SlideShare une entreprise Scribd logo
1  sur  52
SECURE NETWORK DESIGN
WITH HIGH-AVAILABILITY
& VOIP
PRESENTED BY:
09BCE035 ARPAN PATEL
•

•

• BRIEFLY, THIS PROJECT AIMS TO SETUP AN END-TO-END SECURE DATA & VOIP NETWORK FOR A SMALL
ENTERPRISE, WITH FEATURES LIKE HIGH AVAILABILITY, ENHANCED PERFORMANCE, RESILIENCY, SECURITY FOR
WIRED & WIRELESS COMMUNICATION AND INCREASED PRODUCTIVITY.
•
THE MAJOR OBJECTIVE OF THIS PROJECT WAS A SMALL
ENTERPRISE NETWORK UPGRADE IN ORDER TO:
• IMPROVE AND CONSOLIDATE NETWORK PERFORMANCE ON SITE.
• PROVIDE INCREASED NETWORK CAPACITY.
• IMPROVE THE NETWORKS FAULT TOLERANCE CAPABILITY.
• PROVIDE FUTURE EXPANSION CAPABILITY.
• IMPROVE THE NETWORK SECURITY TO PREVENT UNAUTHORIZED ACCESS.
• IDENTIFY THE CRITICAL POINTS OF FAILURE IN THE EXISTING NETWORK
AND PROPOSE ON HOW TO ELIMINATE THEM.
SECURITY POLICY & REQUIREMENTS:
• WIRELESS USERS ARE DENIED ACCESS TO THE PRIVATE NETWORK. ONLY ACCESS TO INTERNET.
• NETWORK DEVICES MUST ONLY BE ACCESSED BY LOCAL SITE OR REMOTE SITE ADMIN WITH
AUTHORIZATION. ONLY PERMITTED DEPARTMENTS ARE ALLOWED TO COMMUNICATE WITH OTHER
DEPARTMENTS.
• NO OTHER HOST OTHER THAN THE COMPANY’S END DEVICES CAN BE ATTACHED TO THE NETWORK. IF
ATTACHED, ACCESS MUST BE DENIED IMMEDIATELY AND ADMIN SHOULD SOMEHOW BE NOTIFIED.
• TWO GUEST COMPUTERS SHOULD BE ACCOMMODATED IN ANY DEPARTMENT AND THEY ARE ONLY
PERMITTED TO COMMUNICATE WITH THE MARKETING DEPARTMENT AND LIMITED INTERNET ACCESS.
• EMPLOYEES CAN ONLY ACCESS THE ALLOWED SITES.
• HUMAN RESOURCES IS DENIED ACCESS TO ANY OTHER DEPARTMENT & IS JUST ALLOWED INTERNET
ACCESS.
FUTURE EXPANSION CAPABILITY:
• SERVERS CAN BE ADDED TO THE NETWORK AT ANY TIME.
• CLUSTERING OF THE SEVERS CAN ALSO BE POSSIBLE IF NECESSARY IN THE FUTURE AS THE EXISTING SERVER
HARDWARE CAN SUPPORT BEING IDENTICAL & SUPPORT SCSI.
• SYSTEM COMPONENTS ARE IDENTICAL AT ALL NODES FOR EASE OF MANAGEMENT & CONFIGURATIONS
ARE SIMILAR BETWEEN ALL UNITS AND CAN BE USED AS TEMPLATES FOR ADDING NODES.
• THE DISTRIBUTION SWITCH IS A 24-PORT GIGABIT SWITCH WITH 4 SFP FIBER MODULES
• HENCE EXPANDING THE NUMBER OF DEPARTMENTS OR EVEN THE NUMBER OF BRANCHES WILL ALWAYS BE
ACCEPTABLE AS ALL THE NECESSARY CONFIGURATIONS HAVE BEEN DONE.
ACCESS LAYER SWITCHES ALSO HAVE CAPABILITIES TO BEAR MORE USERS
AND ARE ALSO CONFIGURED FOR SUCH EXPANSION:
FUTURE TRANSITION TO IPV6
• FOR FUTURE PURPOSE WITH CERTAIN CONFIGURATIONS, THE FULL
ENTERPRISE NETWORK CAN BE IMPLEMENTED WITH AN IPV6 SETUP.
• DOCUMENTATION IS ALSO PROVIDED FOR A FULL IPV6 DEPLOYMENT.
NETWORK FEATURES
• WEB SERVER
• FTP SERVER
• DHCP SEVER
• DNS SEVER
• SYSLOG SERVER
• VOIP
VOIP
Steps:
1. Configure Call Manager ExpressTM on a 2811 router.
2. Use the various telephony devices
3. Setup dial peers
4. Connect CiscoTM IP phones on the network.
• ADDITIONALLY IN THE CURRENT NETWORK INFRASTRUCTURE IP PHONES HAVE ALSO BEEN CONFIGURED IN EACH
DEPARTMENT USING THE SAME ETHERNET NETWORK.
• BY RECONFIGURING THE NETWORK & MANAGEABLE SWITCHES VOICE IS NOW COMMUNICATED OVER THE
NETWORK.
VOIP CONFIGURATION:
• TASKS 1 : CONFIGURE INTERFACE FASTETHERNET 0/0 AND DHCP SERVER ON ROUTERA
(2811 ROUTER)
• TASK 2 : CONFIGURE THE CALL MANAGER EXPRESS TELEPHONY SERVICE ON ROUTERA
• TASK 3 : CONFIGURE A VOICE VLAN ON SWITCHA
• TASK 4 : CONFIGURE THE PHONE DIRECTORY FOR IP PHONE 1
• TASK 5 : VERIFY THE CONFIGURATION
CISCO IP PHONE CONFIGURATION COMMANDS:
#Configure the FA 0/0 interface#
RouterA>enable
RouterA#configure terminal
RouterA(config)#interface FastEthernet0/0
RouterA(config-if)#ip address 192.168.10.1 255.255.255.0
RouterA(config-if)#no shutdown
#The DHCP server is needed to provide an IP adress and the TFTP server location for each IP phone
connected to the network:
RouterA(config)#ip dhcp pool VOICE #Create DHCP pool named VOICE
RouterA(dhcp-config)#network 192.168.10.0 255.255.255.0 #DHCP network network 192.168.10 with /24 mask#
RouterA(dhcp-config)#default-router 192.168.10.1 #The default router IP address#
