You are on page 1of 60

INSTITUT D’ENSEIGNEMENT SUPÉRIEUR DE RUHENGERI

Accredited by Ministerial Order N° 005/2010/MINEDUC of 16 June 2010

Scientia et Lux

FACULTY OF APPLIED FUNDAMENTAL SCIENCE

DEPARTMENT OF COMPUTER SCIENCES

OPTION OF NETWORK ENGINEERING

``

THE DESIGN AND IMPLEMENTATION OF


SECURED INTER CAMPUS NETWORK

CASE STUDY: INES-Ruhengeri

A Dissertation Submitted in Partial Fulfillment the Requirements


for the Award of Bachelor’s Degree of science in Computer
sciences.

By: Elias NSHIMIYIMANA


Reg No: 21/16302

Supervisor: Dr. HABIMANA Theodore

Co-supervisor: NSENGIYUMVA Emmanuel


B.P. 155

Ruhengeri

Rwanda

Mob : +250 788 90 30 30

F : +250 788 90 30 32
Musanze, September 2023 W : www.ines.ac.rw

1 E :info@inac.ac.rw
DECLALATION OF ORIGINALITY

I do hereby declare that work presentation within this dissertation is my own contribution
to the best of my knowledge. The same work has never been submitted to any other
university or institution. I, therefore declare the work is my own for the partial fulfilment
of the award of a bachelor’s degree with honours in Computer Science Department,
Network Engineering option at INES Ruhengeri University.

The candidate name: Elias NSHIMIYIMANA

Signature of the candidate: ...............................................

Date of submission: ...........................................................

i
APPROVAL

This certify the dissertation worked on “the design and implementation of secured inter
campus network” is an original study conducted by Elias NSHIMIYIMANA under
supervision and guidance with Dr. HABIMANA Theodore

The supervisor’s name: Dr. HABIMANA Theodore

Signature of the supervisor: .........................................................

Date of submission: .....................................................................

ii
DEDICATION

To:

My parents,

My sponsor,

My supervisor,

My colleagues,

My classmates,

To anyone who motivated me in the


accomplishment of this research.

iii
ACKNOWLEGEMENT

The study is conducted through the contribution of several people who has spent their time
helping me to carry out this study. For that, words are not enough to express my deepest
appreciation to the almighty God to whom I owe my living; the deep sense of gratitude is
due to Dr. HABIMANA Theodore, supervisor of this study for his valuable guidance,
collaboration and constructive suggestions which helped me to come to the successfully
completion of this study my sincere thanks are conveyed to INES Ruhengeri staff,
particularly the applied fundamental sciences, computer science department lectures to
providing professional supports at various successful stages during the studies program and
for facilitating me to carry out this research and keep guidance. Also, special thanks go to
my parents, parent’s friend heartfelt gratitude to my loving parent and fiends for financial,
moral successful emotional support, my classmates and friend who helped in various ways
for the successful completion of this work, GOD bless you all.

iv
ABSTRACT

The internet is the backbone of all activities done today, all services from different field
such as government, commerce, education, statistics etc. The design of the secured inter
campus network at INES Ruhengeri involved assessing the network requirements and
objectives of the institution. Factors such as the number of campuses, their geographic
locations, and the expected traffic patterns were taken into account. Scalability was also
considered to accommodate future growth and expansion of the institution.

To ensure the security of the inter campus network, several key protocols and mechanisms
were implemented. Virtual private network (VPN) technology was utilized to establish
secure tunnels over public networks, enabling encrypted communication between
campuses. Robust authentication, were implemented to verify the identity and authorization
of network users. Intrusion detection systems and firewalls were deployed to monitor and
prevent unauthorized access attempts and network attacks.

The implementation phase involved deploying the necessary hardware and software
components. Routers, switches, and firewalls, were installed to establish the network
infrastructure. Secure communication protocols, such as IPsec or Secure Sockets
Layer(SSL)/ Transport Layer Security (TLS), were configured on the network devices to
ensure encrypted data transmission. A secured inter-campus network employs encryption
and other security measures to protect data as it travels between campuses. This helps
prevent unauthorized access and data breaches. Rigorous testing and monitoring were
conducted by network administration to ensure the reliability and performance of the
network.

