SlideShare a Scribd company logo
SECURE NETWORK DESIGN
WITH HIGH-AVAILABILITY
& VOIP
PRESENTED BY:
09BCE035 ARPAN PATEL
•

•

• BRIEFLY, THIS PROJECT AIMS TO SETUP AN END-TO-END SECURE DATA & VOIP NETWORK FOR A SMALL
ENTERPRISE, WITH FEATURES LIKE HIGH AVAILABILITY, ENHANCED PERFORMANCE, RESILIENCY, SECURITY FOR
WIRED & WIRELESS COMMUNICATION AND INCREASED PRODUCTIVITY.
•
THE MAJOR OBJECTIVE OF THIS PROJECT WAS A SMALL
ENTERPRISE NETWORK UPGRADE IN ORDER TO:
• IMPROVE AND CONSOLIDATE NETWORK PERFORMANCE ON SITE.
• PROVIDE INCREASED NETWORK CAPACITY.
• IMPROVE THE NETWORKS FAULT TOLERANCE CAPABILITY.
• PROVIDE FUTURE EXPANSION CAPABILITY.
• IMPROVE THE NETWORK SECURITY TO PREVENT UNAUTHORIZED ACCESS.
• IDENTIFY THE CRITICAL POINTS OF FAILURE IN THE EXISTING NETWORK
AND PROPOSE ON HOW TO ELIMINATE THEM.
SECURITY POLICY & REQUIREMENTS:
• WIRELESS USERS ARE DENIED ACCESS TO THE PRIVATE NETWORK. ONLY ACCESS TO INTERNET.
• NETWORK DEVICES MUST ONLY BE ACCESSED BY LOCAL SITE OR REMOTE SITE ADMIN WITH
AUTHORIZATION. ONLY PERMITTED DEPARTMENTS ARE ALLOWED TO COMMUNICATE WITH OTHER
DEPARTMENTS.
• NO OTHER HOST OTHER THAN THE COMPANY’S END DEVICES CAN BE ATTACHED TO THE NETWORK. IF
ATTACHED, ACCESS MUST BE DENIED IMMEDIATELY AND ADMIN SHOULD SOMEHOW BE NOTIFIED.
• TWO GUEST COMPUTERS SHOULD BE ACCOMMODATED IN ANY DEPARTMENT AND THEY ARE ONLY
PERMITTED TO COMMUNICATE WITH THE MARKETING DEPARTMENT AND LIMITED INTERNET ACCESS.
• EMPLOYEES CAN ONLY ACCESS THE ALLOWED SITES.
• HUMAN RESOURCES IS DENIED ACCESS TO ANY OTHER DEPARTMENT & IS JUST ALLOWED INTERNET
ACCESS.
FUTURE EXPANSION CAPABILITY:
• SERVERS CAN BE ADDED TO THE NETWORK AT ANY TIME.
• CLUSTERING OF THE SEVERS CAN ALSO BE POSSIBLE IF NECESSARY IN THE FUTURE AS THE EXISTING SERVER
HARDWARE CAN SUPPORT BEING IDENTICAL & SUPPORT SCSI.
• SYSTEM COMPONENTS ARE IDENTICAL AT ALL NODES FOR EASE OF MANAGEMENT & CONFIGURATIONS
ARE SIMILAR BETWEEN ALL UNITS AND CAN BE USED AS TEMPLATES FOR ADDING NODES.
• THE DISTRIBUTION SWITCH IS A 24-PORT GIGABIT SWITCH WITH 4 SFP FIBER MODULES
• HENCE EXPANDING THE NUMBER OF DEPARTMENTS OR EVEN THE NUMBER OF BRANCHES WILL ALWAYS BE
ACCEPTABLE AS ALL THE NECESSARY CONFIGURATIONS HAVE BEEN DONE.
ACCESS LAYER SWITCHES ALSO HAVE CAPABILITIES TO BEAR MORE USERS
AND ARE ALSO CONFIGURED FOR SUCH EXPANSION:
FUTURE TRANSITION TO IPV6
• FOR FUTURE PURPOSE WITH CERTAIN CONFIGURATIONS, THE FULL
ENTERPRISE NETWORK CAN BE IMPLEMENTED WITH AN IPV6 SETUP.
• DOCUMENTATION IS ALSO PROVIDED FOR A FULL IPV6 DEPLOYMENT.
NETWORK FEATURES
• WEB SERVER
• FTP SERVER
• DHCP SEVER
• DNS SEVER
• SYSLOG SERVER
• VOIP
VOIP
Steps:
1. Configure Call Manager ExpressTM on a 2811 router.
2. Use the various telephony devices
3. Setup dial peers
4. Connect CiscoTM IP phones on the network.
• ADDITIONALLY IN THE CURRENT NETWORK INFRASTRUCTURE IP PHONES HAVE ALSO BEEN CONFIGURED IN EACH
DEPARTMENT USING THE SAME ETHERNET NETWORK.
• BY RECONFIGURING THE NETWORK & MANAGEABLE SWITCHES VOICE IS NOW COMMUNICATED OVER THE
NETWORK.
VOIP CONFIGURATION:
• TASKS 1 : CONFIGURE INTERFACE FASTETHERNET 0/0 AND DHCP SERVER ON ROUTERA
(2811 ROUTER)
• TASK 2 : CONFIGURE THE CALL MANAGER EXPRESS TELEPHONY SERVICE ON ROUTERA
• TASK 3 : CONFIGURE A VOICE VLAN ON SWITCHA
• TASK 4 : CONFIGURE THE PHONE DIRECTORY FOR IP PHONE 1
• TASK 5 : VERIFY THE CONFIGURATION
CISCO IP PHONE CONFIGURATION COMMANDS:
#Configure the FA 0/0 interface#
RouterA>enable
RouterA#configure terminal
RouterA(config)#interface FastEthernet0/0
RouterA(config-if)#ip address 192.168.10.1 255.255.255.0
RouterA(config-if)#no shutdown
#The DHCP server is needed to provide an IP adress and the TFTP server location for each IP phone
connected to the network:
RouterA(config)#ip dhcp pool VOICE #Create DHCP pool named VOICE
RouterA(dhcp-config)#network 192.168.10.0 255.255.255.0 #DHCP network network 192.168.10 with /24 mask#
RouterA(dhcp-config)#default-router 192.168.10.1 #The default router IP address#