RouterA(dhcp-config)#option 150 ip 192.168.10.1 #Mandatory for voip configuration.
After the configuration, wait a moment and check that ‘IP Phone 1’ has received an IP address by checking
the phone screen until a configuration summary appears.
Apply the following configuration on SwitchA interfaces. This configuration will separate voice and data traffic in
different vlans on SwitchA. Data packets will be carried on the access vlan.
SwitchA(config)#interface range fa0/1 – 5 #Configure interface range#
SwitchA(config-if-range)#switchport mode access
SwitchA(config-if-range)#switchport voice vlan 1 #Define the VLAN on which voice packets will be handled#
CISCO IP PHONE CONFIGURATION COMMANDS (CONTINUED):
Configure the Call Manager Express telephony service on RouterA to enable voip on the network.
RouterA(config)#telephony-service #Configuring the router for telephony services#
RouterA(config-telephony)#max-dn 5 #Define the maximum number of directory numbers#
RouterA(config-telephony)#max-ephones 5 #Define the maximum number of phones#
RouterA(config-telephony)#ip source-address 192.168.10.1 port 2000 #IP Address source#
RouterA(config-telephony)#auto assign 1 to 6 #Automatically assigning ext numbers to buttons#
Although ‘IP Phone 1’ is already connected to SwitchA, it needs additional configuration before being
able to communicate. So to configure RouterA CME to assign a phone number to this IP phone:
RouterA(config)#ephone-dn 1 #Defining the first directory entry#
RouterA(config-ephone-dn)#number 999 #Assign the phone number to this entry#
Ensure that the IP Phone receives an IP Address and a the phone number 999 from RouterA
This can take a short while.
REMOTE SITE VOIP CONFIGURATION USING DIAL PEER:
SITE1 ROUTER SITE2 ROUTER:
dial-peer voice 47 voip
destination-pattern 1..
session target ipv4:18.18.18.2
dial-peer voice 47 voip
destination-pattern ...
session target ipv4:78.78.78.2
ADDITIONAL FEATURES WHICH INCREASE NETWORK
PERFORMANCE & CAPACITY:
• VTP PRUNING:
• WHEN VTP PRUNING IS ENABLED ON VTP SERVERS, ALL THE
CLIENTS IN THE VTP DOMAIN WILL AUTOMATICALLY ENABLE VTP
PRUNING. BY DEFAULT, VLANS 2 – 1001 ARE PRUNING
ELIGIBLE, BUT VLAN 1 CAN’T BE PRUNED BECAUSE IT’S AN
ADMINISTRATIVE VLAN.
• SPANNING-TREE PORTFAST VERY CAREFULLY ENABLED
ON ACCESS PORTS CONNECTED TO HOSTS ONLY
ESPECIALLY THE SERVERS SO UPTIME IS HIGH & NO
UNNECESSARY DELAY BY STP.
SW1#config t
SW1(config)#interface Fa0/1
SW1(config-if)#switchport trunk pruning vlan 3-4
NETWORK CONNECTIVITY TESTING PLAN:
Layer 1 Error Checklist Layer 2 Error Checklist
 Broken cables
 Disconnected cables
 Cables connected to the wrong ports
 Intermittent cable connections
 Cables incorrectly terminated
 Wrong cables used
 Cross-connects
 Rollovers
 Straight-through cables
 Transceiver problems
 DCE cable problems
 DTE cable problems
 Devices powered off
 Improperly configured serial interfaces
 Improperly configured Ethernet interfaces
 Wrong clock rate settings on serial interfaces
 Wrong encapsulation set on serial interfaces
 Faulty NIC
Layer 3 Error Checklist
 Wrong routing protocol enabled
 Incorrect network/IP addresses
 Incorrect subnet masks
 Incorrect interface addresses
 Incorrect DNS-to-IP bindings
 Wrong autonomous system number for EIGRP
STANDARD COMMAND LINE TOOLS USED TO TROUBLESHOOT
 STANDARD COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT HOST LEVEL PROBLEMS ARE:
 PING – CHECK CONNECTIVITY BETWEEN HOST AND OTHER NETWORK DEVICES
 TRACERT – CHECK PATH TO OTHER NETWORK DEVICES
 IPCONFIG – SEE IF HOST PROPERLY DETECTS CONFIGURATIONS ASSIGNED TO IT
 ARP -A – DISPLAYS THE IP-TO-PHYSICAL ADDRESS TRANSLATION TABLES
 STANDARD CISCO IOS COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT ROUTER LEVEL
PROBLEMS ARE:
 PING – CHECK CONNECTIVITY BETWEEN ROUTER AND OTHER NETWORK DEVICES
 TRACEROUTE - CHECK PATH TO OTHER NETWORK DEVICES
 SHOW ARP – SHOW THE IP/MAC ADDRESS USED
 SHOW IP ROUTE – SHOWS A ROUTER’S ROUTING TABLE
 SHOW INTERFACE/SHOW INTERFACE BRIEF – SHOWS EXISTING INTERFACE CONFIGURATIONS AND IF
