Project: Full Administration Network Setup (VLSM + Application Services)
Based on 192.168.10.0 range for ~32 PCs per VLAN.
| Subnet/VLAN | Network ID | Subnet Mask | Gateway (Router) | Usable Range |
|---|---|---|---|---|
| VLAN 10 (IT) | 192.168.10.0/26 | 255.255.255.192 | 192.168.10.1 | .2 - .62 |
| VLAN 20 (ADMIN) | 192.168.10.64/26 | 255.255.255.192 | 192.168.10.65 | .66 - .126 |
| VLAN 30 (SR) | 192.168.10.128/26 | 255.255.255.192 | 192.168.10.129 | .130 - .190 |
| Server Subnet | 192.168.10.192/28 | 255.255.255.240 | 192.168.10.193 | .194 - .206 |
enable
conf t
hostname Admin_Router
interface GigabitEthernet0/0
no shut
exit
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.1 255.255.255.192
ip helper-address 192.168.10.194
exit
interface GigabitEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.10.65 255.255.255.192
ip helper-address 192.168.10.194
exit
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 192.168.10.129 255.255.255.192
ip helper-address 192.168.10.194
exit
interface GigabitEthernet0/0.100
encapsulation dot1Q 100
ip address 192.168.10.193 255.255.255.240
exit
do write
enable
conf t
vlan 10
vlan 20
vlan 30
vlan 100
exit
interface range fastEthernet 0/1 - 4
switchport mode trunk
exit
enable
conf t
vlan 10
vlan 20
vlan 30
exit
interface fastEthernet 0/1
switchport mode trunk
exit
interface fastEthernet 0/3
switchport access vlan 10
interface fastEthernet 0/4
switchport access vlan 20
interface fastEthernet 0/5
switchport access vlan 30
| Pool Name | Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| VLAN10_IT | 192.168.10.1 | 192.168.10.196 | 192.168.10.2 | 255.255.255.192 |
| VLAN20_ADMIN | 192.168.10.65 | 192.168.10.196 | 192.168.10.66 | 255.255.255.192 |
| VLAN30_SR | 192.168.10.129 | 192.168.10.196 | 192.168.10.130 | 255.255.255.192 |
| Domain Name | Record Type | IP Address |
|---|---|---|
| www.admin.com | A Record | 192.168.10.195 |
| mail.admin.com | A Record | 192.168.10.194 |
Service: SMTP (ON), POP3 (ON). Domain: admin.com. Users: user1, user2 (Pass: 123).
Edit index.html: <h1>Welcome to Administration Portal</h1>
Your Name: Staff 1
Email Address: user1@admin.com
Incoming/Outgoing Server: mail.admin.com
Username: user1
Password: 123
All servers are located in the 192.168.10.192/28 subnet (VLAN 100).
Configure each PC under Desktop > Email using these credentials:
| Field | Configuration Value |
|---|---|
| Your Name | User Name (e.g., Staff1) |
| Email Address | staff1@admin.com |
| Incoming Mail Server | mail.admin.com |
| Outgoing Mail Server | mail.admin.com |
| User Name | staff1 |
| Password | 123 |
Both OSPF and RIP are configured on all interfaces to ensure complete redundancy and protocol synchronization across the core network.
enable
conf t
! --- OSPF Setup (Wildcard masks for VLSM) ---
router ospf 1
network 192.168.10.0 0.0.0.63 area 0
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.128 0.0.0.63 area 0
network 192.168.10.192 0.0.0.15 area 0
network 200.200.200.0 0.0.0.3 area 0
network 202.202.202.0 0.0.0.3 area 0
exit
! --- RIP Setup ---
router rip
version 2
network 192.168.10.0
network 200.200.200.0
network 202.202.202.0
no auto-summary
exit
enable
conf t
router ospf 1
network 192.168.11.0 0.0.0.255 area 0
network 201.201.201.0 0.0.0.3 area 0
network 202.202.202.0 0.0.0.3 area 0
exit
router rip
version 2
network 192.168.11.0
network 201.201.201.0
network 202.202.202.0
no auto-summary
exit
enable
conf t
router ospf 1
network 200.200.200.0 0.0.0.3 area 0
network 201.201.201.0 0.0.0.3 area 0
exit
router rip
version 2
network 200.200.200.0
network 201.201.201.0
no auto-summary
exit
To verify that the routing protocols are exchanging information correctly, use the following command on any core router:
show ip route
Ensuring the Student Branch (192.168.11.0) utilizes central services located in the Administration Branch.
