SlideShare a Scribd company logo
Shareeka Corporation
Rami Bahram
Introduction
For this projectI used Cisco Packet Tracer Simulator with my combined
knowledgeof Cisco technologies I had acquired preparing for the CCNA, and
integrated them into designing an overall secured network.
Three Different Departments:
1. Corporate
2. Finance
3. Sales
Corporate Router Features:
1. Legal Unauthorized Warning Message
2. EIGRP Hybrid Routing Protocol
3. Interfaces: Three LANs with One Serial port
 LAN One: For Servers
 LAN Two: For Departments
-with Sub-Interfaces Dot1q Encapsulation for Inter-VLAN Routing
 LAN Three: For Public Use
4. Created Encrypted Logons for Aux, Vty, Console, and Privilege.
5. PPP Encapsulation with CHAP and PAP Fallback
6. Relayed DHCP- Services to Public LAN
7. Firewall Protection:
-Extended Access-List 110
 CorporateDep- full access to all 3 Servers.
 Finance Dep- access full access to Department Server.
 Sales Dep- FTP, TFTP, HTTP services via Department Server
 Deny all other access to Corporateand Department Servers
 Access Group was placed on Server LAN and out in order to permit and
deny local and outside traffic
-Extended Access-List 112:
 Permit DNC, DHCP, HTTPS traffic from Public LAN to Public Server
 Filters FTP, TFTP, Telnet, SSH, HTTP, Ping, and all other unspecified
services from going out of interface
 Access Group placed on Public LAN and in to filter traffic going in and
not interrupt department traffic.
Switches:
1. All unconnected ports on Server and Department Switches have been
administratively shutdown.
2. Connected Access Ports configured with PortSecurity.
3. All three switches have Legal Unauthorized Warning Message
4. All Switches are configured with Encrypted Logons for Aux, Vty, Console, and
Privilege.
5. Switches can be remotely accessed
6. Departments set on different VLANs
7. Department Switch Trunk Portspecified to allow VLAN ALL
Conclusion
Overall, using Cisco’s IOS Technologies I was able to take a typical network
design and incorporate multiple network services as well as security methods. The
overview for formulating security measures was by viewing the OSI Model
approach. Forexample, Layer One security was applied by shutting down all non-
used ports the switches and routers. All connected switch ports were set with port
security measures. Next for Layer Two, Router’s Serial ports encapsulations were
changed to PPP with CHAP PAP authentication. While the routers sub-interfaces
were given DOT1Q encapsulation for Inter-Vlan routing. Switch access and trunk
ports were given dot1q encapsulation for implementing Vlans. The Network and
TransportLayers were secured by the implementation of Cisco’s Extended Access-
Lists by the filtering of firewalls, portnumbers. Layer Five of the OSI model was
applied by the configuring of remote access of switches and routers. Layer Six, all
known passwordsonall devices were encrypted. Layer Seven, non-used
services/applications were closed on servers and protected by the use of firewalls.
Other technologies and IP services were configured in conjunction with these
security measures in order to ensure company protection of devices and data.

More Related Content

What's hot

CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
Chaing Ravuth
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
Nil Menon
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
Irsandi Hasan
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
Nil Menon
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
Irsandi Hasan
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
teknetir
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
Ibby Nuj
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
Chaing Ravuth
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
Irsandi Hasan
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
Irsandi Hasan
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
Vuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
Vuz Dở Hơi
 

What's hot (20)

CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6CCNA2 Verson6 Chapter6
CCNA2 Verson6 Chapter6
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 9
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5CCNA Exploration 3 - Chapter 5
CCNA Exploration 3 - Chapter 5
 
CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4CCNA Exploration 3 - Chapter 4
CCNA Exploration 3 - Chapter 4
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
 
CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6CCNA Exploration 4 - Chapter 6
CCNA Exploration 4 - Chapter 6
 
CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5CCNA Exploration 4 - Chapter 5
CCNA Exploration 4 - Chapter 5
 
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and TroubleshootingCCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
CCNAv5 - S3: Chapter8 EIGRP Advanced Configurations and Troubleshooting
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 

Similar to Shareeka Corporation with Packet Tracer Simulation

Set review 1
Set review 1Set review 1
Set review 1
Ankita Mandekar
 
Floodlight with Firewall and Network Virtualization
Floodlight with Firewall and Network VirtualizationFloodlight with Firewall and Network Virtualization
Floodlight with Firewall and Network Virtualization
Ankita Mandekar
 