ADMINISTRATIVELY UP OR DOWN
 SHOW RUN – SHOWS EXISTING OVERALL ALL CONFIGURATIONS
SECURE NETWORK DESIGN
WITH HIGH-AVAILABILITY
& VOIP
PRESENTED BY:
09BCE035 ARPAN PATEL
SITE-1:
IP ADDRESSING
SCHEME
SITE-2:
IP ADDRESSING
SCHEME
ETHER CHANNEL : CISCO’S IMPLEMENTATION OF PORT AGGREGATION
• PORT AGGREGATION: ALLOWS US TO TIE MULTIPLE PORTS TOGETHER INTO A SINGLE
LOGICAL INTERFACE.
• NOT ONLY DOES PORT AGGREGATION INCREASE THE BANDWIDTH OF A LINK, BUT IT
ALSO PROVIDES REDUNDANCY.
Benefits
1. Enhanced Performance.
2. Redundancy
3. Resiliency And Faster Convergence.
So once Again How did we
implement Ether Channel??
Switch(config)#interface range gigabitEthernet 0/1-2
Switch(config-if)#Switchport mode trunk
Switch(config-if)#Switchport nonnegotiable
Switch(config)#Channel-group 1 mode desirable
FIBER-UPLINK
• TO HAVE A FIBER BACKBONE IS THE WISEST DECISION IN ANY ENTERPRISE
NETWORK DESIGN.
• WE HAVE IT IN THE CORE BACKBONE WHICH CONNECTS THE CORE ROUTER TO
THE DISTRIBUTION SWITCH.
• ALSO THE SEVERS OF ALL 3 SITES ARE NOW CONNECTED WITH A GIGABIT FIBER
TO THE NETWORK.
Benefits
1. High Availability
2. High Response time.
3. Increased Reliability
REDUNDANT BACK-UP LINKS
BACKUP SERVERS INSTALLATION & CONFIGURATION:
INSTALLATION OF WINDOWS SEVER 2008
BackupSeverConfiguration…
BackupSeverConfiguration…
ACCESS-CONTROL LIST
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR
TWO PURPOSES ON NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC
SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
• ACCESS CONTROL LISTS WORKS IN A TOP DOWN
APPROACH
- A PERMIT STATEMENT IS USED TO ALLOW TRAFFIC
- A DENY STATEMENT IS USED TO BLOCK TRAFFIC.
 COMMANDS :
- ROUTER(CONFIG) #IP ACCESS - LIST EXTENDED <NAME>
- ROUTER(CONFIG-EXT-NACL) #PERMIT IP HOST <SOURCE
IP> HOST <DESTINATION IP>
SWITCH PORT SECURITY
• NO OTHER WORKSTATION CAN BE PLUGGED TO THE FASTETHERNET PORT.
• IF UNREGISTERED MAC PLUGGED IT WILL BE SHUTDOWN OR RESTRICTED.
Switch(config) #Interface fa 0/1
Switch(config) # Switchport port-security
Switch(config) # Switchport port-security mac-address sticky
REMOTE ACCESS &
REMOTE ACCESS SECURITY:
• REMOTE ACCESS: TELNET (PORT 23)
• SECURE REMOTE ACCESS:
SSH VERSION 2 (PORT 22)
 CONFIGURATION AS FOLLOWS:
Host identification (Using RSA-Keys)
Encryption (IDEA)
Authentication (RSA Challenge)
Router(config)# ip domain-name cisco.com
Router(config)# crypto key generate rsa
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
Router(config)#exit
*Mar 1 0:4:8.988: %SSH-5-ENABLED: SSH 1.99 has been enabled
Router(config)#ip ssh version 2
Router(config)# username cisco password cisco
Router(config)# line vty 0 4
Router(config-line)# login local
Router(config-line)# transport input ssh
Router(config)#ip ssh time-out 90
Router(config)#ip ssh authentication-retries 2
ACCESS LISTS ( ACL )
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON
NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
MAC FILTERING
• ONLY REGISTERED USERS CAN ACCESS THE WIRELESS NETWORK
RADIUS (REMOTE DIAL IN USER SERVICE)
• RADIUS IS A AAA PROTOCOL, SECURITY SYSTEM BASED ON AUTHENTICATION, AUTHORIZATION,
AND ACCOUNTING.
• CLIENT SERVER MODEL
• SHARED SECRET MUST BE SHARED BETWEEN CLIENT(ACCESS POINT) AND SERVER AND CLIENT MUST
BE CONFIGURED TO USE RADIUS SERVER TO GET SERVICE.
• RADIUS USES A CENTRALIZED SERVER THAT ALLOWS YOU TO DEFINE THE USERNAME AND
PASSWORD OF THE USERS BY WHICH THEY CAN LOGIN TO THEIR ACCOUNT BEFORE ACCESSING
THE NETWORK.
• RADIUS SERVER IS RESPONSIBLE FOR GETTING USER CONNECTION REQUESTS, AUTHENTICATING THE
USER AND THEN RETURNING ALL CONFIGURATION INFORMATION NECESSARY FOR THE CLIENT TO
DELIVER SERVICE TO THE USER.
• TRANSACTIONS BETWEEN CLIENT AND SERVER ARE AUTHENTICATED THROUGH THE USE OF A SHARED
KEY AND THIS KEY IS NEVER SENT OVER THE NETWORK.
• PASSWORD IS ENCRYPTED BEFORE SENDING IT OVER NETWORK USING WPA2
• HERE SECURITY IS FULLY DEPENDENT ON THE SEVER NOT THE ACCESS POINT, HENCE SECURITY
INCREASED.
THANK YOU…

