Building 1: Topology Setup Guide

1. VLSM Subnetting (Network: 192.168.11.0)

Section VLAN Subnet Address Subnet Mask Gateway
Users PC20192.168.11.0 /26255.255.255.192192.168.11.1
Client PC10192.168.11.64 /27255.255.255.224192.168.11.65
Server Section1 (Native)192.168.11.96 /28255.255.255.240192.168.11.110
Admin PC30192.168.11.112 /28255.255.255.240192.168.11.113

2. Server Services Configuration

Server Type IP Address Services Configuration
DNS Server 192.168.11.99 A-Record: www.b1.com -> 192.168.11.98
A-Record: mail.b1.com -> 192.168.11.97
HTTP/HTTPS 192.168.11.98 HTTP/HTTPS: ON. Edit index.html for web visibility.
Email + DHCP 192.168.11.97 Email: Domain: b1.com, Users: user1, client1, admin1.
DHCP: Pools for VLAN 10, 20, 30.

3. Main Router CLI Configuration

enable
conf t
hostname B1-Main-Router

interface GigabitEthernet0/0
 no shut
exit

interface GigabitEthernet0/0.10
 encapsulation dot1Q 10
 ip address 192.168.11.65 255.255.255.224
 ip helper-address 192.168.11.97
exit

interface GigabitEthernet0/0.20
 encapsulation dot1Q 20
 ip address 192.168.11.1 255.255.255.192
 ip helper-address 192.168.11.97
exit

interface GigabitEthernet0/0.30
 encapsulation dot1Q 30
 ip address 192.168.11.113 255.255.255.240
 ip helper-address 192.168.11.97
exit

interface GigabitEthernet0/0.100
 encapsulation dot1Q 1
 ip address 192.168.11.110 255.255.255.240
exit
        

4. Switch CLI Configurations

Building 1 Main Switch

enable
conf t
vlan 10
 name Clients
vlan 20
 name Users
vlan 30
 name Admin
exit
interface fa0/1
 switchport mode trunk
exit
interface range fa0/2 - 3
 switchport mode trunk
exit
        

Floor 1 Switch

enable
conf t
vlan 10
vlan 20
vlan 30
exit
interface range fa0/1 - 3
 switchport mode trunk
exit
interface fa0/4
 switchport mode access
 switchport access vlan 10
exit
interface fa0/5
 switchport mode access
 switchport access vlan 20
exit
interface fa0/6
 switchport mode access
 switchport access vlan 30
exit
        

Floor 2 Switch

enable
conf t
vlan 10
vlan 20
vlan 30
exit
interface range fa0/1 - 2
 switchport mode trunk
exit
interface fa0/3
 switchport mode access
 switchport access vlan 10
exit
interface fa0/4
 switchport mode access
 switchport access vlan 20
exit
interface fa0/5
 switchport mode access
 switchport access vlan 30
exit
        

Server Switch

enable
conf t
interface fa0/1
 switchport mode trunk
exit
interface range fa0/2 - 4
 switchport mode access
 switchport access vlan 1
exit
        

5. End-Device (PC) Configuration Summary

6. Core & ISP Serial Connections

Link Description Subnet Interface IP Address
B1 to Connection-Router202.202.202.0/30Se0/3/0202.202.202.1
B1 to ISP-Router203.203.203.0/30Se0/3/1203.203.203.1
B2 to Connection-Router201.201.201.0/30Se0/3/1201.201.201.2
B2 to ISP-Router200.200.200.0/30Se0/3/0200.200.200.2

Building 1 Core Router (Serial Update)

conf t
int se0/3/0
 ip address 202.202.202.1 255.255.255.252
 no shut
exit
int se0/3/1
 ip address 203.203.203.1 255.255.255.252
 no shut
exit
        

Connection Router (Full CLI)

enable
conf t
int se0/3/0
 ip address 202.202.202.2 255.255.255.252
 no shut
exit
int se0/3/1
 ip address 201.201.201.1 255.255.255.252
 no shut
exit
router ospf 1
 network 202.202.202.0 0.0.0.3 area 0
 network 201.201.201.0 0.0.0.3 area 0
exit
router rip
 version 2
 network 202.202.202.0
 network 201.201.201.0
exit
        