Run this on the Student Core Router to forward requests to the Admin DHCP Server:
interface GigabitEthernet0/0
ip helper-address 192.168.10.194
Add this pool in Services > DHCP to provide IPs to the student branch:
| Pool Name | Default Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| Student_Pool | 192.168.11.1 | 192.168.10.196 | 192.168.11.2 | 255.255.255.0 |
In Services > Email, ensure the domain admin.com is set and add:
Apply these settings on the Student PC under Desktop > Email:
| Field | Value |
|---|---|
| Your Name | Student One |
| Email Address | student1@admin.com |
| Incoming Mail Server | 192.168.10.194 |
| Outgoing Mail Server | 192.168.10.194 |
| User Name | student1 |
| Password | 123 |
show ip route to ensure Student Router sees the Server network via OSPF (O) or RIP (R).
Network Address Translation (NAT) is a method used to remap one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
In this topology, we use PAT (Port Address Translation), often called NAT Overload. It allows multiple devices in your private internal networks (192.168.10.0 and 192.168.11.0) to share a single public-facing Serial IP address. The router tracks these connections using unique port numbers, ensuring that returning traffic from the ISP reaches the correct internal PC.
We use Extended ACLs to ensure NAT only triggers for ISP traffic and ignores internal branch-to-branch traffic.
! Define ACL: Deny NAT for Student Branch, Permit for everything else
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.11.0 0.0.0.255
access-list 100 permit ip 192.168.10.0 0.0.0.255 any
! Assign NAT Roles to Interfaces
interface range gig0/0.10 - 100
ip nat inside
exit
interface Serial0/3/0
ip nat outside
exit
interface Serial0/3/1
ip nat outside
exit
! Enable PAT on both Serial exits
ip nat inside source list 100 interface Serial0/3/0 overload
ip nat inside source list 100 interface Serial0/3/1 overload
! Define ACL: Deny NAT for Admin Branch, Permit for everything else
access-list 100 deny ip 192.168.11.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 100 permit ip 192.168.11.0 0.0.0.255 any
! Assign NAT Roles
interface gig0/0
ip nat inside
exit
interface Serial0/3/0
ip nat outside
exit
interface Serial0/3/1
ip nat outside
exit
! Enable PAT
ip nat inside source list 100 interface Serial0/3/0 overload
ip nat inside source list 100 interface Serial0/3/1 overload
Where: NAT was added at the Border Routers (Administration and Student Routers). Specifically, it sits between the internal Gigabit sub-interfaces and the external Serial connections.
Why:
1. IP Conservation: It allows hundreds of student and staff PCs to access the ISP using only 2 or 3 public IPs.
2. Security: It hides the internal IP structure (VLANs) from the ISP router.
3. Service Integrity: By using the deny statement for internal traffic, we ensure that DHCP and Email packets keep their original source IPs, which is required for the servers to identify the users correctly.
When an Administration PC pings the ISP (200.200.200.2), the router sees the packet exiting a nat outside port. It checks ACL 100, sees a "permit," and changes the Source IP to 200.200.200.1.
However, when that same PC sends an email to the Student branch, the router sees a "deny" in ACL 100 for that destination. It sends the packet using OSPF/RIP routing only, without touching the IP address. This "Service-Aware" approach is what allows the entire university to share an internet connection without breaking local branch services.
show ip nat translations on the Admin Router while a PC is browsing the web. You will see a list of active mappings showing the translation from private to public.
To demonstrate a professional security environment, we have deployed a Student Web Server (192.168.11.100) within the Student Branch. To support this, a corresponding DNS entry was added to the Admin DNS Server (192.168.10.196), allowing users to browse via the URL www.student.com.
