (TCP 21), other departments blocked.
  • DHCP Reservation: IT department receives fixed IP by MAC address.

🔒 Enhanced Security:

  • Deployed 8 strict ACLs according to business requirements.
  • Complete separation of sensitive networks (R&D, Server Farm).
  • Guest network completely isolated from internal resources.
  • Camera and Printer networks have no Internet access.

📈 Scalability:

  • Hierarchical architecture easily expandable with additional switches.
  • VLAN design supports 254 hosts/subnet for future growth.
  • Operational procedures thoroughly documented.
  • Backup and recovery procedures established.
Project ready for operation: The new network system fully meets the 2-floor office expansion requirements of ABC Solutions Inc., ensuring high network security and optimal performance for the company’s continued growth.

Leave a Reply

Your email address will not be published. Required fields are marked *

QR Code

Chủ web
xin được nuôi 🍜

Support Me Touch here ^_^
Contact