RouterA(dhcp-config)#option 150 ip 192.168.10.1 #Mandatory for voip configuration.
After the configuration, wait a moment and check that ‘IP Phone 1’ has received an IP address by checking
the phone screen until a configuration summary appears.
Apply the following configuration on SwitchA interfaces. This configuration will separate voice and data traffic in
different vlans on SwitchA. Data packets will be carried on the access vlan.
SwitchA(config)#interface range fa0/1 – 5 #Configure interface range#
SwitchA(config-if-range)#switchport mode access
SwitchA(config-if-range)#switchport voice vlan 1 #Define the VLAN on which voice packets will be handled#
CISCO IP PHONE CONFIGURATION COMMANDS (CONTINUED):
Configure the Call Manager Express telephony service on RouterA to enable voip on the network.
RouterA(config)#telephony-service #Configuring the router for telephony services#
RouterA(config-telephony)#max-dn 5 #Define the maximum number of directory numbers#
RouterA(config-telephony)#max-ephones 5 #Define the maximum number of phones#
RouterA(config-telephony)#ip source-address 192.168.10.1 port 2000 #IP Address source#
RouterA(config-telephony)#auto assign 1 to 6 #Automatically assigning ext numbers to buttons#
Although ‘IP Phone 1’ is already connected to SwitchA, it needs additional configuration before being
able to communicate. So to configure RouterA CME to assign a phone number to this IP phone:
RouterA(config)#ephone-dn 1 #Defining the first directory entry#
RouterA(config-ephone-dn)#number 999 #Assign the phone number to this entry#
Ensure that the IP Phone receives an IP Address and a the phone number 999 from RouterA
This can take a short while.
REMOTE SITE VOIP CONFIGURATION USING DIAL PEER:
SITE1 ROUTER SITE2 ROUTER:
dial-peer voice 47 voip
destination-pattern 1..
session target ipv4:18.18.18.2
dial-peer voice 47 voip
destination-pattern ...
session target ipv4:78.78.78.2
ADDITIONAL FEATURES WHICH INCREASE NETWORK
PERFORMANCE & CAPACITY:
• VTP PRUNING:
• WHEN VTP PRUNING IS ENABLED ON VTP SERVERS, ALL THE
CLIENTS IN THE VTP DOMAIN WILL AUTOMATICALLY ENABLE VTP
PRUNING. BY DEFAULT, VLANS 2 – 1001 ARE PRUNING
ELIGIBLE, BUT VLAN 1 CAN’T BE PRUNED BECAUSE IT’S AN
ADMINISTRATIVE VLAN.
• SPANNING-TREE PORTFAST VERY CAREFULLY ENABLED
ON ACCESS PORTS CONNECTED TO HOSTS ONLY
ESPECIALLY THE SERVERS SO UPTIME IS HIGH & NO
UNNECESSARY DELAY BY STP.
SW1#config t
SW1(config)#interface Fa0/1
SW1(config-if)#switchport trunk pruning vlan 3-4
NETWORK CONNECTIVITY TESTING PLAN:
Layer 1 Error Checklist Layer 2 Error Checklist
 Broken cables
 Disconnected cables
 Cables connected to the wrong ports
 Intermittent cable connections
 Cables incorrectly terminated
 Wrong cables used
 Cross-connects
 Rollovers
 Straight-through cables
 Transceiver problems
 DCE cable problems
 DTE cable problems
 Devices powered off
 Improperly configured serial interfaces
 Improperly configured Ethernet interfaces
 Wrong clock rate settings on serial interfaces
 Wrong encapsulation set on serial interfaces
 Faulty NIC
Layer 3 Error Checklist
 Wrong routing protocol enabled
 Incorrect network/IP addresses
 Incorrect subnet masks
 Incorrect interface addresses
 Incorrect DNS-to-IP bindings
 Wrong autonomous system number for EIGRP
STANDARD COMMAND LINE TOOLS USED TO TROUBLESHOOT
 STANDARD COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT HOST LEVEL PROBLEMS ARE:
 PING – CHECK CONNECTIVITY BETWEEN HOST AND OTHER NETWORK DEVICES
 TRACERT – CHECK PATH TO OTHER NETWORK DEVICES
 IPCONFIG – SEE IF HOST PROPERLY DETECTS CONFIGURATIONS ASSIGNED TO IT
 ARP -A – DISPLAYS THE IP-TO-PHYSICAL ADDRESS TRANSLATION TABLES
 STANDARD CISCO IOS COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT ROUTER LEVEL
PROBLEMS ARE:
 PING – CHECK CONNECTIVITY BETWEEN ROUTER AND OTHER NETWORK DEVICES
 TRACEROUTE - CHECK PATH TO OTHER NETWORK DEVICES
 SHOW ARP – SHOW THE IP/MAC ADDRESS USED
 SHOW IP ROUTE – SHOWS A ROUTER’S ROUTING TABLE
 SHOW INTERFACE/SHOW INTERFACE BRIEF – SHOWS EXISTING INTERFACE CONFIGURATIONS AND IF