Security is implemented using two distinct types of filters based on the level of control required:
Applied to GigabitEthernet 0/0 (Outbound). This port is the exit point toward the Student LAN.
! Blocking Admin IT PC (192.168.10.3)
access-list 10 deny host 192.168.10.3
access-list 10 permit any
interface GigabitEthernet0/0
ip access-group 10 out
Applied to Sub-interfaces Gig 0/0.20 and Gig 0/0.30 (Inbound). These are the entry ports for VLAN traffic.
! VLAN 20 Policy: Allow Ping, Drop Web
access-list 120 permit icmp 192.168.10.64 0.0.0.63 192.168.11.0 0.0.0.255
access-list 120 deny tcp 192.168.10.64 0.0.0.63 192.168.11.0 0.0.0.255 eq 80
access-list 120 permit ip any any
! VLAN 30 Policy: Allow Web (Port 80), Drop Ping
access-list 130 permit tcp 192.168.10.128 0.0.0.63 192.168.11.0 0.0.0.255 eq 80
access-list 130 deny icmp 192.168.10.128 0.0.0.63 192.168.11.0 0.0.0.255
access-list 130 permit ip any any
interface gig0/0.20
ip access-group 120 in
interface gig0/0.30
ip access-group 130 in
The routers process these rules using Inbound/Outbound Inspection. Here is how the traffic is handled in detail:
| Traffic Type | Protocol/Port | VLAN 20 Result | VLAN 30 Result | Reasoning |
|---|---|---|---|---|
| Ping | ICMP | PASS | DROP | ACL 130 specifically denies ICMP to prevent network scanning. |
| Web Browsing | TCP 80 | DROP | PASS | ACL 120 blocks HTTP to restrict students from server access. |
| DNS Query | UDP 53 | PASS | PASS | Handled by permit ip any any at the end of the lists. |
1. Performance: By placing Extended ACLs Inbound on the Admin router ports, we drop unauthorized traffic before it ever crosses the Serial WAN links, saving bandwidth.
2. Accuracy: By using the Admin DNS Server to resolve www.student.com, we ensure that even when IPs are blocked, the name resolution still works, providing a professional "Server Not Found" or "Connection Timed Out" experience rather than a "DNS Failed" error.
show ip access-lists to see the "hit count" on each line. This confirms exactly which rule dropped the packet during a failed ping or web request.
The network security architecture is built on two layers of defense. First, a Standard ACL acts as a total blockade for specific high-level management devices. Second, Extended ACLs provide surgical control over department-specific permissions, allowing us to separate diagnostic tools from service access.
To ensure a balanced environment between the Administration and Student branches, the following rules have been applied:
www.student.com website but are blocked from sending Ping requests to maintain network stealth.This is applied to the Student Router on interface GigabitEthernet 0/0 (Outbound). This ensures that even if the IT PC traffic traverses the core network, it is dropped just before reaching the Student Switch.
! ACL 10: Standard Host Filter
access-list 10 deny host 192.168.10.3
access-list 10 permit any
interface GigabitEthernet0/0
ip access-group 10 out
These are applied to the Administration Router on the individual Sub-interfaces (Inbound). This stops unauthorized traffic at the "Source Gate," before it consumes any WAN bandwidth.
! VLAN 20 Extended Policy (Sub-interface G0/0.20)
access-list 120 permit icmp 192.168.10.64 0.0.0.63 192.168.11.0 0.0.0.255
access-list 120 deny tcp 192.168.10.64 0.0.0.63 192.168.11.0 0.0.0.255 eq 80
access-list 120 permit ip any any
! VLAN 30 Extended Policy (Sub-interface G0/0.30)
access-list 130 permit tcp 192.168.10.128 0.0.0.63 192.168.11.0 0.0.0.255 eq 80
access-list 130 deny icmp 192.168.10.128 0.0.0.63 192.168.11.0 0.0.0.255
access-list 130 permit ip any any
interface gig0/0.20
ip access-group 120 in
interface gig0/0.30
ip access-group 130 in
The "Pass or Block" behavior is determined by the Protocol Type and Port Number in the packet header:
1. Standard Filter Logic: When IT PC1 sends a packet, the Student Router checks the Source IP field. Because it matches the deny host 192.168.10.3 rule, the router drops the packet immediately, regardless of whether it is a Ping or a Web request.