Contenu connexe

Tendances

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewallskkkseld
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
 
project on OSPF
project on OSPFproject on OSPF
project on OSPFOm Prakash
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNADawood Aqlan
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamRaja Mazhar
 
CCNA Dynamic Routing
CCNA Dynamic RoutingCCNA Dynamic Routing
CCNA Dynamic RoutingNetworkel
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014TOM LIU
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2Waqas Ahmed Nawaz
 

Tendances (20)

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
project on OSPF
project on OSPFproject on OSPF
project on OSPF
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNA
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
 
CCNA Dynamic Routing
CCNA Dynamic RoutingCCNA Dynamic Routing
CCNA Dynamic Routing
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 

En vedette

Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityF-Secure Corporation
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALJohn Bernal
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
 
Network Critical
Network CriticalNetwork Critical
Network Criticalgigamon
 
New Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing PerformanceNew Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing PerformanceTCC Group
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise NetworkDan York
 
Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003Adrian Cockcroft
 
Cctv And Ip Surveillance
Cctv And Ip SurveillanceCctv And Ip Surveillance
Cctv And Ip Surveillancefaleepay
 
Mobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital BackboneMobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital BackboneAdeyemi Fowe
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstationsF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing projectvishal sharma
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreSerhad MAKBULOĞLU, MBA
 

En vedette (20)

Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
New Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing PerformanceNew Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing Performance
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003
 
Cctv And Ip Surveillance
Cctv And Ip SurveillanceCctv And Ip Surveillance
Cctv And Ip Surveillance
 
BBC - What is IPTV?
BBC - What is IPTV?BBC - What is IPTV?
BBC - What is IPTV?
 
Mobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital BackboneMobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital Backbone
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
ISP
ISPISP
ISP
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
 

Similaire à Secure Network Design with High-Availability & VoIP

Rail-net Indian railway internet
Rail-net Indian railway internetRail-net Indian railway internet
Rail-net Indian railway internetRahul Kumar
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxJean Carlos Cruz
 
69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phoneRayan Darine
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routingRamesh Thumburu
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataManageEngine, Zoho Corporation
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1DrayTek Corp.
 
Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad Hassan
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoCisco Russia
 
Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2suhaib ahmed
 

Similaire à Secure Network Design with High-Availability & VoIP (20)

OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Railnet
RailnetRailnet
Railnet
 
Rail-net Indian railway internet
Rail-net Indian railway internetRail-net Indian railway internet
Rail-net Indian railway internet
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's Backbone
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptx
 
69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone
 
CV-ROB
CV-ROBCV-ROB
CV-ROB
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routing
 
corporate network
corporate networkcorporate network
corporate network
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
 
A-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplaceA-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplace
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 

Plus de Arpan Patel

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)Arpan Patel
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Arpan Patel
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Arpan Patel
 

Plus de Arpan Patel (6)

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Codecs
CodecsCodecs
Codecs
 
Codecs
CodecsCodecs
Codecs
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Secure Network Design with High-Availability & VoIP