ADMINISTRATIVELY UP OR DOWN
 SHOW RUN – SHOWS EXISTING OVERALL ALL CONFIGURATIONS
SECURE NETWORK DESIGN
WITH HIGH-AVAILABILITY
& VOIP
PRESENTED BY:
09BCE035 ARPAN PATEL
SITE-1:
IP ADDRESSING
SCHEME
SITE-2:
IP ADDRESSING
SCHEME
ETHER CHANNEL : CISCO’S IMPLEMENTATION OF PORT AGGREGATION
• PORT AGGREGATION: ALLOWS US TO TIE MULTIPLE PORTS TOGETHER INTO A SINGLE
LOGICAL INTERFACE.
• NOT ONLY DOES PORT AGGREGATION INCREASE THE BANDWIDTH OF A LINK, BUT IT
ALSO PROVIDES REDUNDANCY.
Benefits
1. Enhanced Performance.
2. Redundancy
3. Resiliency And Faster Convergence.
So once Again How did we
implement Ether Channel??
Switch(config)#interface range gigabitEthernet 0/1-2
Switch(config-if)#Switchport mode trunk
Switch(config-if)#Switchport nonnegotiable
Switch(config)#Channel-group 1 mode desirable
FIBER-UPLINK
• TO HAVE A FIBER BACKBONE IS THE WISEST DECISION IN ANY ENTERPRISE
NETWORK DESIGN.
• WE HAVE IT IN THE CORE BACKBONE WHICH CONNECTS THE CORE ROUTER TO
THE DISTRIBUTION SWITCH.
• ALSO THE SEVERS OF ALL 3 SITES ARE NOW CONNECTED WITH A GIGABIT FIBER
TO THE NETWORK.
Benefits
1. High Availability
2. High Response time.
3. Increased Reliability
REDUNDANT BACK-UP LINKS
BACKUP SERVERS INSTALLATION & CONFIGURATION:
INSTALLATION OF WINDOWS SEVER 2008
BackupSeverConfiguration…
BackupSeverConfiguration…
ACCESS-CONTROL LIST
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR
TWO PURPOSES ON NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC
SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
• ACCESS CONTROL LISTS WORKS IN A TOP DOWN
APPROACH
- A PERMIT STATEMENT IS USED TO ALLOW TRAFFIC
- A DENY STATEMENT IS USED TO BLOCK TRAFFIC.
 COMMANDS :
- ROUTER(CONFIG) #IP ACCESS - LIST EXTENDED <NAME>
- ROUTER(CONFIG-EXT-NACL) #PERMIT IP HOST <SOURCE
IP> HOST <DESTINATION IP>
SWITCH PORT SECURITY
• NO OTHER WORKSTATION CAN BE PLUGGED TO THE FASTETHERNET PORT.
• IF UNREGISTERED MAC PLUGGED IT WILL BE SHUTDOWN OR RESTRICTED.
Switch(config) #Interface fa 0/1
Switch(config) # Switchport port-security
Switch(config) # Switchport port-security mac-address sticky
REMOTE ACCESS &
REMOTE ACCESS SECURITY:
• REMOTE ACCESS: TELNET (PORT 23)
• SECURE REMOTE ACCESS:
SSH VERSION 2 (PORT 22)
 CONFIGURATION AS FOLLOWS:
Host identification (Using RSA-Keys)
Encryption (IDEA)
Authentication (RSA Challenge)
Router(config)# ip domain-name cisco.com
Router(config)# crypto key generate rsa
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
Router(config)#exit
*Mar 1 0:4:8.988: %SSH-5-ENABLED: SSH 1.99 has been enabled
Router(config)#ip ssh version 2
Router(config)# username cisco password cisco
Router(config)# line vty 0 4
Router(config-line)# login local
Router(config-line)# transport input ssh
Router(config)#ip ssh time-out 90
Router(config)#ip ssh authentication-retries 2
ACCESS LISTS ( ACL )
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON
NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
MAC FILTERING
• ONLY REGISTERED USERS CAN ACCESS THE WIRELESS NETWORK
RADIUS (REMOTE DIAL IN USER SERVICE)
• RADIUS IS A AAA PROTOCOL, SECURITY SYSTEM BASED ON AUTHENTICATION, AUTHORIZATION,
AND ACCOUNTING.
• CLIENT SERVER MODEL
• SHARED SECRET MUST BE SHARED BETWEEN CLIENT(ACCESS POINT) AND SERVER AND CLIENT MUST
BE CONFIGURED TO USE RADIUS SERVER TO GET SERVICE.
• RADIUS USES A CENTRALIZED SERVER THAT ALLOWS YOU TO DEFINE THE USERNAME AND
PASSWORD OF THE USERS BY WHICH THEY CAN LOGIN TO THEIR ACCOUNT BEFORE ACCESSING
THE NETWORK.
• RADIUS SERVER IS RESPONSIBLE FOR GETTING USER CONNECTION REQUESTS, AUTHENTICATING THE
USER AND THEN RETURNING ALL CONFIGURATION INFORMATION NECESSARY FOR THE CLIENT TO
DELIVER SERVICE TO THE USER.
• TRANSACTIONS BETWEEN CLIENT AND SERVER ARE AUTHENTICATED THROUGH THE USE OF A SHARED
KEY AND THIS KEY IS NEVER SENT OVER THE NETWORK.
• PASSWORD IS ENCRYPTED BEFORE SENDING IT OVER NETWORK USING WPA2
• HERE SECURITY IS FULLY DEPENDENT ON THE SEVER NOT THE ACCESS POINT, HENCE SECURITY
INCREASED.
THANK YOU…

