Project: Building 1 VLSM Setup (Router-on-a-Stick with DHCP Relay)
| Subnet/VLAN | Network ID | Subnet Mask | Gateway (Router) | Usable Range |
|---|---|---|---|---|
| VLAN 10 (Students) | 192.168.10.32/27 | 255.255.255.224 | 192.168.10.33 | .34 - .62 |
| VLAN 20 (Teachers) | 192.168.10.64/27 | 255.255.255.224 | 192.168.10.65 | .66 - .94 |
| VLAN 30 (IT-Staff) | 192.168.10.96/28 | 255.255.255.240 | 192.168.10.97 | .98 - .110 |
| Server Subnet | 192.168.10.112/28 | 255.255.255.240 | 192.168.10.113 | .114 - .126 |
Configures sub-interfaces and sets up the DHCP Relay (Helper Address).
enable
conf t
int gi0/0
no shut
exit
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.33 255.255.255.224
ip helper-address 192.168.10.114
exit
interface GigabitEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.10.65 255.255.255.224
ip helper-address 192.168.10.114
exit
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 192.168.10.97 255.255.255.240
ip helper-address 192.168.10.114
exit
interface GigabitEthernet0/0.100
encapsulation dot1Q 1
ip address 192.168.10.113 255.255.255.240
exit
do write
vlan 10
vlan 20
vlan 30
exit
int range fa0/1 - 3
switchport mode trunk
exit
int fa0/4
sw acc vlan 10
int fa0/5
sw acc vlan 20
int fa0/6
sw acc vlan 30
vlan 10
vlan 20
vlan 30
exit
int fa0/1
switchport mode trunk
exit
int fa0/2
sw acc vlan 10
int fa0/3
sw acc vlan 20
int fa0/4
sw acc vlan 30
| Pool Name | Gateway | DNS Server | Start IP | Subnet Mask |
|---|---|---|---|---|
| Students | 192.168.10.33 | 192.168.10.116 | 192.168.10.34 | 255.255.255.224 |
| Teachers | 192.168.10.65 | 192.168.10.116 | 192.168.10.66 | 255.255.255.224 |
| IT-Staff | 192.168.10.97 | 192.168.10.116 | 192.168.10.98 | 255.255.255.240 |
This section documents the configuration for the servers in the 192.168.10.112/28 subnet.
| Domain Name | Record Type | Mapped IP Address |
|---|---|---|
| puc.com | A Record | 192.168.10.115 (Web Server) |
| mail.puc.com | A Record | 192.168.10.114 (Email Server) |
<h1>Welcome to Premier University Chittagong</h1>
Service Status: SMTP (ON), POP3 (ON) | Domain: puc.com
| User | Password | PC Assignment |
|---|---|---|
| student1 | 123 | VLAN 10 Student PC |
| teacher1 | 123 | VLAN 20 Teacher PC |
| itstaff1 | 123 | VLAN 30 IT PC |
192.168.10.115 from a PC to confirm connectivity.puc.com to verify DNS and HTTP.student1@puc.com to teacher1@puc.com.This section documents the IP assignments, NAT rules, and dual-protocol (OSPF & RIP) routing for the network.