ISP Router (Full CLI)

enable
conf t
int se0/3/1
 ip address 203.203.203.2 255.255.255.252
 no shut
exit
int se0/3/0
 ip address 200.200.200.1 255.255.255.252
 no shut
exit
router ospf 1
 network 203.203.203.0 0.0.0.3 area 0
 network 200.200.200.0 0.0.0.3 area 0
exit
router rip
 version 2
 network 203.203.203.0
 network 200.200.200.0
exit
        

7. Building 2 Branch Topology (SR PCs)

Network: 192.168.10.0 /24 | Gateway: 192.168.10.1

Building 2 Router CLI

enable
conf t
int gi0/0
 ip address 192.168.10.1 255.255.255.0
 ip helper-address 192.168.11.97
 no shut
exit
int se0/3/1
 ip address 201.201.201.2 255.255.255.252
 no shut
exit
int se0/3/0
 ip address 200.200.200.2 255.255.255.252
 no shut
exit
router ospf 1
 network 192.168.10.0 0.0.0.255 area 0
 network 201.201.201.0 0.0.0.3 area 0
 network 200.200.200.0 0.0.0.3 area 0
exit
router rip
 version 2
 network 192.168.10.0
 network 201.201.201.0
 network 200.200.200.0
exit
        

Building 2 Switch (B2-SW) CLI

enable
conf t
vlan 1
exit
int fa0/1
 switchport mode trunk
exit
int range fa0/2 - 10
 switchport mode access
 switchport access vlan 1
exit
        

8. Dynamic Routing (OSPF & RIPv2)

Configured on all routers for redundancy between Building 1 and Building 2.

# Building 1 Router Dynamic Update
router ospf 1
 network 192.168.11.0 0.0.0.255 area 0
 network 202.202.202.0 0.0.0.3 area 0
 network 203.203.203.0 0.0.0.3 area 0
exit
router rip
 version 2
 network 192.168.11.0
 network 202.202.202.0
 network 203.203.203.0
exit
        

9. Application Layer Connectivity: Building 2 (SR)

Service Configuration / Target Status
Web Browsing URL: www.b1.com (Resolves to 192.168.11.98) ✅ OPERATIONAL
DNS Lookup Server: 192.168.11.99 (Cross-Router Query) ✅ OPERATIONAL
Email (SMTP/POP3) Server: 192.168.11.97 | Domain: b1.com ✅ OPERATIONAL

Verification Commands for Connectivity

# Run these on Building 2 Router to verify path to servers
ping 192.168.11.97
ping 192.168.11.98
ping 192.168.11.99

# Run on SR PC Command Prompt
nslookup www.b1.com
        

12. ACL Definitions and Logic

Access Control Lists (ACLs) are used to filter network traffic based on a set of rules. In this topology, we used two specific types:

13. Final Security CLI (Building 1 Core Router)

Ensure you are in Global Configuration Mode (conf t) before pasting this code. Comments (#) have been removed to prevent CLI errors.

enable
conf t

access-list 10 deny 192.168.11.64 0.0.0.31
access-list 10 permit any

access-list 120 permit icmp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255
access-list 120 deny tcp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255 eq 80
access-list 120 deny tcp 192.168.11.0 0.0.0.63 192.168.10.0 0.0.0.255 eq 443
access-list 120 deny icmp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255
access-list 120 permit tcp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255 eq 80
access-list 120 permit tcp 192.168.11.112 0.0.0.15 192.168.10.0 0.0.0.255 eq 443
access-list 120 permit ip any any

interface GigabitEthernet0/0.10
 ip access-group 10 in
exit

interface GigabitEthernet0/0.20
 ip access-group 120 in
exit

interface GigabitEthernet0/0.30
 ip access-group 120 in
exit

do write
        

14. ACL Verification Results

Source Subnet Destination Test Type Expected Result
VLAN 10 (11.64) 192.168.10.0 Ping/Browse ❌ DENIED (Standard ACL)
VLAN 20 (11.0) 192.168.10.0 Ping (ICMP) ✅ PERMITTED
VLAN 20 (11.0) 192.168.10.0 Web (HTTP) ❌ DENIED
VLAN 30 (11.112) 192.168.10.0 Ping (ICMP) ❌ DENIED
VLAN 30 (11.112) 192.168.10.0 Web (HTTP) ✅ PERMITTED

16. Full Topology Integrated Logic

This section documents the end-to-end workflow of how the different branches and services interact across the entire network.