More Related Content

What's hot

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
kkkseld
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
thesakshi12
 
project on OSPF
project on OSPFproject on OSPF
project on OSPFOm Prakash
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
Networking Training
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
Aalap Tripathy
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNA
Dawood Aqlan
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
VISHNU N
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
Raja Mazhar
 
CCNA Dynamic Routing
CCNA Dynamic RoutingCCNA Dynamic Routing
CCNA Dynamic Routing
Networkel
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
Sorath Asnani
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014TOM LIU
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
Soporte Yottatec
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
NetProtocol Xpert
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Waqas Ahmed Nawaz
 

What's hot (20)

Microsoft Word Project, Firewalls
Microsoft Word   Project, FirewallsMicrosoft Word   Project, Firewalls
Microsoft Word Project, Firewalls
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
project on OSPF
project on OSPFproject on OSPF
project on OSPF
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNA
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
 
CCNA Dynamic Routing
CCNA Dynamic RoutingCCNA Dynamic Routing
CCNA Dynamic Routing
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 

Viewers also liked

Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
F-Secure Corporation
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALJohn Bernal
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
joelavery
 
Network Critical
Network CriticalNetwork Critical
Network Critical
gigamon
 
New Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing PerformanceNew Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing Performance
TCC Group
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
Dan York
 
Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003
Adrian Cockcroft
 
Cctv And Ip Surveillance
Cctv And Ip SurveillanceCctv And Ip Surveillance
Cctv And Ip Surveillance
faleepay
 
BBC - What is IPTV?
BBC - What is IPTV?BBC - What is IPTV?
BBC - What is IPTV?
internetstreams
 
Mobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital BackboneMobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital Backbone
Adeyemi Fowe
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
F-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
F-Secure Corporation
 
ISP
ISPISP
ISP
aj1974
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
F-Secure Corporation
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
F-Secure Corporation
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
vishal sharma
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
F-Secure Corporation
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
Serhad MAKBULOĞLU, MBA
 

Viewers also liked (20)

Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
WWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINALWWTC_implementation_plan_Group5_FINAL
WWTC_implementation_plan_Group5_FINAL
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
New Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing PerformanceNew Frameworks for Measuring Capacity and Assessing Performance
New Frameworks for Measuring Capacity and Assessing Performance
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003Capacity Planning for Virtualized Datacenters - Sun Network 2003
Capacity Planning for Virtualized Datacenters - Sun Network 2003
 
Cctv And Ip Surveillance
Cctv And Ip SurveillanceCctv And Ip Surveillance
Cctv And Ip Surveillance
 
BBC - What is IPTV?
BBC - What is IPTV?BBC - What is IPTV?
BBC - What is IPTV?
 
Mobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital BackboneMobile Internet - Africa's Digital Backbone
Mobile Internet - Africa's Digital Backbone
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
ISP
ISPISP
ISP
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
Windows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup RestoreWindows Server 2012 Active Directory Backup Restore
Windows Server 2012 Active Directory Backup Restore
 

Similar to Secure Network Design with High-Availability & VoIP

OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
NetProtocol Xpert
 
Rail-net Indian railway internet
Rail-net Indian railway internetRail-net Indian railway internet
Rail-net Indian railway internet
Rahul Kumar
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's Backbone
VMworld
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
Aruba, a Hewlett Packard Enterprise company
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptx
Jean Carlos Cruz
 
69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone
Rayan Darine
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routing
Ramesh Thumburu
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
ManageEngine, Zoho Corporation
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek Corp.
 
A-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplaceA-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplace
Aruba, a Hewlett Packard Enterprise company
 
Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad Hassan
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
Cisco Russia
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Chapter 1 Switch Network Device (1).ppt
Chapter 1  Switch Network Device (1).pptChapter 1  Switch Network Device (1).ppt
Chapter 1 Switch Network Device (1).ppt
desalewminale
 
Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2suhaib ahmed
 

Similar to Secure Network Design with High-Availability & VoIP (20)

OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Railnet
RailnetRailnet
Railnet
 
Rail-net Indian railway internet
Rail-net Indian railway internetRail-net Indian railway internet
Rail-net Indian railway internet
 
VMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's BackboneVMworld 2015: Networking Virtual SAN's Backbone
VMworld 2015: Networking Virtual SAN's Backbone
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
RNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptxRNEC N101 Lite- RAX711-L.pptx
RNEC N101 Lite- RAX711-L.pptx
 
69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone69632 configuring-cat-ip-phone
69632 configuring-cat-ip-phone
 
CV-ROB
CV-ROBCV-ROB
CV-ROB
 
Switch inter vlan_routing
Switch inter vlan_routingSwitch inter vlan_routing
Switch inter vlan_routing
 
corporate network
corporate networkcorporate network
corporate network
 
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow dataWebinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
Webinar: How to captures and analyzes NetFlow, J-Flow and sFlow data
 
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
DrayTek RoadShow 2015 @ Portugal (Setembro) - Sessão 1
 
A-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplaceA-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplace
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2Muhammad_A_Hassan_Resume_rev-2
Muhammad_A_Hassan_Resume_rev-2
 
Рекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС CiscoРекомендации по настройке контроллеров БЛВС Cisco
Рекомендации по настройке контроллеров БЛВС Cisco
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
Chapter 1 Switch Network Device (1).ppt
Chapter 1  Switch Network Device (1).pptChapter 1  Switch Network Device (1).ppt
Chapter 1 Switch Network Device (1).ppt
 
Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2Suhaib_Sep 2015_v2
Suhaib_Sep 2015_v2
 

More from Arpan Patel

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Codecs
CodecsCodecs
Codecs
Arpan Patel
 
Codecs
CodecsCodecs
Codecs
Arpan Patel
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)Arpan Patel
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Arpan Patel
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Arpan Patel
 

More from Arpan Patel (6)

Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Codecs
CodecsCodecs
Codecs
 
Codecs
CodecsCodecs
Codecs
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Secure Network Design with High-Availability & VoIP