Through the design and implementation of the secured, inter campus network. INES
Ruhengeri achieved a secure environment for communication and data exchange between
its campuses. The network design considered the specific needs of the institution, while the
implemented security protocols and mechanisms ensured the confidentiality and integrity
of transmitted data

v
TABLE OF CONTENTS

DECLALATION OF ORIGINALITY...................................................................i
APPROVAL ....................................................................................................................ii
DEDICATION ............................................................................................................. iii
ACKNOWLEGEMENT............................................................................................iv
ABSTRACT .................................................................................................................... v
TABLE OF CONTENTS ..........................................................................................vi
LIST OF FIGURES ....................................................................................................ix
LIST OF ABBREVIATIONS ................................................................................... x
LIST OF APPENDIX .................................................................................................xi
CHAPTER I: GENERAL INTRODUCTION ................................................... 1
1.1 Background of Study ..................................................................................................... 1
1.2 Problem Statement ......................................................................................................... 1
1.3 Research Objectives ....................................................................................................... 2
1.3.1 General Objective ....................................................................................................... 2
1.3.2 Specific objectives ...................................................................................................... 2
1.3.3 Research Hypotheses .................................................................................................. 3
1.4 Significance of study...................................................................................................... 3
1.5 Study Delimitation ......................................................................................................... 4
1.6 Research Methodology .................................................................................................. 5
1.7 Organization of the project ............................................................................................ 5
CHAPTER II: LITERATURE REVIEW ............................................................ 6
2.1 Introduction .................................................................................................................... 6
2.2 Internet ........................................................................................................................... 6
2.3 DHCP ............................................................................................................................. 6
2.4 Network Protocol ........................................................................................................... 7
2.5 Network Devices ............................................................................................................ 7

vi
2.5.1 Router .......................................................................................................................... 7
2.5.3 Virtual LANs in Switches ........................................................................................... 8
2.6 Cisco Packet Tracer ..................................................................................................... 10
2.7 Intranet ......................................................................................................................... 12
2.9 Peer to Peer Networks .................................................................................................. 12
2.10 Client/Server Networks .............................................................................................. 14
2.11 Related Work ............................................................................................................. 15
CHAPTER III: RESEARCH METHODOLOGY .......................................... 16
3 Introduction ..................................................................................................................... 16
3.1 Choice of Study............................................................................................................ 16
3.1.1 Study Description...................................................................................................... 17
3.2 Data Collection ............................................................................................................ 17
3.3 Data collection techniques ........................................................................................... 17
3.4 Network Design ........................................................................................................... 18
3.5 Network architecture .................................................................................................... 19
3.6 Network Protocol ......................................................................................................... 19
3.7 VLANs Configuration ................................................................................................. 20
3.8 Techniques used to configure (DHCP) ........................................................................ 20
3.9 Domain Name System ................................................................................................. 21
3.10 Wireless connectivity ................................................................................................. 21
3.11 Access Control List Configuration ............................................................................ 23
3.12 Software Requirements .............................................................................................. 24
3.13 Hardware Requirements............................................................................................. 25
3.14 Agile Model ............................................................................................................... 25
CHAPTER IV: DESIGN, RESULTS AND IMPLEMENTATION ............................ 27
4.1 Introduction .................................................................................................................. 27
4.2 INES Ruhengeri network architecture ......................................................................... 27
4.3 Network Devices Configuration .................................................................................. 29
4.3.1 ISP Router Configuration ......................................................................................... 29
4.3.2 INES Main Switch Configuration ............................................................................. 30

vii
4.3.4 DHCP Server Configuration ..................................................................................... 31
4.3.5 Civil Engineering Switch Configuration .................................................................. 32
4.3.6 Kinigi Switch Configuration ..................................................................................... 33
4.3.7 Architecture Switch Configuration ........................................................................... 34
4.3.8 Wi-Fi Configuration.................................................................................................. 34
4.4 Results Presentation ..................................................................................................... 35
4.4.1 VLANs Performance................................................................................................. 35
CHAPTER V: CONCLUSION AND RECOMANDATION. .......................... 37
5.1 Conclusion ................................................................................................................... 37
5.2 Recommendation ......................................................................................................... 38
REFERENCES ................................................................................................................. 39
APPENDECES ................................................................................................................... a