V P N
V P NV P N
V P N
bhathiji
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
World Connect Training
World Connect TrainingWorld Connect Training
World Connect Training
Shrikant Bhavsar
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
Jennifer Letterman
 
IP Security
IP SecurityIP Security
IP Security
sahilshah200
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Cisco Canada
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
merhatsidikmelke
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
Azad Kaki
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
Chaing Ravuth
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
ElmarkPlusTurkiye
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
ssuserbab2f4
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
Ministry of Higher Education
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
mohibullah70
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
Chaing Ravuth
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
ParthaDas754073
 

Similar to Shareeka Corporation with Packet Tracer Simulation (20)

Set review 1
Set review 1Set review 1
Set review 1
 
Floodlight with Firewall and Network Virtualization
Floodlight with Firewall and Network VirtualizationFloodlight with Firewall and Network Virtualization
Floodlight with Firewall and Network Virtualization
 
V P N
V P NV P N
V P N
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
 
World Connect Training
World Connect TrainingWorld Connect Training
World Connect Training
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
IP Security
IP SecurityIP Security
IP Security
 
Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...Integration and Interoperation of existing Nexus networks into an ACI Archite...
Integration and Interoperation of existing Nexus networks into an ACI Archite...
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
CCNP Switching Chapter 10
CCNP Switching Chapter 10CCNP Switching Chapter 10
CCNP Switching Chapter 10
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
 
CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8CCNP ROUTE V7 CH8
CCNP ROUTE V7 CH8
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 

Shareeka Corporation with Packet Tracer Simulation

  • 1. Shareeka Corporation Rami Bahram Introduction For this projectI used Cisco Packet Tracer Simulator with my combined knowledgeof Cisco technologies I had acquired preparing for the CCNA, and integrated them into designing an overall secured network. Three Different Departments: 1. Corporate 2. Finance 3. Sales Corporate Router Features: 1. Legal Unauthorized Warning Message 2. EIGRP Hybrid Routing Protocol 3. Interfaces: Three LANs with One Serial port  LAN One: For Servers  LAN Two: For Departments -with Sub-Interfaces Dot1q Encapsulation for Inter-VLAN Routing  LAN Three: For Public Use 4. Created Encrypted Logons for Aux, Vty, Console, and Privilege. 5. PPP Encapsulation with CHAP and PAP Fallback 6. Relayed DHCP- Services to Public LAN 7. Firewall Protection: -Extended Access-List 110
  • 2.  CorporateDep- full access to all 3 Servers.  Finance Dep- access full access to Department Server.  Sales Dep- FTP, TFTP, HTTP services via Department Server  Deny all other access to Corporateand Department Servers  Access Group was placed on Server LAN and out in order to permit and deny local and outside traffic -Extended Access-List 112:  Permit DNC, DHCP, HTTPS traffic from Public LAN to Public Server  Filters FTP, TFTP, Telnet, SSH, HTTP, Ping, and all other unspecified services from going out of interface  Access Group placed on Public LAN and in to filter traffic going in and not interrupt department traffic. Switches: 1. All unconnected ports on Server and Department Switches have been administratively shutdown. 2. Connected Access Ports configured with PortSecurity. 3. All three switches have Legal Unauthorized Warning Message 4. All Switches are configured with Encrypted Logons for Aux, Vty, Console, and Privilege. 5. Switches can be remotely accessed 6. Departments set on different VLANs 7. Department Switch Trunk Portspecified to allow VLAN ALL
  • 3. Conclusion Overall, using Cisco’s IOS Technologies I was able to take a typical network design and incorporate multiple network services as well as security methods. The overview for formulating security measures was by viewing the OSI Model approach. Forexample, Layer One security was applied by shutting down all non- used ports the switches and routers. All connected switch ports were set with port security measures. Next for Layer Two, Router’s Serial ports encapsulations were changed to PPP with CHAP PAP authentication. While the routers sub-interfaces were given DOT1Q encapsulation for Inter-Vlan routing. Switch access and trunk ports were given dot1q encapsulation for implementing Vlans. The Network and TransportLayers were secured by the implementation of Cisco’s Extended Access- Lists by the filtering of firewalls, portnumbers. Layer Five of the OSI model was applied by the configuring of remote access of switches and routers. Layer Six, all known passwordsonall devices were encrypted. Layer Seven, non-used services/applications were closed on servers and protected by the use of firewalls. Other technologies and IP services were configured in conjunction with these security measures in order to ensure company protection of devices and data.