  • 1. SECURE NETWORK DESIGN WITH HIGH-AVAILABILITY & VOIP PRESENTED BY: 09BCE035 ARPAN PATEL
  • 2. •  •  • BRIEFLY, THIS PROJECT AIMS TO SETUP AN END-TO-END SECURE DATA & VOIP NETWORK FOR A SMALL ENTERPRISE, WITH FEATURES LIKE HIGH AVAILABILITY, ENHANCED PERFORMANCE, RESILIENCY, SECURITY FOR WIRED & WIRELESS COMMUNICATION AND INCREASED PRODUCTIVITY. •
  • 3. THE MAJOR OBJECTIVE OF THIS PROJECT WAS A SMALL ENTERPRISE NETWORK UPGRADE IN ORDER TO: • IMPROVE AND CONSOLIDATE NETWORK PERFORMANCE ON SITE. • PROVIDE INCREASED NETWORK CAPACITY. • IMPROVE THE NETWORKS FAULT TOLERANCE CAPABILITY. • PROVIDE FUTURE EXPANSION CAPABILITY. • IMPROVE THE NETWORK SECURITY TO PREVENT UNAUTHORIZED ACCESS. • IDENTIFY THE CRITICAL POINTS OF FAILURE IN THE EXISTING NETWORK AND PROPOSE ON HOW TO ELIMINATE THEM.
  • 4. SECURITY POLICY & REQUIREMENTS: • WIRELESS USERS ARE DENIED ACCESS TO THE PRIVATE NETWORK. ONLY ACCESS TO INTERNET. • NETWORK DEVICES MUST ONLY BE ACCESSED BY LOCAL SITE OR REMOTE SITE ADMIN WITH AUTHORIZATION. ONLY PERMITTED DEPARTMENTS ARE ALLOWED TO COMMUNICATE WITH OTHER DEPARTMENTS. • NO OTHER HOST OTHER THAN THE COMPANY’S END DEVICES CAN BE ATTACHED TO THE NETWORK. IF ATTACHED, ACCESS MUST BE DENIED IMMEDIATELY AND ADMIN SHOULD SOMEHOW BE NOTIFIED. • TWO GUEST COMPUTERS SHOULD BE ACCOMMODATED IN ANY DEPARTMENT AND THEY ARE ONLY PERMITTED TO COMMUNICATE WITH THE MARKETING DEPARTMENT AND LIMITED INTERNET ACCESS. • EMPLOYEES CAN ONLY ACCESS THE ALLOWED SITES. • HUMAN RESOURCES IS DENIED ACCESS TO ANY OTHER DEPARTMENT & IS JUST ALLOWED INTERNET ACCESS.
  • 5. FUTURE EXPANSION CAPABILITY: • SERVERS CAN BE ADDED TO THE NETWORK AT ANY TIME. • CLUSTERING OF THE SEVERS CAN ALSO BE POSSIBLE IF NECESSARY IN THE FUTURE AS THE EXISTING SERVER HARDWARE CAN SUPPORT BEING IDENTICAL & SUPPORT SCSI. • SYSTEM COMPONENTS ARE IDENTICAL AT ALL NODES FOR EASE OF MANAGEMENT & CONFIGURATIONS ARE SIMILAR BETWEEN ALL UNITS AND CAN BE USED AS TEMPLATES FOR ADDING NODES. • THE DISTRIBUTION SWITCH IS A 24-PORT GIGABIT SWITCH WITH 4 SFP FIBER MODULES • HENCE EXPANDING THE NUMBER OF DEPARTMENTS OR EVEN THE NUMBER OF BRANCHES WILL ALWAYS BE ACCEPTABLE AS ALL THE NECESSARY CONFIGURATIONS HAVE BEEN DONE.
  • 6. ACCESS LAYER SWITCHES ALSO HAVE CAPABILITIES TO BEAR MORE USERS AND ARE ALSO CONFIGURED FOR SUCH EXPANSION:
  • 7. FUTURE TRANSITION TO IPV6 • FOR FUTURE PURPOSE WITH CERTAIN CONFIGURATIONS, THE FULL ENTERPRISE NETWORK CAN BE IMPLEMENTED WITH AN IPV6 SETUP. • DOCUMENTATION IS ALSO PROVIDED FOR A FULL IPV6 DEPLOYMENT.
  • 8. NETWORK FEATURES • WEB SERVER • FTP SERVER • DHCP SEVER • DNS SEVER • SYSLOG SERVER • VOIP
  • 9. VOIP Steps: 1. Configure Call Manager ExpressTM on a 2811 router. 2. Use the various telephony devices 3. Setup dial peers 4. Connect CiscoTM IP phones on the network. • ADDITIONALLY IN THE CURRENT NETWORK INFRASTRUCTURE IP PHONES HAVE ALSO BEEN CONFIGURED IN EACH DEPARTMENT USING THE SAME ETHERNET NETWORK. • BY RECONFIGURING THE NETWORK & MANAGEABLE SWITCHES VOICE IS NOW COMMUNICATED OVER THE NETWORK.
  • 10. VOIP CONFIGURATION: • TASKS 1 : CONFIGURE INTERFACE FASTETHERNET 0/0 AND DHCP SERVER ON ROUTERA (2811 ROUTER) • TASK 2 : CONFIGURE THE CALL MANAGER EXPRESS TELEPHONY SERVICE ON ROUTERA • TASK 3 : CONFIGURE A VOICE VLAN ON SWITCHA • TASK 4 : CONFIGURE THE PHONE DIRECTORY FOR IP PHONE 1 • TASK 5 : VERIFY THE CONFIGURATION
  • 11. CISCO IP PHONE CONFIGURATION COMMANDS: #Configure the FA 0/0 interface# RouterA>enable RouterA#configure terminal RouterA(config)#interface FastEthernet0/0 RouterA(config-if)#ip address 192.168.10.1 255.255.255.0 RouterA(config-if)#no shutdown #The DHCP server is needed to provide an IP adress and the TFTP server location for each IP phone connected to the network: RouterA(config)#ip dhcp pool VOICE #Create DHCP pool named VOICE RouterA(dhcp-config)#network 192.168.10.0 255.255.255.0 #DHCP network network 192.168.10 with /24 mask# RouterA(dhcp-config)#default-router 192.168.10.1 #The default router IP address# RouterA(dhcp-config)#option 150 ip 192.168.10.1 #Mandatory for voip configuration. After the configuration, wait a moment and check that ‘IP Phone 1’ has received an IP address by checking the phone screen until a configuration summary appears. Apply the following configuration on SwitchA interfaces. This configuration will separate voice and data traffic in different vlans on SwitchA. Data packets will be carried on the access vlan. SwitchA(config)#interface range fa0/1 – 5 #Configure interface range# SwitchA(config-if-range)#switchport mode access SwitchA(config-if-range)#switchport voice vlan 1 #Define the VLAN on which voice packets will be handled#
