CG Lab Proj Front Page

Download as odt, pdf, or txt
Download as odt, pdf, or txt
You are on page 1of 18

Department of Computer Science & Engineering

National Institute of Technology Srinagar


Hazratbal, Srinagar, Jammu & Kashmir-190006, India

Course Name: Computer Networks Lab [CSL-355]

A Project submitted on

Advanced switching networking project


using packet tracer.

by

Mohammad Mehran
2021BCSE086

III Year B-Tech CSE (6th Semester)

Submitted to

Dr. Mohammad Ahsan Chisti

SPRING 2024
Table of contents:

Chapter no Heading Page no.


Abstract 1
1 Introduction 2
2 Methodology 3-4
3 Implementation 5-8
4 Diagrams 9-18
5 Results and Analysis 19-21
6 Conclusion 22-23
7 References 24
Abstract
This project focuses on enhancing the security, performance, and manageability of a
corporate network by implementing standardized configurations on Cisco switches. Key
tasks included setting hostnames, banners, and enable passwords to secure and identify
network devices. Console and VTY lines were optimized for efficient management and
security with logging synchronization and session timeouts.
We utilized Link Aggregation Control Protocol (LACP) to combine multiple physical links
into single logical links, improving bandwidth and redundancy through EtherChannels and
trunking configurations. Virtual Trunking Protocol (VTP) was set up to manage VLANs
efficiently across the network, ensuring consistent configurations and simplifying
management.
To segregate traffic and enhance security, specific VLANs were assigned to interface ranges,
and port security was implemented to prevent unauthorized access. This included setting
maximum MAC addresses per port, enabling sticky MAC address learning, and configuring
shutdown actions for policy violations.
The configurations were applied uniformly across switches SW2, SW7, and SW8, and all
settings were saved to ensure persistence and ease of future management. This project
demonstrates a comprehensive approach to creating a secure, efficient, and manageable
corporate network.
Chapter 1
Introduction
In today's digital age, efficient and secure network management is critical for the smooth
operation of corporate environments. This mini-project focuses on configuring Cisco
switches to enhance network performance, security, and manageability. The need for robust
network infrastructure has grown with the increasing reliance on digital communication and
data transfer, necessitating advanced configurations that ensure both efficiency and security.
Background Information and Problem Statement: Corporations face numerous
challenges in managing their networks, including the need to balance bandwidth usage,
ensure fault tolerance, protect against unauthorized access, and maintain consistent
configurations across multiple devices. Traditional network setups often struggle with these
issues, leading to inefficiencies and vulnerabilities. Our project addresses these challenges by
implementing a standardized configuration across several Cisco switches, thereby improving
overall network performance and security.
Motivation and Significance: The motivation behind this project stems from the critical
importance of network reliability and security in corporate environments. By enhancing
network performance through link aggregation, simplifying VLAN management with VTP,
and implementing stringent security measures like port security, we aim to create a network
infrastructure that can support the dynamic needs of modern businesses. The significance of
this project lies in its potential to reduce network downtimes, prevent unauthorized access,
and streamline network management, thereby contributing to the overall productivity and
security of the organization.
Objectives and Goals: The primary objectives of this mini-project are to:
1. Standardize network configurations across multiple Cisco switches.
2. Improve network performance and redundancy through Link Aggregation Control
Protocol (LACP).
3. Simplify VLAN management using Virtual Trunking Protocol (VTP).
4. Enhance network security by implementing port security measures.
5. Ensure consistent and persistent configurations across all switches.
By achieving these goals, we aim to create a more efficient, secure, and manageable network
infrastructure that can meet the demands of a modern corporate environment.