A. The Routing Engine (Redundancy Logic)

B. Centralized Service Management

Service Type Logic & Location Execution Process
DHCP Relay Server in B1 (192.168.11.97) Routers use ip helper-address to forward local broadcasts across the Serial core to the server.
Global DNS Server in B1 (192.168.11.99) Building 2 PCs query B1 via the OSPF path to resolve names like www.b1.com and www.b2.com.
Cross-Branch Web Servers in B1 & B2 HTTP traffic is permitted or denied based on the source VLAN using the Core Router's ACL 120.

C. Security Enforcement (ACL Logic)

    1. VLAN 10 (Clients): Blocked at the source gateway from entering the core toward Building 2.
    2. VLAN 20 (Users): Allowed to PING Building 2 (ICMP permitted), but HTTP/HTTPS ports (80/443) are filtered out.
    3. VLAN 30 (Admin): Forbidden from PINGING (ICMP denied) to maintain stealth, but allowed full Web Access to the Building 2 Server.
    

D. Full Verification Script (CLI Proof)

Verification Step Command / Action Expected Result
Routing Table show ip route Routes marked with 'O' and 'R' for both 192.168.10.0 and 192.168.11.0.
DHCP Success ipconfig /all (SR PC) IP: 192.168.10.x | Gateway: 192.168.10.1 | DNS: 192.168.11.99.
DNS Resolution Browse www.b2.com Successful page load from the Building 2 Local Server.
ACL Interception VLAN 30 Ping B2 "Destination host unreachable" or "Packet denied by ACL".
Email Sync Email Client App Successful SMTP send and POP3 receive between sr1@b1.com and admin1@b1.com.
Project Summary: This topology demonstrates a high-availability enterprise network. It utilizes Layer 3 Redundancy (OSPF/RIP), Layer 2 Segmentation (VLANs), and Application Layer Integrity (Centralized DNS/Email) while maintaining Zero-Trust Security through granular ACL filtering at the network boundary.

17. Cross-Building Browsing Logic

This explains the process of a PC in Building 2 (SR) accessing a Web Server in Building 1, and vice versa.

Step-by-Step Request Path:

  1. PC Request: User types www.b1.com in the browser.
  2. DNS Resolution: PC asks DNS Server (192.168.11.99) for the IP. The request travels over OSPF serial links.
  3. HTTP Handshake: Once the PC gets the IP (192.168.11.98), it opens a TCP connection on Port 80.
  4. ACL Check: The Core Router checks ACL 120. If the PC is in VLAN 30, it is PERMITTED. If in VLAN 20, it is DENIED.

Building 2 Local Server Setup

Setting Value Reason
IP Address192.168.10.250Static IP for reliability.
Subnet Mask255.255.255.0Standard Class C.
Default Gateway192.168.10.1To reach Building 1.
DNS Server192.168.11.99To resolve global names.
HTTP ServiceONEnables Port 80 (Browsing).
HTTPS ServiceONEnables Port 443 (Secure Browsing).

18. NAT Overload (PAT) Configuration

To simulate real-world internet connectivity, NAT Overload is configured on the edge routers. Internal private IPs are translated to Public Serial IPs when communicating with the ISP.

Internal Subnet Public Interface (NAT Outside) Public IP Mapping
192.168.11.0 (B1 VLANs)Serial 0/3/1203.203.203.1
192.168.10.0 (B2 SR)Serial 0/3/0200.200.200.2

NAT Verification CLI

# Check active translations while pinging ISP
show ip nat translations

# Check NAT statistics
show ip nat statistics

# Clear translations if needed
clear ip nat translation *
        
Note: NAT happens after the routing decision. If OSPF/RIP finds the path to the ISP, the router then replaces the Source IP header with its own Serial IP before sending the packet to the ISP.