  • 1. SECURE NETWORK DESIGN WITH HIGH-AVAILABILITY & VOIP PRESENTED BY: 09BCE035 ARPAN PATEL
  • 2. •  •  • BRIEFLY, THIS PROJECT AIMS TO SETUP AN END-TO-END SECURE DATA & VOIP NETWORK FOR A SMALL ENTERPRISE, WITH FEATURES LIKE HIGH AVAILABILITY, ENHANCED PERFORMANCE, RESILIENCY, SECURITY FOR WIRED & WIRELESS COMMUNICATION AND INCREASED PRODUCTIVITY. •
  • 3. THE MAJOR OBJECTIVE OF THIS PROJECT WAS A SMALL ENTERPRISE NETWORK UPGRADE IN ORDER TO: • IMPROVE AND CONSOLIDATE NETWORK PERFORMANCE ON SITE. • PROVIDE INCREASED NETWORK CAPACITY. • IMPROVE THE NETWORKS FAULT TOLERANCE CAPABILITY. • PROVIDE FUTURE EXPANSION CAPABILITY. • IMPROVE THE NETWORK SECURITY TO PREVENT UNAUTHORIZED ACCESS. • IDENTIFY THE CRITICAL POINTS OF FAILURE IN THE EXISTING NETWORK AND PROPOSE ON HOW TO ELIMINATE THEM.
  • 4. SECURITY POLICY & REQUIREMENTS: • WIRELESS USERS ARE DENIED ACCESS TO THE PRIVATE NETWORK. ONLY ACCESS TO INTERNET. • NETWORK DEVICES MUST ONLY BE ACCESSED BY LOCAL SITE OR REMOTE SITE ADMIN WITH AUTHORIZATION. ONLY PERMITTED DEPARTMENTS ARE ALLOWED TO COMMUNICATE WITH OTHER DEPARTMENTS. • NO OTHER HOST OTHER THAN THE COMPANY’S END DEVICES CAN BE ATTACHED TO THE NETWORK. IF ATTACHED, ACCESS MUST BE DENIED IMMEDIATELY AND ADMIN SHOULD SOMEHOW BE NOTIFIED. • TWO GUEST COMPUTERS SHOULD BE ACCOMMODATED IN ANY DEPARTMENT AND THEY ARE ONLY PERMITTED TO COMMUNICATE WITH THE MARKETING DEPARTMENT AND LIMITED INTERNET ACCESS. • EMPLOYEES CAN ONLY ACCESS THE ALLOWED SITES. • HUMAN RESOURCES IS DENIED ACCESS TO ANY OTHER DEPARTMENT & IS JUST ALLOWED INTERNET ACCESS.
  • 5. FUTURE EXPANSION CAPABILITY: • SERVERS CAN BE ADDED TO THE NETWORK AT ANY TIME. • CLUSTERING OF THE SEVERS CAN ALSO BE POSSIBLE IF NECESSARY IN THE FUTURE AS THE EXISTING SERVER HARDWARE CAN SUPPORT BEING IDENTICAL & SUPPORT SCSI. • SYSTEM COMPONENTS ARE IDENTICAL AT ALL NODES FOR EASE OF MANAGEMENT & CONFIGURATIONS ARE SIMILAR BETWEEN ALL UNITS AND CAN BE USED AS TEMPLATES FOR ADDING NODES. • THE DISTRIBUTION SWITCH IS A 24-PORT GIGABIT SWITCH WITH 4 SFP FIBER MODULES • HENCE EXPANDING THE NUMBER OF DEPARTMENTS OR EVEN THE NUMBER OF BRANCHES WILL ALWAYS BE ACCEPTABLE AS ALL THE NECESSARY CONFIGURATIONS HAVE BEEN DONE.
  • 6. ACCESS LAYER SWITCHES ALSO HAVE CAPABILITIES TO BEAR MORE USERS AND ARE ALSO CONFIGURED FOR SUCH EXPANSION:
  • 7. FUTURE TRANSITION TO IPV6 • FOR FUTURE PURPOSE WITH CERTAIN CONFIGURATIONS, THE FULL ENTERPRISE NETWORK CAN BE IMPLEMENTED WITH AN IPV6 SETUP. • DOCUMENTATION IS ALSO PROVIDED FOR A FULL IPV6 DEPLOYMENT.
  • 8. NETWORK FEATURES • WEB SERVER • FTP SERVER • DHCP SEVER • DNS SEVER • SYSLOG SERVER • VOIP
  • 9. VOIP Steps: 1. Configure Call Manager ExpressTM on a 2811 router. 2. Use the various telephony devices 3. Setup dial peers 4. Connect CiscoTM IP phones on the network. • ADDITIONALLY IN THE CURRENT NETWORK INFRASTRUCTURE IP PHONES HAVE ALSO BEEN CONFIGURED IN EACH DEPARTMENT USING THE SAME ETHERNET NETWORK. • BY RECONFIGURING THE NETWORK & MANAGEABLE SWITCHES VOICE IS NOW COMMUNICATED OVER THE NETWORK.
  • 10. VOIP CONFIGURATION: • TASKS 1 : CONFIGURE INTERFACE FASTETHERNET 0/0 AND DHCP SERVER ON ROUTERA (2811 ROUTER) • TASK 2 : CONFIGURE THE CALL MANAGER EXPRESS TELEPHONY SERVICE ON ROUTERA • TASK 3 : CONFIGURE A VOICE VLAN ON SWITCHA • TASK 4 : CONFIGURE THE PHONE DIRECTORY FOR IP PHONE 1 • TASK 5 : VERIFY THE CONFIGURATION
  • 11. CISCO IP PHONE CONFIGURATION COMMANDS: #Configure the FA 0/0 interface# RouterA>enable RouterA#configure terminal RouterA(config)#interface FastEthernet0/0 RouterA(config-if)#ip address 192.168.10.1 255.255.255.0 RouterA(config-if)#no shutdown #The DHCP server is needed to provide an IP adress and the TFTP server location for each IP phone connected to the network: RouterA(config)#ip dhcp pool VOICE #Create DHCP pool named VOICE RouterA(dhcp-config)#network 192.168.10.0 255.255.255.0 #DHCP network network 192.168.10 with /24 mask# RouterA(dhcp-config)#default-router 192.168.10.1 #The default router IP address# RouterA(dhcp-config)#option 150 ip 192.168.10.1 #Mandatory for voip configuration. After the configuration, wait a moment and check that ‘IP Phone 1’ has received an IP address by checking the phone screen until a configuration summary appears. Apply the following configuration on SwitchA interfaces. This configuration will separate voice and data traffic in different vlans on SwitchA. Data packets will be carried on the access vlan. SwitchA(config)#interface range fa0/1 – 5 #Configure interface range# SwitchA(config-if-range)#switchport mode access SwitchA(config-if-range)#switchport voice vlan 1 #Define the VLAN on which voice packets will be handled#