viii
LIST OF FIGURES

Figure 1: Cisco Catalyst Rugged Series Ir1835 – Router (Ali, 2013). ............................... 8
Figure 2: Cisco Catalyst 2960 Plus Ws-C2960+24pc-L 24-Port 10/100 Poe + 2x T/Sfp
Switch .................................................................................................................................. 8
Figure 3: VLANs in Switches (Vykopal). ........................................................................ 10
Figure 4: Cisco Packet Tracer ........................................................................................... 11
Figure 5: Peer-to-Peer network (Mohammed, Hossain, & Md. Masud, 2015). ............... 13
Figure 6: Client/Server network (Mohammed, Hossain, & Md. Masud, 2015). .............. 14
Figure 7: Network design diagram ................................................................................... 18
Figure 8: The Results of DHCP Configuration ................................................................ 21
Figure 9: The Results of DNS Configuration ................................................................... 21
Figure 10: Results of GUS in a Cisco WRT300N WI-FI ................................................. 23
Figure 11: INES Ruhengeri network architecture in Cisco packet tracer ......................... 27
Figure 12: ISP Configuration ............................................................................................ 29
Figure 13:VLAN1 IP configuration in INES main switch ............................................... 30
Figure 14: DHCP Configuration entering networks of VLANs ....................................... 31
Figure 15: Civil Engineering Switch Configuration ......................................................... 32
Figure 16: KINIGI Switch Configuration ......................................................................... 33
Figure 17: Architecture Switch Configuration ................................................................. 34
Figure18: WI-FI Configuration......................................................................................... 35
Figure 19: Computer DHCP Discover Configuration ...................................................... 36

ix
LIST OF ABBREVIATIONS
ACLs: Access Control List
CISCO: Commercial and Industrial Security Cooperation
DHCP: Dynamic Host Configuration Protocol
DNS: Domain Name System
FTP: File Transfer Protocol
GUI: Graphical User Interface
HTTP: Hypertext Transfer Protocol
IDPS: Intrusion Detection Prevention System
INES: InstitutD’enseignementSupérieur De Ruhengeri
IP: Internet Protocol
IPERF: Internet Performance Working Group
IPX: Internetwork Packet Exchange
IT: Information Technology
LAN: Local Area Network
MAC: Media Access Control
NTP: Network Time Protocol
P2P: Peer to Peer
QoS: Quality of Services
RFC: Request for Comments
SMTP: Simple Mail Transfer Protocol
SSL: Secure Sockets Layer
SYS ADMIN: System Administrator
TCP: Transmission Control Protocol
TLS: Transport Layer Security
UDP: User Datagram Protocol
VLANs: Virtual Local Area Networks
VPN: Virtual Private Network
WAN: Wide Area Network
WWW: World Wide Web

x
LIST OF APPENDIX

APPENDIX A: Configuration Router0(R0) ....................................................................... a


APPENDIX B: Configuration ROUTER0(R0) .................................................................. c
APPENDIX C: Configuration ROUTER3(0)..................................................................... d
APPENDIX D: Configuration Hostname and Password Router ........................................ e
APPENDIX E: Configuration DHCP server .......................................................................f
APPENDIX F: Configuration Multilayer-SWITCH ...........................................................f
APPENDIX G: Configuration civil engineering-switch .................................................... g
APPENDIX H: Configuration kinigi switch ...................................................................... g
APPENDIX I: Configuration Server-switch ...................................................................... g
APPENDIX J: Configuration MLT-SW and Router .......................................................... h

xi
CHAPTER I: GENERAL INTRODUCTION

1.1 Background of Study

In modern world, the internet is needed in many fields such as in education, industry,
hospital, IoT, agriculture, etc…, especially, in communication we have many social media,
online trading app and website those are requiring network to make working properly.
However, in many countries of Africa continent, internet is not everywhere especially in
Rwanda, network is running many services such as online banking, information
management using servers, trading through online, blended learning and people know
information access services through network, (Ahmad, 2020)

Many areas such company, government and schools those run type of internet type of
network called Local Area Network (LAN). However, in local area network the internet is
going slowly, because if multiple devices in the LAN are accessing the internet
simultaneously, it can lead to network congestion and slower speeds. This can happen
especially in crowded environments like offices or shared living spaces INES Ruhengeri is
a multidisciplinary institution with multiple campuses spread across different locations.
The existing network infrastructure lacks the necessary security measures to protect
sensitive data and ensure seamless connectivity between campuses. This study addresses
these challenges by proposing a comprehensive “Design and Implementation Plan for
Secured Inter Campus Network”.