! --- NAT Access Control List ---
access-list 100 deny ip 192.168.10.0 0.0.0.255 192.168.11.0 0.0.0.255
access-list 100 permit ip 192.168.10.0 0.0.0.255 any
enable
conf t
! --- Interface Setup ---
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.33 255.255.255.224
ip nat inside
exit
interface GigabitEthernet0/0.20
encapsulation dot1Q 20
ip address 192.168.10.65 255.255.255.224
ip nat inside
exit
interface GigabitEthernet0/0.30
encapsulation dot1Q 30
ip address 192.168.10.97 255.255.255.240
ip nat inside
exit
interface GigabitEthernet0/0.100
encapsulation dot1Q 1
ip address 192.168.10.113 255.255.255.240
ip nat inside
exit
interface Serial0/3/0
description Link_to_Building_2
ip address 203.203.203.1 255.255.255.252
no shut
exit
interface Serial0/3/1
description Link_to_ISP_2
ip address 200.200.200.1 255.255.255.252
ip nat outside
no shut
exit
! --- NAT Translation ---
ip nat inside source list 100 interface Serial0/3/1 overload
! --- Routing Protocols ---
router rip
version 2
network 192.168.10.0
network 203.203.203.0
network 200.200.200.0
no auto-summary
exit
router ospf 1
network 192.168.10.0 0.0.0.255 area 0
network 203.203.203.0 0.0.0.3 area 0
network 200.200.200.0 0.0.0.3 area 0
exit
! --- NAT Access Control List ---
access-list 100 deny ip 192.168.11.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 100 permit ip 192.168.11.0 0.0.0.255 any
enable
conf t
interface GigabitEthernet0/0
ip address 192.168.11.1 255.255.255.0
ip nat inside
no shut
exit
interface Serial0/3/1
description Link_to_Building_1
ip address 203.203.203.2 255.255.255.252
no shut
exit
interface Serial0/3/0
description Link_to_ISP_1
ip address 202.202.202.1 255.255.255.252
ip nat outside
no shut
exit
! --- NAT Translation ---
ip nat inside source list 100 interface Serial0/3/0 overload
! --- Routing Protocols ---
router rip
version 2
network 192.168.11.0
network 203.203.203.0
network 202.202.202.0
no auto-summary
exit
router ospf 1
network 192.168.11.0 0.0.0.255 area 0
network 203.203.203.0 0.0.0.3 area 0
network 202.202.202.0 0.0.0.3 area 0
exit
# ISP 1 Configuration
enable
conf t
interface Serial0/3/0
ip address 201.201.201.1 255.255.255.252
no shut
exit
interface Serial0/3/1
ip address 202.202.202.2 255.255.255.252
no shut
exit
router rip
version 2
network 201.201.201.0
network 202.202.202.0
exit
router ospf 1
network 201.201.201.0 0.0.0.3 area 0
network 202.202.202.0 0.0.0.3 area 0
exit
# ISP 2 Configuration
enable
conf t
interface Serial0/3/0
ip address 201.201.201.2 255.255.255.252
no shut
exit
interface Serial0/3/1
ip address 200.200.200.2 255.255.255.252
no shut
exit
router rip
version 2
network 201.201.201.0
network 200.200.200.0
exit
router ospf 1
network 201.201.201.0 0.0.0.3 area 0
network 200.200.200.0 0.0.0.3 area 0
exit
| Protocol | Status | Subnets Covered |
|---|---|---|
| OSPF | Primary (AD 110) | VLANs, Inter-building, ISP Public Core, NAT interfaces |
| RIPv2 | Backup (AD 120) | Full network propagation for redundancy |
This section explains how Building 2 PCs receive IP addresses automatically from the Building 1 Server and how the local Web/DNS services are configured.
enable
conf t
interface GigabitEthernet0/0
description Local_Network_B2
ip helper-address 192.168.10.114
exit
do write
| Service Type | IP Address | Subnet Mask | Default Gateway |
|---|---|---|---|
| Web/Email/DNS | 192.168.11.13 | 255.255.255.0 | 192.168.11.1 |
These rules enforce security policies between Building 1 and Building 2, differentiating between Ping (ICMP) and Web Browsing (HTTP).
enable
conf t
ip access-list extended B1_VLAN_POLICIES
! --- VLAN 10 Logic: Permit Ping, Deny Web ---
permit icmp 192.168.10.32 0.0.0.31 192.168.11.0 0.0.0.255
deny tcp 192.168.10.32 0.0.0.31 192.168.11.0 0.0.0.255 eq 80
deny tcp 192.168.10.32 0.0.0.31 192.168.11.0 0.0.0.255 eq 443
! --- VLAN 20 Logic: Permit Web, Deny Ping ---
permit tcp 192.168.10.64 0.0.0.31 192.168.11.0 0.0.0.255 eq 80
permit tcp 192.168.10.64 0.0.0.31 192.168.11.0 0.0.0.255 eq 443
deny icmp 192.168.10.64 0.0.0.31 192.168.11.0 0.0.0.255
! --- Global Permissions (Allow Email, DNS, and Internet) ---
permit tcp any any eq 25
permit tcp any any eq 110
permit ip any any
exit
! --- Apply to Sub-Interfaces ---
interface GigabitEthernet0/0.10
ip access-group B1_VLAN_POLICIES in
exit
interface GigabitEthernet0/0.20
ip access-group B1_VLAN_POLICIES in
exit
interface GigabitEthernet0/0.30
ip access-group B1_VLAN_POLICIES in
exit
This section links the application services (DNS, Email, Web) across the entire network.
