| Section | VLAN | Subnet Address | Subnet Mask | Gateway |
|---|---|---|---|---|
| Users PC | 20 | 192.168.11.0 /26 | 255.255.255.192 | 192.168.11.1 |
| Client PC | 10 | 192.168.11.64 /27 | 255.255.255.224 | 192.168.11.65 |
| Server Section | 1 (Native) | 192.168.11.96 /28 | 255.255.255.240 | 192.168.11.110 |
| Admin PC | 30 | 192.168.11.112 /28 | 255.255.255.240 | 192.168.11.113 |
| Server Type | IP Address | Services Configuration |
|---|---|---|
| DNS Server | 192.168.11.99 | A-Record: www.b1.com -> 192.168.11.98A-Record: mail.b1.com -> 192.168.11.97 |
| HTTP/HTTPS | 192.168.11.98 | HTTP/HTTPS: ON. Edit index.html for web visibility. |
| Email + DHCP | 192.168.11.97 | Email: Domain: b1.com, Users: user1, client1, admin1.DHCP: Pools for VLAN 10, 20, 30. |
enable
conf t
hostname B1-Main-Router
interface GigabitEthernet0/0
no shut
exit
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.11.65 255.255.255.224
ip helper-address 192.168.11.97
exit
interface GigabitEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.11.1 255.255.255.192
ip helper-address 192.168.11.97
exit
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 192.168.11.113 255.255.255.240
ip helper-address 192.168.11.97
exit
interface GigabitEthernet0/0.100
encapsulation dot1Q 1
ip address 192.168.11.110 255.255.255.240
exit
enable
conf t
vlan 10
name Clients
vlan 20
name Users
vlan 30
name Admin
exit
interface fa0/1
switchport mode trunk
exit
interface range fa0/2 - 3
switchport mode trunk
exit
enable
conf t
vlan 10
vlan 20
vlan 30
exit
interface range fa0/1 - 3
switchport mode trunk
exit
interface fa0/4
switchport mode access
switchport access vlan 10
exit
interface fa0/5
switchport mode access
switchport access vlan 20
exit
interface fa0/6
switchport mode access
switchport access vlan 30
exit
enable
conf t
vlan 10
vlan 20
vlan 30
exit
interface range fa0/1 - 2
switchport mode trunk
exit
interface fa0/3
switchport mode access
switchport access vlan 10
exit
interface fa0/4
switchport mode access
switchport access vlan 20
exit
interface fa0/5
switchport mode access
switchport access vlan 30
exit
enable
conf t
interface fa0/1
switchport mode trunk
exit
interface range fa0/2 - 4
switchport mode access
switchport access vlan 1
exit
DHCP.www.b1.com.| Link Description | Subnet | Interface | IP Address |
|---|---|---|---|
| B1 to Connection-Router | 202.202.202.0/30 | Se0/3/0 | 202.202.202.1 |
| B1 to ISP-Router | 203.203.203.0/30 | Se0/3/1 | 203.203.203.1 |
| B2 to Connection-Router | 201.201.201.0/30 | Se0/3/1 | 201.201.201.2 |
| B2 to ISP-Router | 200.200.200.0/30 | Se0/3/0 | 200.200.200.2 |
conf t
int se0/3/0
ip address 202.202.202.1 255.255.255.252
no shut
exit
int se0/3/1
ip address 203.203.203.1 255.255.255.252
no shut
exit
enable
conf t
int se0/3/0
ip address 202.202.202.2 255.255.255.252
no shut
exit
int se0/3/1
ip address 201.201.201.1 255.255.255.252
no shut
exit
router ospf 1
network 202.202.202.0 0.0.0.3 area 0
network 201.201.201.0 0.0.0.3 area 0
exit
router rip
version 2
network 202.202.202.0
network 201.201.201.0
exit
enable
conf t
int se0/3/1
ip address 203.203.203.2 255.255.255.252
no shut
exit
int se0/3/0
ip address 200.200.200.1 255.255.255.252
no shut
exit
router ospf 1
network 203.203.203.0 0.0.0.3 area 0
network 200.200.200.0 0.0.0.3 area 0
exit
router rip
version 2
network 203.203.203.0
network 200.200.200.0
exit
Network: 192.168.10.0 /24 | Gateway: 192.168.10.1
enable
conf t
int gi0/0
ip address 192.168.10.1 255.255.255.0
ip helper-address 192.168.11.97
no shut
exit
int se0/3/1
ip address 201.201.201.2 255.255.255.252
no shut
exit
int se0/3/0
ip address 200.200.200.2 255.255.255.252
no shut
exit
router ospf 1
network 192.168.10.0 0.0.0.255 area 0
network 201.201.201.0 0.0.0.3 area 0
network 200.200.200.0 0.0.0.3 area 0
exit
router rip
version 2
network 192.168.10.0
network 201.201.201.0
network 200.200.200.0
exit
enable
conf t
vlan 1
exit
int fa0/1
switchport mode trunk
exit
int range fa0/2 - 10
switchport mode access
switchport access vlan 1
exit
Configured on all routers for redundancy between Building 1 and Building 2.