1.2 Problem Statement

In network, we are using everyday people need efficient network in their own business,
exclusively government, private company and school and institutions in all fields they have
person who is in charge of network administration called” SYS ADMIN”. The first problem
the major network system in Rwanda is running on LAN technology. However, in LAN it
is not easy to manage computers. As SYS ADMIN, the management of many computers is
not easy. The second problem is security of information. Because we use internet in our

1
daily life, we need security of our information. However, in LAN technology everyone can
access your information. The third issue, as network administrator is to assign devices on
network. The forth problem is the low speed of network.

The problem addressed in this study is the lack of a secured and efficient inter campus
network at INES Ruhengeri. The existing network infrastructure is vulnerable to secured
breaches, compromising the confidentiality, integrity and availability of data and resources.

Communication and collaboration between different campuses are hindered due to the
limitations of the current network setup. Therefore, there is a need to “DESIGN AND
IMPLEMENT A SECURED INTER CAMPUS NETWORK “that addresses these
challenges and provides a reliable and protected network environment for INES Ruhengeri.
(HALDAR, NETWORK DESIGN PROPOSAL FOR A UNIVERSITY, 2018).

1.3 Research Objectives


This research includes two kinds of objectives such as general objective and specific
objectives.

1.3.1 General Objective

The main objective is to design and implement secured inter campus network where case
study is INES-Ruhengeri.

1.3.2 Specific objectives

This project is aimed at the below specific objectives:

 Assess the current network infrastructure and identity vulnerabilities.


 Design a secure and scalable inter campus network architecture.
 Implement the proposed network design, including hardware and software
components.
 Deploy robust security measures to safeguard data and prevent unauthorized access.
 Test and evaluate the performance and security of the implemented network.

2
 Provide recommendations for the ongoing management and maintenance of the
network.

1.3.3 Research Hypotheses

This work has 2 hypotheses:

 Implementing a secured inter campus network at INES Ruhengeri will significantly


enhance communication and collaboration between different campuses.

Subhypotheses1: The implementation of a secured network will improve the speed and
reliability of data transfer between campuses.

Subhypotheses2: The secured network will facilitate real time communication and
collaboration among students, faculty, and staff cross campuses.

 The implementation of robust security measures in the inter campus network will
effectively protect sensitive information and prevent unauthorized access.

Subhypotheses1: the integration of firewalls and intrusion detection systems will mitigate
external threats and unauthorized access attempts.

Subhypotheses2: encryption protocols and access controls will safeguard data


confidentiality and prevent data breaches.

1.4 Significance of study

The findings of this study will contribute to the body of knowledge on designing and
implementing secured enters campus networks in educational institutions. The results will
be specifically relevant to INES Ruhengeri providing them with a practical blueprint for
improving their network infrastructures and ensuring the security of their data and
communication.

3
1.5 Study Delimitation

Involves the process of planning, creating, and establishing a reliable and secured network
infrastructure that connects multiple campuses or locations Here is an overview of key steps
involved in this study:

Needs assessment: begin by conducting a thorough needs assessment to understand the


requirements of the inter campus network. Consider factors such as the number of campus,
their geographic locations, network capacity requirements, desired security measures, and
any specific applications or services that need to be supported.

Network design: Based on the needs assessment, design the network architecture and
topology. Determine the appropriation network devices, such as routers switches, firewalls
and access points to be deployed at each campus. Plan the logical and physical layout of
the network, including the IP addressing scheme. Virtual Local Area Networks (VLANs),
and subnets.

Network segmentation: To enhance security, segment the network into different zones or
segments based on security requirements and access levels, this can be achieved using
VLANs or separate subnets for administrative, academic and guest networks. Implement
access control policies to control communication between these segments.

Security measures: Implement various security measures to protect the inter campus
network. This includes deploying firewalls, Intrusion Detection and Prevention System
(IDPS), Virtual Private Networks (VPNs) for securing remote access, and strong
authentication mechanisms like two authentications. Encryption should be used for
sensitive data transmission.

By clearly defining these delimitations, researchers can provide context for their study and
help readers understand the boundaries within which their findings and recommendations
apply. Delimitations also serve to manage the scope of the study, making it more
manageable and focused on specific aspects of the inter-campus network.

4
1.6 Research Methodology

Several methods like Quality of Service (QoS) implementation, traffic shaping, optimized
routing protocol, network monitoring and analysis, firewalls, encryption, Virtual Private
Network (VPN), and access control and authentication have been used in order to achieve
the goals. During data collection several techniques were used include: Observation,
Documentation, Documentation, Interview.