  • 12. CISCO IP PHONE CONFIGURATION COMMANDS (CONTINUED): Configure the Call Manager Express telephony service on RouterA to enable voip on the network. RouterA(config)#telephony-service #Configuring the router for telephony services# RouterA(config-telephony)#max-dn 5 #Define the maximum number of directory numbers# RouterA(config-telephony)#max-ephones 5 #Define the maximum number of phones# RouterA(config-telephony)#ip source-address 192.168.10.1 port 2000 #IP Address source# RouterA(config-telephony)#auto assign 1 to 6 #Automatically assigning ext numbers to buttons# Although ‘IP Phone 1’ is already connected to SwitchA, it needs additional configuration before being able to communicate. So to configure RouterA CME to assign a phone number to this IP phone: RouterA(config)#ephone-dn 1 #Defining the first directory entry# RouterA(config-ephone-dn)#number 999 #Assign the phone number to this entry# Ensure that the IP Phone receives an IP Address and a the phone number 999 from RouterA This can take a short while.
  • 13. REMOTE SITE VOIP CONFIGURATION USING DIAL PEER: SITE1 ROUTER SITE2 ROUTER: dial-peer voice 47 voip destination-pattern 1.. session target ipv4:18.18.18.2 dial-peer voice 47 voip destination-pattern ... session target ipv4:78.78.78.2
  • 14. ADDITIONAL FEATURES WHICH INCREASE NETWORK PERFORMANCE & CAPACITY: • VTP PRUNING: • WHEN VTP PRUNING IS ENABLED ON VTP SERVERS, ALL THE CLIENTS IN THE VTP DOMAIN WILL AUTOMATICALLY ENABLE VTP PRUNING. BY DEFAULT, VLANS 2 – 1001 ARE PRUNING ELIGIBLE, BUT VLAN 1 CAN’T BE PRUNED BECAUSE IT’S AN ADMINISTRATIVE VLAN. • SPANNING-TREE PORTFAST VERY CAREFULLY ENABLED ON ACCESS PORTS CONNECTED TO HOSTS ONLY ESPECIALLY THE SERVERS SO UPTIME IS HIGH & NO UNNECESSARY DELAY BY STP. SW1#config t SW1(config)#interface Fa0/1 SW1(config-if)#switchport trunk pruning vlan 3-4
  • 15. NETWORK CONNECTIVITY TESTING PLAN: Layer 1 Error Checklist Layer 2 Error Checklist  Broken cables  Disconnected cables  Cables connected to the wrong ports  Intermittent cable connections  Cables incorrectly terminated  Wrong cables used  Cross-connects  Rollovers  Straight-through cables  Transceiver problems  DCE cable problems  DTE cable problems  Devices powered off  Improperly configured serial interfaces  Improperly configured Ethernet interfaces  Wrong clock rate settings on serial interfaces  Wrong encapsulation set on serial interfaces  Faulty NIC Layer 3 Error Checklist  Wrong routing protocol enabled  Incorrect network/IP addresses  Incorrect subnet masks  Incorrect interface addresses  Incorrect DNS-to-IP bindings  Wrong autonomous system number for EIGRP
  • 16. STANDARD COMMAND LINE TOOLS USED TO TROUBLESHOOT  STANDARD COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT HOST LEVEL PROBLEMS ARE:  PING – CHECK CONNECTIVITY BETWEEN HOST AND OTHER NETWORK DEVICES  TRACERT – CHECK PATH TO OTHER NETWORK DEVICES  IPCONFIG – SEE IF HOST PROPERLY DETECTS CONFIGURATIONS ASSIGNED TO IT  ARP -A – DISPLAYS THE IP-TO-PHYSICAL ADDRESS TRANSLATION TABLES  STANDARD CISCO IOS COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT ROUTER LEVEL PROBLEMS ARE:  PING – CHECK CONNECTIVITY BETWEEN ROUTER AND OTHER NETWORK DEVICES  TRACEROUTE - CHECK PATH TO OTHER NETWORK DEVICES  SHOW ARP – SHOW THE IP/MAC ADDRESS USED  SHOW IP ROUTE – SHOWS A ROUTER’S ROUTING TABLE  SHOW INTERFACE/SHOW INTERFACE BRIEF – SHOWS EXISTING INTERFACE CONFIGURATIONS AND IF ADMINISTRATIVELY UP OR DOWN  SHOW RUN – SHOWS EXISTING OVERALL ALL CONFIGURATIONS
  • 17.