# Building 1 Router Dynamic Update
router ospf 1
network 192.168.11.0 0.0.0.255 area 0
network 202.202.202.0 0.0.0.3 area 0
network 203.203.203.0 0.0.0.3 area 0
exit
router rip
version 2
network 192.168.11.0
network 202.202.202.0
network 203.203.203.0
exit
| Service | Configuration / Target | Status |
|---|---|---|
| Web Browsing | URL: www.b1.com (Resolves to 192.168.11.98) |
✅ OPERATIONAL |
| DNS Lookup | Server: 192.168.11.99 (Cross-Router Query) |
✅ OPERATIONAL |
| Email (SMTP/POP3) | Server: 192.168.11.97 | Domain: b1.com |
✅ OPERATIONAL |
# Run these on Building 2 Router to verify path to servers
ping 192.168.11.97
ping 192.168.11.98
ping 192.168.11.99
# Run on SR PC Command Prompt
nslookup www.b1.com
Access Control Lists (ACLs) are used to filter network traffic based on a set of rules. In this topology, we used two specific types:
Ensure you are in Global Configuration Mode (conf t) before pasting this code. Comments (#) have been removed to prevent CLI errors.
enable
conf t
access-list 10 deny 192.168.11.64 0.0.0.31
access-list 10 permit any
access-list 120 permit icmp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255
access-list 120 deny tcp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255 eq 80
access-list 120 deny tcp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255 eq 443
access-list 120 deny icmp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255
access-list 120 permit tcp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255 eq 80
access-list 120 permit tcp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255 eq 443
access-list 120 permit ip any any
interface GigabitEthernet0/0.10
ip access-group 10 in
exit
interface GigabitEthernet0/0.20
ip access-group 120 in
exit
interface GigabitEthernet0/0.30
ip access-group 120 in
exit
do write
| Source Subnet | Destination | Test Type | Expected Result |
|---|---|---|---|
| VLAN 10 (11.64) | 192.168.10.0 | Ping/Browse | ❌ DENIED (Standard ACL) |
| VLAN 20 (11.0) | 192.168.10.0 | Ping (ICMP) | ✅ PERMITTED |
| VLAN 20 (11.0) | 192.168.10.0 | Web (HTTP) | ❌ DENIED |
| VLAN 30 (11.112) | 192.168.10.0 | Ping (ICMP) | ❌ DENIED |
| VLAN 30 (11.112) | 192.168.10.0 | Web (HTTP) | ✅ PERMITTED |
This section documents the end-to-end workflow of how the different branches and services interact across the entire network.
| Service Type | Logic & Location | Execution Process |
|---|---|---|
| DHCP Relay | Server in B1 (192.168.11.97) | Routers use ip helper-address to forward local broadcasts across the Serial core to the server. |
| Global DNS | Server in B1 (192.168.11.99) | Building 2 PCs query B1 via the OSPF path to resolve names like www.b1.com and www.b2.com. |
| Cross-Branch Web | Servers in B1 & B2 | HTTP traffic is permitted or denied based on the source VLAN using the Core Router's ACL 120. |
1. VLAN 10 (Clients): Blocked at the source gateway from entering the core toward Building 2.
2. VLAN 20 (Users): Allowed to PING Building 2 (ICMP permitted), but HTTP/HTTPS ports (80/443) are filtered out.
3. VLAN 30 (Admin): Forbidden from PINGING (ICMP denied) to maintain stealth, but allowed full Web Access to the Building 2 Server.
| Verification Step | Command / Action | Expected Result |
|---|---|---|
| Routing Table | show ip route |
Routes marked with 'O' and 'R' for both 192.168.10.0 and 192.168.11.0. |
| DHCP Success | ipconfig /all (SR PC) |
IP: 192.168.10.x | Gateway: 192.168.10.1 | DNS: 192.168.11.99. |
| DNS Resolution | Browse www.b2.com |
Successful page load from the Building 2 Local Server. |
| ACL Interception | VLAN 30 Ping B2 | "Destination host unreachable" or "Packet denied by ACL". |
| Email Sync | Email Client App | Successful SMTP send and POP3 receive between sr1@b1.com and admin1@b1.com. |
This explains the process of a PC in Building 2 (SR) accessing a Web Server in Building 1, and vice versa.
www.b1.com in the browser.PERMITTED. If in VLAN 20, it is DENIED.| Setting | Value | Reason |
|---|---|---|
| IP Address | 192.168.10.250 | Static IP for reliability. |
| Subnet Mask | 255.255.255.0 | Standard Class C. |
| Default Gateway | 192.168.10.1 | To reach Building 1. |
| DNS Server | 192.168.11.99 | To resolve global names. |
| HTTP Service | ON | Enables Port 80 (Browsing). |
| HTTPS Service | ON | Enables Port 443 (Secure Browsing). |
To simulate real-world internet connectivity, NAT Overload is configured on the edge routers. Internal private IPs are translated to Public Serial IPs when communicating with the ISP.
| Internal Subnet | Public Interface (NAT Outside) | Public IP Mapping |
|---|---|---|
| 192.168.11.0 (B1 VLANs) | Serial 0/3/1 | 203.203.203.1 |
| 192.168.10.0 (B2 SR) | Serial 0/3/0 | 200.200.200.2 |
# Check active translations while pinging ISP
show ip nat translations
# Check NAT statistics
show ip nat statistics
# Clear translations if needed
clear ip nat translation *