1.7 Organization of the project

The project was organized in five chapters as follows: the first chapter is general
introduction of the study, the second chapter is literature review, these offered theoretical
concepts, fundamentals tools and languages that support the project and used during the
development of the project, third chapter is research methodology, the fourth chapter is
design results and implementation. This chapter formed by analysis and the development
of the project, and the fifth chapter is conclusion and recommendations, the last chapter
was made up of the conclusion and recommendation for further improvements of the design
software and it concern references and appendices.

5
CHAPTER II: LITERATURE REVIEW

2.1 Introduction
This chapter presents theoretical concepts and fundamental definitions used in this study.
Its main objectives are to provide useful information and an overview on theories and
concepts that lead to the successful of study.

2.2 Internet

The Internet, short for "interconnected network," is a global network of interconnected


computers and computer networks. A vast, decentralized infrastructure allows millions of
devices around the world to communicate, share information, and access a wide range of
resources, services, and content. The internet today is a widespread information
infrastructure, the initial prototype of what is often called the national (or global or galactic)
information infrastructure. Its history is complex and involves many aspects technological,
organizational, and community. And its influence reaches not only to the technical fields
of computer communications but throughout society as we move toward increasing use of
online tools to accomplish electronic commerce, information acquisition, and community
operations (Barry, 2014).

2.3 DHCP

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts, DHCP is a


network protocol used to automate the process of configuration devices on networks. In
addition, DHCP is a network management protocol used to automate the process of
configuring devices op IP networks, thus allowing them to use network services such as
Domain Name System (DNS), Network Time Protocol (NTP), and any communication
protocol based on User Datagram Protocol (UDP) or Transmission Control Protocol (TCP).
Dynamic host configuration protocol service for IPv6 (DHCPv6) is used by nodes to obtain
configuration information, such as the address of DNS recursive name servers, that does
not require the maintenance of any dynamic state for individual clients. A node that uses

6
stateless DHCP must have obtained its IPv6 addresses through some other mechanism,
typically stateless address auto configuration. This document explains which parts of RFC
3315 must be implemented in each of the different kinds of DHCP agents so that agent can
support stateless DHCP (Dorms, 2004).

2.4 Network Protocol

The network protocol is an internet method that allows you to process various things such
as sending messages, downloading items from the internet, or posting then on the internet.
Network protocols are standards that allow computers to communicate. And also network
protocol refers to a set of rules and conventions that govern how data is transmitted,
received, and processed in a computer network. These protocols define the structure and
format of data packets, the methods for error detection and correction, and how devices on
the network communicate and interact with each other. Network protocols are essential for
ensuring the reliable and standardized exchange of information across computer networks
(HALDAR K. K., 2018).

2.5 Network Devices

Typical network devices are described in this section.

2.5.1 Router

A router is a networking device that connects different computer networks together and
directs data traffic between them. It operates at the network layer of the Open Systems
Interconnection(OSI) model and is responsible for forwarding data packets between
devices within a local network (such as a home or office network) and between the local
network and external networks, such as the Internet. A router directs a packet to its network
or Internet destination using routing protocols to exchange information and determine
routing decisions. Routing exists in an intranet between routing devices and on the ISP
network between a border gateway router and a router. Routers maintain routing tables that

7
are consulted every time a packet needs to be redirected from one interface or segment to
another. (Ali, 2013)

Figure 1: Cisco Catalyst Rugged Series Ir1835 – Router (Ali, 2013).

2.5.2 Switch

The Switch is a device in a computer network that connects other devices together. Multiple
data cables are plugged into a switch to enable communication between network devices.
A device that also operates at these higher layers is known as a multilayer switch. Switches,
as in figure 1, are a special type of hub that offers an additional layer of intelligence to
basic, physical layer repeater hubs. A switch must be able to read the MAC address of each
frame it receives. This information allows switches to repeat incoming data frames only to
the computer to which a frame is addressed. This speeds up the network.

Figure 2: Cisco Catalyst 2960 Plus Ws-C2960+24pc-L 24-Port 10/100 Poe + 2x T/Sfp
Switch

(Ali, 2013)

2.5.3 Virtual LANs in Switches

8
VLANs, or Virtual Local Area Networks, are a feature of network switches that allow you
to segment a physical network into multiple logical networks. VLANs enable you to isolate
traffic, improve network security, and optimize network management. In the context of
Virtual LANs (VLANs) and switches, a "trunk" refers to a network link or connection that
is capable of carrying traffic for multiple VLANs simultaneously. Trunks are used to extend
VLANs across multiple switches or network devices, allowing devices in different physical
locations to be part of the same logical network segment.