2. Extended Filter Logic: When a VLAN 30 PC tries to Ping (ICMP), the Admin Router sees the ICMP protocol and matches it against the deny icmp rule in ACL 130, dropping it. However, if that same PC tries to browse (TCP Port 80), the router sees it matches the permit tcp ... eq 80 rule and forwards it through the network.
This section serves as a reference for live demonstrations. It outlines the specific commands used to verify the network's health and explains how to "read" the router's logic to your audience.
Where to run: Any Administration Switch (Core or Floor).
Switch# show vlan brief
How to interpret the output:
Where to run: Administration Router or Student Core Router.
Router# show ip route
How to interpret the output:
| Code | Protocol | Meaning for Presentation |
|---|---|---|
| C | Connected | This network is physically plugged into this router. |
| L | Local | This is the specific IP address assigned to the router's own interface. |
| O | OSPF | Learned from another router via Open Shortest Path First. Preferred due to AD 110. |
| R | RIP | Learned via Routing Information Protocol. Used as backup (AD 120). |
Where to run: Administration Router (after pinging the ISP 200.200.200.2).
Admin_Router# show ip nat translations
How to interpret the output:
Where to run: Admin Router (for Extended) or Student Router (for Standard).
Router# show access-lists
How to interpret the output:
deny line increases, you have mathematical proof that the router is actively dropping those packets.Where to run: A Student PC (Command Prompt).
C:\> ipconfig /all
How to interpret the output:
This section provides realistic CLI commands and expected outputs for every major component in the topology. Use these during your presentation to prove that routing, NAT, ACLs, DHCP, Email, DNS, and VLANs are fully operational.
Command input:
Switch> enable
Switch# show vlan brief
Expected output (explanation + live-style table):
Command input:
Admin_Router# show ip route
Expected output (OSPF routes highlighted):
Command input:
Admin_Router# show ip nat translations
Expected output (active mapping):
Command input (Admin Router):
Admin_Router# show access-lists
Expected output:
Command input (Student PC command prompt):
C:\> ipconfig /all
Expected output:
ip helper-address on Student Router works.
Command input:
PC> nslookup www.admin.com
Expected output:
Email client configuration (Desktop → Email):
Command input (Student Router):
Student_Router# show access-list 10
Expected output:
From VLAN20 (Admin) to Student Web Server (192.168.11.100):
From VLAN30 (SR) to Student Web Server (192.168.11.100):
VLAN20 (Admin) browsing http://www.student.com:
VLAN30 (SR) browsing http://www.student.com:
Command input (Admin PC):
C:\> tracert 200.200.200.2
Expected output:
Command input:
Admin_Router# show ip ospf neighbor
Expected output:
Command input:
Admin_Router# show ip rip database
Expected output:
On Admin Server (192.168.10.194) CLI:
| Component | Verification Command | Expected Indicator | Status |
|---|---|---|---|
| VLANs | show vlan brief | Fa0/3 in VLAN10 | ✅ PASS |
| OSPF | show ip route ospf | O 192.168.11.0 | ✅ PASS |
| RIP | show ip route rip | R 192.168.11.0 (backup) | ✅ PASS |
| NAT/PAT | show ip nat translations | Inside global mapping | ✅ PASS |
| Extended ACL | show access-list 120 | matches on deny tcp 80 | ✅ PASS |
| Standard ACL | show access-list 10 | matches on deny host | ✅ PASS |
| DHCP Relay | ipconfig /all (Student PC) | DHCP Server 192.168.10.194 | ✅ PASS |
| DNS | nslookup www.admin.com | Address 192.168.10.195 | ✅ PASS |
| Email (SMTP/POP3) | Email client test | Send/Receive success | ✅ PASS |
| HTTP Access | Browser to www.student.com | VLAN30 gets 200 OK | ✅ PASS |