top of page

Networking Project

Introduction

In this assignment, using my understanding from my network security module, I applied a variety of Cisco configuration commands to design and implement a secure network infrastructure.

​

The diagram below shows the network topography.

Thought Process

To design a secure network infrastructure, I had to first assign IP addresses to the necessary device interfaces. In this assignment, I used equal IP address ranges for each sub-network.

 

After assigning the IP addresses, I would need to understand the security policies of the organisation in order to implement the correct security policies on the switches and firewalls in the various subnets.

​

From there, I could begin implementing my solution using a wide range of commands available in Cisco. 

​

The final step of the implementation process was to test the configurations by performing pings on each machines to ensure the correct security policies were configured.

IP Addressing Table

The table below is a summary of the IP addresses configured on the different machines.

Summary of Configurations

The following is a list of the security solutions I have implemented in my assignment.

​

(1) Administrator accounts

(2) Enable Passwords

(3) VTY Connections

(4) Disable Console and Auxiliary Connections

(5) Encrypt all passwords when displayed

(6) Network Time Protocol (NTP)

(7) Open Shortest Path First (OSPF)

(8) Firewall 

(9) Port Security

(10) Router Access Control Lists (ACL)

Key Takeaways from this Project

While many of the Cisco Network Security concepts were taught during the module itself, I had to ensure that I fully understood the purpose of each solution so that I could prioritise my configurations.

​

I am also grateful for the guidance that my lecturer, Mr Bala, had provided me with.

Networking Key Takeaway
bottom of page