  • 12. CISCO IP PHONE CONFIGURATION COMMANDS (CONTINUED): Configure the Call Manager Express telephony service on RouterA to enable voip on the network. RouterA(config)#telephony-service #Configuring the router for telephony services# RouterA(config-telephony)#max-dn 5 #Define the maximum number of directory numbers# RouterA(config-telephony)#max-ephones 5 #Define the maximum number of phones# RouterA(config-telephony)#ip source-address 192.168.10.1 port 2000 #IP Address source# RouterA(config-telephony)#auto assign 1 to 6 #Automatically assigning ext numbers to buttons# Although ‘IP Phone 1’ is already connected to SwitchA, it needs additional configuration before being able to communicate. So to configure RouterA CME to assign a phone number to this IP phone: RouterA(config)#ephone-dn 1 #Defining the first directory entry# RouterA(config-ephone-dn)#number 999 #Assign the phone number to this entry# Ensure that the IP Phone receives an IP Address and a the phone number 999 from RouterA This can take a short while.
  • 13. REMOTE SITE VOIP CONFIGURATION USING DIAL PEER: SITE1 ROUTER SITE2 ROUTER: dial-peer voice 47 voip destination-pattern 1.. session target ipv4:18.18.18.2 dial-peer voice 47 voip destination-pattern ... session target ipv4:78.78.78.2
  • 14. ADDITIONAL FEATURES WHICH INCREASE NETWORK PERFORMANCE & CAPACITY: • VTP PRUNING: • WHEN VTP PRUNING IS ENABLED ON VTP SERVERS, ALL THE CLIENTS IN THE VTP DOMAIN WILL AUTOMATICALLY ENABLE VTP PRUNING. BY DEFAULT, VLANS 2 – 1001 ARE PRUNING ELIGIBLE, BUT VLAN 1 CAN’T BE PRUNED BECAUSE IT’S AN ADMINISTRATIVE VLAN. • SPANNING-TREE PORTFAST VERY CAREFULLY ENABLED ON ACCESS PORTS CONNECTED TO HOSTS ONLY ESPECIALLY THE SERVERS SO UPTIME IS HIGH & NO UNNECESSARY DELAY BY STP. SW1#config t SW1(config)#interface Fa0/1 SW1(config-if)#switchport trunk pruning vlan 3-4
  • 15. NETWORK CONNECTIVITY TESTING PLAN: Layer 1 Error Checklist Layer 2 Error Checklist  Broken cables  Disconnected cables  Cables connected to the wrong ports  Intermittent cable connections  Cables incorrectly terminated  Wrong cables used  Cross-connects  Rollovers  Straight-through cables  Transceiver problems  DCE cable problems  DTE cable problems  Devices powered off  Improperly configured serial interfaces  Improperly configured Ethernet interfaces  Wrong clock rate settings on serial interfaces  Wrong encapsulation set on serial interfaces  Faulty NIC Layer 3 Error Checklist  Wrong routing protocol enabled  Incorrect network/IP addresses  Incorrect subnet masks  Incorrect interface addresses  Incorrect DNS-to-IP bindings  Wrong autonomous system number for EIGRP
  • 16. STANDARD COMMAND LINE TOOLS USED TO TROUBLESHOOT  STANDARD COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT HOST LEVEL PROBLEMS ARE:  PING – CHECK CONNECTIVITY BETWEEN HOST AND OTHER NETWORK DEVICES  TRACERT – CHECK PATH TO OTHER NETWORK DEVICES  IPCONFIG – SEE IF HOST PROPERLY DETECTS CONFIGURATIONS ASSIGNED TO IT  ARP -A – DISPLAYS THE IP-TO-PHYSICAL ADDRESS TRANSLATION TABLES  STANDARD CISCO IOS COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT ROUTER LEVEL PROBLEMS ARE:  PING – CHECK CONNECTIVITY BETWEEN ROUTER AND OTHER NETWORK DEVICES  TRACEROUTE - CHECK PATH TO OTHER NETWORK DEVICES  SHOW ARP – SHOW THE IP/MAC ADDRESS USED  SHOW IP ROUTE – SHOWS A ROUTER’S ROUTING TABLE  SHOW INTERFACE/SHOW INTERFACE BRIEF – SHOWS EXISTING INTERFACE CONFIGURATIONS AND IF ADMINISTRATIVELY UP OR DOWN  SHOW RUN – SHOWS EXISTING OVERALL ALL CONFIGURATIONS
  • 17.