  • 18. SECURE NETWORK DESIGN WITH HIGH-AVAILABILITY & VOIP PRESENTED BY: 09BCE035 ARPAN PATEL
  • 19.
  • 20.
  • 21.
  • 24.
  • 25. ETHER CHANNEL : CISCO’S IMPLEMENTATION OF PORT AGGREGATION • PORT AGGREGATION: ALLOWS US TO TIE MULTIPLE PORTS TOGETHER INTO A SINGLE LOGICAL INTERFACE. • NOT ONLY DOES PORT AGGREGATION INCREASE THE BANDWIDTH OF A LINK, BUT IT ALSO PROVIDES REDUNDANCY. Benefits 1. Enhanced Performance. 2. Redundancy 3. Resiliency And Faster Convergence. So once Again How did we implement Ether Channel?? Switch(config)#interface range gigabitEthernet 0/1-2 Switch(config-if)#Switchport mode trunk Switch(config-if)#Switchport nonnegotiable Switch(config)#Channel-group 1 mode desirable
  • 26.
  • 27. FIBER-UPLINK • TO HAVE A FIBER BACKBONE IS THE WISEST DECISION IN ANY ENTERPRISE NETWORK DESIGN. • WE HAVE IT IN THE CORE BACKBONE WHICH CONNECTS THE CORE ROUTER TO THE DISTRIBUTION SWITCH. • ALSO THE SEVERS OF ALL 3 SITES ARE NOW CONNECTED WITH A GIGABIT FIBER TO THE NETWORK. Benefits 1. High Availability 2. High Response time. 3. Increased Reliability
  • 28.
  • 29.
  • 30.
  • 32.
  • 33. BACKUP SERVERS INSTALLATION & CONFIGURATION:
  • 37.
  • 38.
  • 39.
  • 40. ACCESS-CONTROL LIST ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON NETWORKING DEVICES: • TO FILTER TRAFFIC. • TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS. TYPES OF ACCESS LISTS: • NUMBERED • NAMED • EXTENDED • STANDARD • ACCESS CONTROL LISTS WORKS IN A TOP DOWN APPROACH - A PERMIT STATEMENT IS USED TO ALLOW TRAFFIC - A DENY STATEMENT IS USED TO BLOCK TRAFFIC.  COMMANDS : - ROUTER(CONFIG) #IP ACCESS - LIST EXTENDED <NAME> - ROUTER(CONFIG-EXT-NACL) #PERMIT IP HOST <SOURCE IP> HOST <DESTINATION IP>
  • 41.
  • 42. SWITCH PORT SECURITY • NO OTHER WORKSTATION CAN BE PLUGGED TO THE FASTETHERNET PORT. • IF UNREGISTERED MAC PLUGGED IT WILL BE SHUTDOWN OR RESTRICTED. Switch(config) #Interface fa 0/1 Switch(config) # Switchport port-security Switch(config) # Switchport port-security mac-address sticky
  • 43.
  • 44. REMOTE ACCESS & REMOTE ACCESS SECURITY: • REMOTE ACCESS: TELNET (PORT 23) • SECURE REMOTE ACCESS: SSH VERSION 2 (PORT 22)  CONFIGURATION AS FOLLOWS: Host identification (Using RSA-Keys) Encryption (IDEA) Authentication (RSA Challenge) Router(config)# ip domain-name cisco.com Router(config)# crypto key generate rsa How many bits in the modulus [512]: 1024 % Generating 1024 bit RSA keys, keys will be non-exportable...[OK] Router(config)#exit *Mar 1 0:4:8.988: %SSH-5-ENABLED: SSH 1.99 has been enabled Router(config)#ip ssh version 2 Router(config)# username cisco password cisco Router(config)# line vty 0 4 Router(config-line)# login local Router(config-line)# transport input ssh Router(config)#ip ssh time-out 90 Router(config)#ip ssh authentication-retries 2
  • 45.
  • 46.
  • 47. ACCESS LISTS ( ACL ) ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON NETWORKING DEVICES: • TO FILTER TRAFFIC. • TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS. TYPES OF ACCESS LISTS: • NUMBERED • NAMED • EXTENDED • STANDARD
  • 48.
  • 49. MAC FILTERING • ONLY REGISTERED USERS CAN ACCESS THE WIRELESS NETWORK
  • 50.
  • 51. RADIUS (REMOTE DIAL IN USER SERVICE) • RADIUS IS A AAA PROTOCOL, SECURITY SYSTEM BASED ON AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING. • CLIENT SERVER MODEL • SHARED SECRET MUST BE SHARED BETWEEN CLIENT(ACCESS POINT) AND SERVER AND CLIENT MUST BE CONFIGURED TO USE RADIUS SERVER TO GET SERVICE. • RADIUS USES A CENTRALIZED SERVER THAT ALLOWS YOU TO DEFINE THE USERNAME AND PASSWORD OF THE USERS BY WHICH THEY CAN LOGIN TO THEIR ACCOUNT BEFORE ACCESSING THE NETWORK. • RADIUS SERVER IS RESPONSIBLE FOR GETTING USER CONNECTION REQUESTS, AUTHENTICATING THE USER AND THEN RETURNING ALL CONFIGURATION INFORMATION NECESSARY FOR THE CLIENT TO DELIVER SERVICE TO THE USER. • TRANSACTIONS BETWEEN CLIENT AND SERVER ARE AUTHENTICATED THROUGH THE USE OF A SHARED KEY AND THIS KEY IS NEVER SENT OVER THE NETWORK. • PASSWORD IS ENCRYPTED BEFORE SENDING IT OVER NETWORK USING WPA2 • HERE SECURITY IS FULLY DEPENDENT ON THE SEVER NOT THE ACCESS POINT, HENCE SECURITY INCREASED.