9
Figure 3: VLANs in Switches (Vykopal).

2.6 Cisco Packet Tracer

Cisco packet tracer is “network simulator software”. This software teaches us how
networks can be configured and it is very much needed if you have taken a course in Cisco.
It gives a real time expensive like other simulating devices. Advantage: it can be used
anywhere; you do not have to carry it. Packet tracer offers an effective, interactive
environment for learning networking concepts and protocols. Most importantly, packet
tracer helps students and instructors create their own virtual “network words” for
exploration, experimentation, and explanation of networking concepts and technologies. In
addition, Cisco packet tracer is powerful network simulation program that allows the
experimentation with network behavior and asks “what is” questions. Packet tracer
provides simulation, visualization and authoring, assessment, and collaboration capabilities
and facilitates the teaching and learning of complex technology concepts. Packet tracer

10
supplements physical equipment in the classroom by allowing students to create a network
with an almost unlimited number of devices, encouraging practice, discovery, and
troubleshooting. With packet tracer, one can build, configure, and troubleshoot networks
using virtual equipment and simulated connections, alone or in collaboration with other
students. Most importantly, packet tracer helps in creating own virtual “network worlds”
for exploration, experimentation, and explanation of networking concepts and
technologies. (vegesna, 2001)

A typical interface is as shown in figure 3.

Figure 4: Cisco Packet Tracer

11
2.7 INTRANET

An intranet is a computer network for information; collaboration tools operational systems,


and other computing services within an organization, usually to the exclusion of access by
outsiders. In addition, an intranet is a computer network that uses internet protocol
technology to share information, operational systems, or computing services within an
organization. This is used in contrast to extranet, a network between organizations, and
instead refers to a network within an organization. Sometimes, the term refers only to the
organization’s internal website, but may be a more extensive part of the organization’s
information technology infrastructure, and may be composed of multiple local area
networks.

The objective is to organize each individual l’s desktop with minimal cost, time and effort
to be more productive, cost efficient, timely, and competitive. An intranet may host
multiple private websites and constitute an important component and focal point of internal
communication and collaboration. Any of the well-known internet protocols may be
founding an intranet, such as Hypertext Transfer Protocol (HTTP), Simple Mail Transfer
Protocol (SMTP), and File Transfer Protocol (FTP). Internet technologies are after
deployed to provide modern interfaces to legacy information systems hosting corporate
data. (Barry, 2014)

2.9 Peer to Peer Networks

In peer-to-peer (p2p) networking, refers to a decentralized network architecture in which


individual computers or devices (referred to as "peers") connect and communicate directly
with each other, rather than relying on a centralized server or intermediary. In a peer-to-
peer network, each peer has equal status and can both provide and consume resources or
services. Unlike traditional client server networking, no devices in a p2p network are
designated solely to serve or to receive data. Peer to peer networks, as in figure 4, are more
commonly implemented where less than ten computers are involved and where strict
security is not necessary. All computers have the same status, hence the term “peer”, and

12
they communicate with each other on an equal footing. Files, such as word processing or
spreadsheet documents, can be shared across the network and all the computers on the
network can share devises, such as printers or scanners, which are connected to any one
computer (Mohammed, Hossain, & Md. Masud, 2015)

Figure 5: Peer-to-Peer network (Mohammed, Hossain, & Md. Masud, 2015).

13
2.10 Client/Server Networks

Client server networks are computer networks that use a dedicated computer (server) to
store data, manage/provide resources and control user access. The server acts as a central
point on the network upon which the other computers connect to a computer that connects
to the server is called a client. In addition, client/server networks, as in figure 5, are more
suitable for larger networks. A central computer, or ‘server’, acts as the storage location for
files and applications shared on the network. Usually the server is a higher than average
performance computer. The server also controls the network access of the other computers,
which are referred to as the ‘client ‘computers.

Some of the standardized protocols that client and servers use to communicate with
themselves include: File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP)
and Hypertext Transfer Protocol (HTTP). Thus client server system can be defined as
software architecture made up of both the client and server, where by the clients always
send requests while the server responds to the requests sent. Client server provides an inter
process communication because it involves the exchange of data from both the client and
server whereby each of them performs different functions. (Wellington, 2000)

Figure 5: Client/Server network (Mohammed, Hossain, & Md. Masud, 2015).