Chapter 2
Methodology
Approach: The methodology for this project involved a systematic approach to configuring
Cisco switches to enhance network performance, security, and manageability. The project
was divided into several key phases: planning, configuration, implementation, testing, and
documentation.
1. Planning:
• Identified the network requirements and objectives.
• Defined the scope of the configurations to be applied across the switches.
• Prepared a detailed configuration plan and checklist to ensure consistency.
2. Configuration:
• Configured basic settings such as hostnames, banners, and passwords to
establish a secure and identifiable network environment.
• Optimized console and VTY line settings to improve management efficiency
and security.
• Implemented link aggregation using LACP to enhance bandwidth and
redundancy.
• Configured VTP for efficient VLAN management.
• Assigned VLANs to specific interface ranges to segregate network traffic.
• Applied port security measures to prevent unauthorized access.
3. Implementation:
• Applied the configurations to three Cisco switches (SW2, SW7, SW8) to
ensure uniformity and adherence to network policies.
• Saved all configurations to ensure persistence across device reboots.
4. Testing:
• Conducted tests to verify the functionality and performance of the
configurations.
• Monitored the network for any issues or anomalies after applying the
configurations.
5. Documentation:
• Documented the entire process, including configuration commands, testing
results, and any issues encountered.
Tools, Technologies, and Techniques:
• Cisco IOS CLI: The primary tool used for configuring the Cisco switches.
Commands were entered directly into the command-line interface to set up and
modify switch settings.
• Link Aggregation Control Protocol (LACP): Employed to combine multiple
physical links into a single logical link, improving bandwidth utilization and
redundancy.
• Virtual Trunking Protocol (VTP): Used to manage VLAN configurations across
the network, ensuring consistency and ease of management.
• Port Security: Configured to limit the number of devices that can connect to a
switch port and to take action when security policies are violated.

Data Collection, Experiments, and Simulations:


• Configuration Commands: Detailed logs of all commands executed during the
configuration process were maintained.
• Testing Scenarios: Various scenarios were tested to ensure the configurations
worked as intended. This included checking VLAN assignments, verifying link
aggregation, and testing port security features.
• Network Monitoring: Post-implementation, the network was monitored for
performance and security issues using built-in Cisco monitoring tools and third-party
network management software.
By following this structured methodology, we ensured that the network configurations were
applied consistently and effectively across all switches, achieving the project's objectives and
enhancing the overall network infrastructure.
Chapter 3
Implementation
Implementation Details: The project involved configuring multiple Cisco switches to
enhance network performance, security, and manageability. The implementation followed a
structured approach, with each step carefully planned and executed to ensure consistency and
effectiveness.
Steps Followed:
1. Initial Setup:
• Accessing the Switch:
2. Basic Configuration:
• Setting the Hostname and Banner:

Console and VTY Line Configuration:

3. Security Configuration:
• Password Encryption and Domain Lookup:

4. Link Aggregation (EtherChannel):


1) Configuring Interfaces for EtherChannel:
2) Configuring the Port-Channel Interface:

5. VTP Configuration:
1) Setting VTP Version, Domain, Password, and Mode:

6. VLAN Configuration:
1) Assigning VLANs to Interface Ranges:

7. Port Security Configuration:


1) Configuring Port Security on Access Ports: For SW2, SW7, and SW8:
8) Saving Configuration:
• Writing Configuration to Memory:
Chapter 4
Diagrams:
Network Topology Diagram:
• Illustrates the connection of switches, aggregated links, and VLAN
assignments.

Chapter 5
Results and Analysis
Results:
The implementation of the network configurations across the Cisco switches yielded the
following results:
1. Enhanced Network Performance and Redundancy:
• The use of Link Aggregation Control Protocol (LACP) successfully
combined multiple physical links into single logical links, increasing
bandwidth and providing redundancy.
• The EtherChannel setup allowed for efficient load balancing and reduced the
risk of network downtime due to link failures.
2. Improved VLAN Management:
• The Virtual Trunking Protocol (VTP) configuration ensured consistent
VLAN assignments across all switches, simplifying the management and
reducing configuration errors.
• VLAN segmentation worked as intended, isolating traffic for different
departments and enhancing network security.
3. Increased Security:
• Port security measures effectively limited the number of devices per port,
with the maximum set to 2 and using sticky MAC addresses.
• Unauthorized access attempts resulted in ports being shut down as
configured, protecting the network from potential security breaches.
4. Optimized Network Management:
• Console and VTY line configurations improved the management experience
by preventing command interruption and setting session timeouts.
• Disabling IP domain lookup reduced unnecessary delays during command
input.
Analysis:
The configurations were tested in various scenarios to validate their effectiveness. Here’s a
detailed analysis of the results:
1. Link Aggregation (EtherChannel):
• Testing: Multiple data streams were sent simultaneously across the
aggregated links to test load balancing and redundancy.
• Findings: The data was evenly distributed across the links, and the network
continued to operate smoothly even when one of the links was intentionally
disabled.
• Implications: This setup ensures higher availability and better utilization of
network resources, which is crucial for maintaining consistent network
performance.
2. VLAN and VTP Configuration:
• Testing: Devices were connected to different VLANs, and inter-VLAN
communication was tested.
• Findings: Devices within the same VLAN could communicate, while
communication between different VLANs was restricted as expected.
• Implications: This segregation enhances security and ensures that sensitive
data is confined to the appropriate segments of the network.
3. Port Security:
• Testing: Attempted to connect more than the allowed number of devices and
used unauthorized devices on secured ports.
• Findings: Ports were shut down upon detecting violations, and only
authorized devices could reconnect.
• Implications: This provides a strong security layer, preventing unauthorized
access and potential network threats.
Visual Aids:
1. Table 1: Link Aggregation Performance

