Presentation is loading. Please wait.

Presentation is loading. Please wait.

SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK

Similar presentations


Presentation on theme: "SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK"— Presentation transcript:

1 SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Lucas Maupin Eastern Kentucky University Network Security/Electronics

2 Project Overview Cisco 3550 Switch Layer 2 and 3 capability
Secure Login Features Can be used in a small home or office network Scales well into larger network designs

3 Motivation Originally designed for home implementation Change of scope
Demonstration of concept To gain Cisco knowledge and expertise Future networking projects

4 Introduction Layer 3 Switch removes need for router
Cost more than switches/less than routers Consolidate into 1 device Perfect for small to large business routing

5 Introduction Windows 10 Machine Linux Mint 17.1

6 Problem Statement Logically Must be able to Inter-VLAN route DHCP
Secure Shell Access Access Lists Physically Wire must be run to patch panel Wall ports must work when connected

7 Assumptions Ports will be functional
Both systems will be able to reach one another upon connection to switch The switch will be able to route

8 Physical Design

9 Logical Design

10 Implementation

11 IMPLEMENTATION

12 Replacing Cisco Firmware
3550 had incorrect software image No Routing No Cryptography Replacement of Cisco Firmware Xmodem- Transfer via console cable

13 Basic commands Hostname Passwords Console VTY Enable Secret
Logging Synchronous Banner Password Encryption

14 VLANs VLAN 1: Default VLAN. No assigned ports
VLAN 2: Student VLAN. Routed VLAN 3: Server VLAN. Routed VLAN 999: Lockdown. Non-routing.

15 VLAN Interfaces Virtual interfaces on the switch
Assigned network addresses and subnet masks Defines the network that the VLAN will operate in Gateway into the VLAN VLSM design

16 Routing Switch will route packets to destined VLAN Directly connected
No routing protocols needed for this network Can be added layer to reach other networks Command: ip routing

17 DHCP Will hand out addresses to devices on respective networks
Domain Name Network Assignment Excluded Addresses Default Router VLAN Interfaces Will hand out addresses to devices on respective networks

18 Secure Shell Encrypted traffic during remote management
2048 RSA encryption key Extremely important for security Replaces Telnet

19 Access lists Applied inbound to VLAN interfaces VLAN 2:
Restrict Telnet Restrict SSH VLAN 3

20 Routing confirmed on different VLANs

21 Routing confirmed on same VLAN.

22

23 Video Refer to Video

24 Conclusions All features work as intended Future Work
Set up WAN connection to allow network to reach the internet Implement a full physical network instead of a prototype Create an actual server to use on Data VLAN Static Assignment of SERVER IP addresses


Download ppt "SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK"

Similar presentations


Ads by Google