14
2.11 Related Work

Securing an inter-campus network is crucial to protect sensitive data and ensure the privacy
and integrity of communications between campuses. Below are some related works,
research papers, and resources that focus on the design and implementation of secured
inter-campus networks: This would be your primary source of information. Look for books,
research papers, or comprehensive guides that specifically cover the design and
implementation of secure inter-campus networks (Sanad, 2011)

Juniper Networks provides documentation and resources related to secure network design
and implementation. Their materials can be useful for those using Juniper equipment in
their inter-campus networks (Mulyawan, 2011). National Institute of Standards and
Technology (NIST): NIST provides guidelines and documentation on network security,
including secure network design and implementation. Their publications can offer valuable
insights (mohammed, 2013). An online security communities and blogs often feature
discussions and case studies related to secure network design. Websites like Stack
Exchange, Reedits /r/networking, and Spice works can be useful for finding practical
insights (ADEBAYO, 2013)

If you are using specific network equipment vendors like Cisco, Juniper, or Palo Alto,
explore their official documentation and case studies related to secure inter-campus
network deployments. (Jan Vykopal, 2013). Some universities and research institutions
publish their research on secure inter-campus networks. Check the websites of academic
institutions for relevant publications (Al Maskari, 2014). Explore conference proceedings
and journals in the field of network security. Some notable conferences include the ACM
Conference on Computer and Communications Security (CCS) and the IEEE Symposium
on Security and Privacy. (Vykopal, Security Analysis of a Computer Network, 2012)

15
CHAPTER III: RESEARCH METHODOLOGY

3 Introduction
This chapter concerned with techniques of data collection and Tools/Materials used in
implementing and studying this project. Methodology could properly refer to the theoretical
analysis of the methods appropriate to a field of study or to the body of methods and
principles particular to a branch of knowledge.

3.1 Choice of Study


The choice of studying the design and implementation of a secured inter campus network
at INES Ruhengeri stems from the need to address the existing network challenges and
enhance the overall network infrastructure of the institution by conducting a case study
specifically focused on INES Ruhengeri, valuable insights can be gained into the unique
requirements, constraints, and opportunities in their context.

INES Ruhengeri, being a multidisciplinary institution with multiple campuses, relies


heavily on efficient communication and collaboration among its campuses. However, the
current network infrastructure lacks the necessary security measures to protect sensitive
data and ensure seamless connectivity between campuses. This study aims to provide a
comprehensive solution to these challenges and establish a secured inter campus network
that meets the specific needs of INES Ruhengeri.

By conducting a caswe study at INES Ruhengeri, researchers can closely examine the
existing network infrastructure, identify vulnerabilities, understand the organizational
context, and propose tailored recommendation for improvement.

16
Figure 6 INES Ruhengeri

3.1.1 Study Description

An inter-campus network design project involves the planning, implementation, and


optimization of a network infrastructure that connects multiple campuses or locations of an
organization. The goal of such a project is to establish a robust and efficient network that
enables seamless communication and data exchange in INES-Ruhengeri campus while
ensuring security, reliability, and scalability.

3.2 Data Collection


Data collection is a critical step that helped gathering information about the existing
infrastructure, user requirements, and network goals.

3.3 Data collection techniques

A. Observation: Observation is one of the most important research methods in social


sciences and at the same time one of the most diverse. The observation method is
described as a method to observe and describe the behavior of a subject. As the
name suggests, it is a way of collecting relevant information and data by
observing.

17
B. Documentation: This technique or method consists of reading different document
related to project as books, newspapers, memoirs, class notes, web pages, and
papers related to the subject of the project.
C. Documentation: This technique of collecting data had permit the researchers to
consult scientific books, newspapers, memoirs, class notes, web pages, and papers
related to the subject of the project.
D. Interview: Interview methods encompass a range of techniques and approaches
employed to collect information, insights, or data from individuals or groups
through verbal communication. This involves posing relevant questions related to
my project to the controller or other employees.

3.4 Network Design

Designing an inter-campus network is a complex process that involves creating a network


infrastructure that connects multiple campuses or locations within an organization. This
design must support data sharing, communication, and resource access across campuses
efficiently and securely. Network design includes things like network analysis, IP
addressing, hardware selection and implementation. In simple networks, like those found
in most homes and small offices, network design is a straightforward process.