  • 18. SECURE NETWORK DESIGN WITH HIGH-AVAILABILITY & VOIP PRESENTED BY: 09BCE035 ARPAN PATEL
  • 19.
  • 20.
  • 21.
  • 24.
  • 25. ETHER CHANNEL : CISCO’S IMPLEMENTATION OF PORT AGGREGATION • PORT AGGREGATION: ALLOWS US TO TIE MULTIPLE PORTS TOGETHER INTO A SINGLE LOGICAL INTERFACE. • NOT ONLY DOES PORT AGGREGATION INCREASE THE BANDWIDTH OF A LINK, BUT IT ALSO PROVIDES REDUNDANCY. Benefits 1. Enhanced Performance. 2. Redundancy 3. Resiliency And Faster Convergence. So once Again How did we implement Ether Channel?? Switch(config)#interface range gigabitEthernet 0/1-2 Switch(config-if)#Switchport mode trunk Switch(config-if)#Switchport nonnegotiable Switch(config)#Channel-group 1 mode desirable
  • 26.
  • 27. FIBER-UPLINK • TO HAVE A FIBER BACKBONE IS THE WISEST DECISION IN ANY ENTERPRISE NETWORK DESIGN. • WE HAVE IT IN THE CORE BACKBONE WHICH CONNECTS THE CORE ROUTER TO THE DISTRIBUTION SWITCH. • ALSO THE SEVERS OF ALL 3 SITES ARE NOW CONNECTED WITH A GIGABIT FIBER TO THE NETWORK. Benefits 1. High Availability 2. High Response time. 3. Increased Reliability
  • 28.
  • 29.
  • 30.
  • 32.
  • 33. BACKUP SERVERS INSTALLATION & CONFIGURATION:
  • 37.
  • 38.
  • 39.
  • 40. ACCESS-CONTROL LIST ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON NETWORKING DEVICES: • TO FILTER TRAFFIC. • TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS. TYPES OF ACCESS LISTS: • NUMBERED • NAMED • EXTENDED • STANDARD • ACCESS CONTROL LISTS WORKS IN A TOP DOWN APPROACH - A PERMIT STATEMENT IS USED TO ALLOW TRAFFIC - A DENY STATEMENT IS USED TO BLOCK TRAFFIC.  COMMANDS : - ROUTER(CONFIG) #IP ACCESS - LIST EXTENDED <NAME> - ROUTER(CONFIG-EXT-NACL) #PERMIT IP HOST <SOURCE IP> HOST <DESTINATION IP>
  • 41.
  • 42. SWITCH PORT SECURITY • NO OTHER WORKSTATION CAN BE PLUGGED TO THE FASTETHERNET PORT. • IF UNREGISTERED MAC PLUGGED IT WILL BE SHUTDOWN OR RESTRICTED. Switch(config) #Interface fa 0/1 Switch(config) # Switchport port-security Switch(config) # Switchport port-security mac-address sticky
  • 43.
  • 44. REMOTE ACCESS & REMOTE ACCESS SECURITY: • REMOTE ACCESS: TELNET (PORT 23) • SECURE REMOTE ACCESS: SSH VERSION 2 (PORT 22)  CONFIGURATION AS FOLLOWS: Host identification (Using RSA-Keys) Encryption (IDEA) Authentication (RSA Challenge) Router(config)# ip domain-name cisco.com Router(config)# crypto key generate rsa How many bits in the modulus [512]: 1024 % Generating 1024 bit RSA keys, keys will be non-exportable...[OK] Router(config)#exit *Mar 1 0:4:8.988: %SSH-5-ENABLED: SSH 1.99 has been enabled Router(config)#ip ssh version 2 Router(config)# username cisco password cisco Router(config)# line vty 0 4 Router(config-line)# login local Router(config-line)# transport input ssh Router(config)#ip ssh time-out 90 Router(config)#ip ssh authentication-retries 2
  • 45.
  • 46.
  • 47. ACCESS LISTS ( ACL ) ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON NETWORKING DEVICES: • TO FILTER TRAFFIC. • TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS. TYPES OF ACCESS LISTS: • NUMBERED • NAMED • EXTENDED • STANDARD
  • 48.
  • 49. MAC FILTERING • ONLY REGISTERED USERS CAN ACCESS THE WIRELESS NETWORK
  • 50.
  • 51. RADIUS (REMOTE DIAL IN USER SERVICE) • RADIUS IS A AAA PROTOCOL, SECURITY SYSTEM BASED ON AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING. • CLIENT SERVER MODEL • SHARED SECRET MUST BE SHARED BETWEEN CLIENT(ACCESS POINT) AND SERVER AND CLIENT MUST BE CONFIGURED TO USE RADIUS SERVER TO GET SERVICE. • RADIUS USES A CENTRALIZED SERVER THAT ALLOWS YOU TO DEFINE THE USERNAME AND PASSWORD OF THE USERS BY WHICH THEY CAN LOGIN TO THEIR ACCOUNT BEFORE ACCESSING THE NETWORK. • RADIUS SERVER IS RESPONSIBLE FOR GETTING USER CONNECTION REQUESTS, AUTHENTICATING THE USER AND THEN RETURNING ALL CONFIGURATION INFORMATION NECESSARY FOR THE CLIENT TO DELIVER SERVICE TO THE USER. • TRANSACTIONS BETWEEN CLIENT AND SERVER ARE AUTHENTICATED THROUGH THE USE OF A SHARED KEY AND THIS KEY IS NEVER SENT OVER THE NETWORK. • PASSWORD IS ENCRYPTED BEFORE SENDING IT OVER NETWORK USING WPA2 • HERE SECURITY IS FULLY DEPENDENT ON THE SEVER NOT THE ACCESS POINT, HENCE SECURITY INCREASED.