NETW202 Course Project finalLOCAL AREA NETWORK

31 July, 2024 | 3 Min Read

This course project involves setting up and configuring multiple network devices (Router1, Switch1, Switch2) as well as verifying the network connectivity between two PCs (PC1 and PC2). The configuration steps for each device include initial setup, enabling security features, configuring interfaces, and verifying the network’s operation.

Router1 Setup

  1. Initial Setup:
    • Enter initial configuration dialog: yes
    • Basic management setup: yes
    • Host name: Router1
    • Enable secret: cisco
    • Enable password: cisco1
    • Virtual terminal password: cisco
    • SNMP Network Management: no
    • Interface for management network: gigabitethernet0/0
    • IP address: 10.1.1.1
    • Subnet mask: 255.255.255.0
  2. Verification:
    • Save the configuration and verify using show start.

Switch1 Setup

  1. Initial Setup:
    • Enter initial configuration dialog: yes
    • Basic management setup: yes
    • Host name: Switch1
    • Enable secret: cisco
    • Enable password: switch1
    • SNMP Network Management: no
    • Interface for management network: vlan1
    • IP address: 10.1.1.2
    • Subnet mask: 255.255.255.0
  2. Further Configuration:
    • Set the default gateway: ip default-gateway 10.1.1.1
    • Enable password encryption: service password-encryption
    • Configure a message of the day (MOTD) banner: UNAUTHORIZED ACCESS PROHIBITED
    • Remove and reset passwords as needed, and verify the configuration using show run and show start.

Switch2 Setup

  1. Initial Setup:
    • Follow similar steps as for Switch1, with the host name Switch2 and enable password switch2.
  2. Further Configuration:
    • Configure port security, SSH access, and verify using commands similar to those used for Switch1.

Router1 Security Configuration

  1. Security Features:
    • Configure MOTD banner: WARNING! UNAUTHORIZED ACCESS PROHIBITED!
    • Enable SSH by generating RSA keys and setting ip ssh version 2.
    • Set login local on the VTY lines and restrict transport input to telnet and SSH.
  2. Verification:
    • Test SSH connectivity from Switch1 and verify the configuration using show run and show ip ssh.

Switch1 and Switch2 Security

  1. Security Features:
    • Configure port security with sticky MAC address and restrict violation mode.
    • Enable SSH access, similar to Router1.
    • Shut down unused interfaces for security.
  2. Verification:
    • Test connectivity and SSH access from the Router to the Switches.

PC1 and PC2 Setup

  1. IP Configuration:
    • PC1: 192.168.1.2
    • PC2: 192.168.1.3
  2. Connectivity Testing:
    • Use ping and tracert commands to verify connectivity between PC1 and PC2, and from PCs to Router1’s IP.

Final Remarks

The project involved several complex tasks, such as configuring IP addresses, securing network devices, and verifying connectivity. The hands-on experience gained from the labs provided valuable insights into network setup and security. The challenge of determining IP addressing and ensuring proper syntax for command-line configurations was met by carefully following the lab exercises and making use of available resources.

This comprehensive network setup has demonstrated the importance of preparation and practice in network configuration, highlighting that with proper documentation and hands-on experience, a reliable and secure network can be built.

Related posts