| Domain Name | Record Type | Target IP Address |
|---|---|---|
| www.b2web.com | A Record | 192.168.11.13 (B2 Server) |
| puc.com | A Record | 192.168.10.115 (B1 Server) |
| Test Type | From | Target IP/URL | Expected Result |
|---|---|---|---|
| Connectivity | VLAN 10 PC | 192.168.11.13 | Success: Ping Reply |
| Security | VLAN 10 PC | www.b2web.com | Success: Request Timeout (Blocked) |
| Browsing | VLAN 20 PC | www.b2web.com | Success: Web Page Loads |
| Security | VLAN 20 PC | 192.168.11.13 | Success: Destination Unreachable (Blocked) |
This section provides realistic CLI commands and expected outputs for every major component in the topology. Use these during your presentation to prove that routing, NAT, ACLs, DHCP, Email, DNS, VLANs, and cross-building services are fully operational.
Command input:
Switch> enable
Switch# show vlan brief
Expected output (explanation + live-style table):
Command input:
B1_Router# show ip route
Expected output (OSPF routes highlighted):
Command input:
B1_Router# show ip nat translations
Expected output (active mapping):
Command input (Building 1 Router):
B1_Router# show access-lists
Expected output:
Command input (Building 2 PC command prompt):
C:\> ipconfig /all
Expected output:
ip helper-address on Building 2 Router works across the serial link.
Command input:
PC> nslookup puc.com
Expected output:
Cross-building DNS test:
PC> nslookup www.b2web.com
Email client configuration (Desktop → Email):
From VLAN10 (Students) to Building 2 Server (192.168.11.13):
From VLAN20 (Teachers) to Building 2 Server (192.168.11.13):
VLAN10 (Students) browsing http://www.b2web.com:
VLAN20 (Teachers) browsing http://www.b2web.com:
VLAN20 browsing https://www.b2web.com (HTTPS):
Command input:
B1_Router# show ip ospf neighbor
Expected output:
Command input:
B1_Router# show ip rip database
Expected output:
Command input (Building 1 PC):
C:\> tracert 192.168.11.13
Expected output:
On Building 1 Server (192.168.10.114) CLI:
On Building 2 Server (192.168.11.13) CLI:
Command input (Building 1 Router):
B1_Router# show access-list 100
Expected output (NAT ACL):
| Component | Verification Command | Expected Indicator | Status |
|---|---|---|---|
| VLANs | show vlan brief | Fa0/4 in VLAN10, Fa0/5 in VLAN20 | ✅ PASS |
| OSPF | show ip route ospf | O 192.168.11.0/24 | ✅ PASS |
| RIP | show ip route rip | R 192.168.11.0/24 (backup) | ✅ PASS |
| NAT/PAT | show ip nat translations | Inside global mapping | ✅ PASS |
| Extended ACL (VLAN10) | show access-list B1_VLAN_POLICIES | matches on deny tcp 80 | ✅ PASS |
| Extended ACL (VLAN20) | show access-list B1_VLAN_POLICIES | matches on deny icmp | ✅ PASS |
| DHCP Relay | ipconfig /all (B2 PC) | DHCP Server 192.168.10.114 | ✅ PASS |
| DNS (Local) | nslookup puc.com | Address 192.168.10.115 | ✅ PASS |
| DNS (Cross-building) | nslookup www.b2web.com | Address 192.168.11.13 | ✅ PASS |
| Email (SMTP/POP3) | Email client test | Send/Receive success | ✅ PASS |
| HTTP Access (VLAN20) | Browser to www.b2web.com | 200 OK | ✅ PASS |
| HTTP Block (VLAN10) | Browser to www.b2web.com | Connection refused | ✅ PASS |
| ICMP (VLAN10) | ping 192.168.11.13 | Reply received | ✅ PASS |
| ICMP Block (VLAN20) | ping 192.168.11.13 | Request timed out | ✅ PASS |
| OSPF Neighbors | show ip ospf neighbor | State FULL | ✅ PASS |