2. Table 2: VLAN Configuration :

3. Table 3: Management Efficiency :

Discussion:
The results demonstrate that the standardized configurations effectively enhanced the
network’s performance, security, and manageability. The successful implementation of link
aggregation improved bandwidth utilization and provided redundancy, which is critical for
network reliability. The consistent VLAN management and robust port security measures
significantly bolstered the network's defense against unauthorized access and potential
threats.
The configurations also streamlined network management, reducing administrative overhead
and improving operational efficiency. The positive outcomes from the tests validate the
effectiveness of the chosen approach and highlight the importance of systematic network
configuration in a corporate environment.
Overall, this project provides a solid foundation for a secure, efficient, and manageable
network infrastructure, capable of supporting the dynamic needs of a modern corporate
environment.

Chapter 6
Conclusion
Summary of Key Findings and Outcomes:
This mini-project focused on enhancing the security, performance, and manageability of a
corporate network by implementing standardized configurations across multiple Cisco
switches. The key findings and outcomes are as follows:
1. Enhanced Network Performance and Redundancy:
• Successful implementation of Link Aggregation Control Protocol (LACP)
combined multiple physical links into single logical links, improving
bandwidth utilization and providing fault tolerance.
2. Improved VLAN Management:
• Consistent VLAN configurations using Virtual Trunking Protocol (VTP)
facilitated efficient management and reduced configuration errors.
3. Increased Network Security:
• Port security measures effectively limited the number of devices per port and
prevented unauthorized access, ensuring a secure network environment.
4. Optimized Network Management:
• Console and VTY line configurations improved management efficiency and
security by preventing command interruption and setting session timeouts.
• Disabling IP domain lookup reduced delays during command input,
enhancing the overall management experience.
Evaluation of Objectives and Goals:
The primary objectives of this mini-project were to standardize network configurations,
improve performance and redundancy, simplify VLAN management, enhance network
security, and ensure consistent and persistent configurations across all switches. These
objectives and goals were thoroughly achieved, as evidenced by the following:
1. Standardized Configurations:
• Hostnames, banners, and passwords were consistently set across all switches,
establishing a secure and identifiable network environment.
2. Improved Performance and Redundancy:
• LACP was successfully implemented, providing higher bandwidth and
redundancy through EtherChannel configurations.
3. Simplified VLAN Management:
• VTP was configured to ensure consistent VLAN assignments across all
switches, simplifying network management and ensuring efficient VLAN
segmentation.
4. Enhanced Security:
• Port security was implemented effectively, with configured limits on the
number of devices per port, sticky MAC address learning, and shutdown
actions for policy violations.
5. Persistent Configurations:
• All configurations were saved to ensure persistence across device reboots,
facilitating easier future management and maintenance.
Overall, this project successfully met its objectives, resulting in a robust, secure, and efficient
network infrastructure. The standardized configurations and security enhancements provide a
reliable foundation for supporting the dynamic needs of a modern corporate environment,
ultimately contributing to improved network performance, security, and manageability.

Chapter 7
References
1. Cisco Systems. (2023). Cisco IOS Configuration Fundamentals. Retrieved from
Cisco Documentation
2. Cisco Systems. (2023). Configuring EtherChannels. Retrieved from Cisco
Documentation
3. Cisco Systems. (2023). Understanding and Configuring VLAN Trunk Protocol
(VTP). Retrieved from Cisco Documentation
4. Cisco Systems. (2023). Configuring Port Security. Retrieved from Cisco
Documentation
5. Odom, W. (2020). CCNA 200-301 Official Cert Guide, Volume 1. Cisco Press.
6. Hucaby, D. (2020). CCNP Enterprise Advanced Routing ENARSI 300-410 Official
Cert Guide. Cisco Press.
7. Sobh, T. (Ed.). (2006). Innovations and Advanced Techniques in Systems,
Computing Sciences, and Software Engineering. Springer.
8. Cisco Systems. (2023). Command References for Cisco IOS. Retrieved from Cisco
Command References
9. Lammle, T. (2020). CompTIA Network+ Study Guide: Exam N10-007. Sybex.

You might also like