Figure 7: Network design diagram

18
The network was designed using different technologies, which were very important and
crucial for the completion of the task at hand. These technologies deployed are:

A. The network architecture


B. Network connectivity
C. Routing Information Protocol (RIP)
D. Virtual Local Area Network (VLAN)
E. DHCP Configuration
F. Wireless routing configuration
G. Access Control Lists Configuration
H. Network Address Translation

3.5 Network architecture

Network Architecture refers to the way network devices and services are structured to serve
the connectivity needs of client devices. Network device typically include switches and
routers. Types of services include DHCP and DNS. Client devices comprise end-user
device, service and smart things. In addition, network architecture refers to how computers
are organized in a system and how tasks are allocated between these computers, two of the
most widely used types of network architecture are peer to peer and client/server.
Client/server architecture is also called” tiered” because it uses multiple levels. The core
router had one of its interface connected to the ISP and the others are directly connected to
the line. Every department individually connected to the mail line, which is connected to
the ISP.

3.6 Network Protocol

Here are some key techniques used in configuring network protocols for inter-campus
networks:
IP Addressing and Sub netting, Routing Protocols, Quality of Service (QoS), Dynamic
Host Configuration Protocol(DHCP), Domain Name System(DNS), Documentation and
Change Management, etc…

19
A network protocol is an established set of rules that determine how data is transmitted
between different devices in the same network. Essentially, it allows connected devices to
communicate with each other, regardless of any differences in their internal processes,
structure or design. Network protocols are the reason you can easily communicate with
people all over the world, and thus play a critical role in modern digital communications.
The Routing Information Protocol (RIP) was used as it is a hybrid routing protocol
specifically meant for routing numerous routers across an enterprise network. A total
number of 18 routers were configured with the routing protocols. As such with the network
addresses, the adjacent neighbors to each router were recognized. With the network address
assigned, neighboring routers with IP addresses that fall under the same network will
recognize each other. (Wondracek & Kirda, 2008,)

3.7 VLANs Configuration

Due to segmentation of blocks and devices, each switch acted as a VLAN of its own. The
VLANs were first configured from the VLAN data by assigning a number and a name to
each VLAN. For example, the VLANs assigned to the classroom switches were named A-
CLASS and B-CLASS with numbers 100 and 200 respectively. A VLAN is a group of
devices on one or more LANs that are configured to communication as if they were attached
to the same wire, when in fact they are located on a number of different LAN segments.

3.8 Techniques used to configure (DHCP)

Here are some key techniques used in DHCP configuration:


 DHCP Server Configuration
 Client Configuration
 Options Configuration
 IPv6 DHCP
 Testing and Verification

20
Figure 8 : The Results of DHCP Configuration
3.9 Domain Name System (DNS)

The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the internet or a private network. It
associates various information with domain names assigned to each of the participating
entities. Most prominently, it translates more readily memorized domain names to the
numerical IP address needed for locating and identifying computer services and devices
with the underlying network protocols. By providing a worldwide, distributed directory
service, the Domain Name System has been an essential component of the functionality of
the Internet since 1985. (Wellington, 2000)

Figure 9: The Results of DNS Configuration

3.10 Wireless connectivity

Here are some key techniques used in wireless connectivity:


WI-FI (wireless fidelity), Cellular Networks, Mesh Networking.

21
Wireless access points were configured to automatically assign IP address to computers
nearby. This was done to ease excess connection of devices. Added to the fact that there
will be need for flexibility any time a device has to be added to the network. This is a review
of health and sports monitoring research that uses or could benefit from wireless
connectivity. New, enabling wireless connectivity standards are evaluated for their
suitability, and an assessment of current exploitation of these technologies is summarized.

An example of the application is given, highlighting the capabilities of a network of


wireless sensors. Issues of timing and power consumption in a battery-powered system are
addressed to highlight the benefits networking can provide and a suggestion of how
monitoring different biometric signals might allow one to gain additional information about
an athlete or patient is made. For this purpose, a Linksys Wi-Fi was configured as in Figure
10. For it to be connected to the network, its interfaces had to be connected to a switch port.
(Armstrong, 2007)

22
Figure 10: Results of GUS in a Cisco WRT300N WI-FI

3.11 Access Control List Configuration

To secure and control the network from accessing certain networks, the access control list
was configured and assigned for example network administrator can access every pc of
different network but nobody can access administrator pc. So that deny in fa0/0 interface.
Access Control Lists (ACLs) are a collection of permits and deny conditions, called rules
that provide security by blocking unauthorized users and allowing authorized users to
access specific resources. ACLs can also provide traffic flow control, restrict contents of
routing updates, and decide which types of traffic are forwarded or blocked. Normally
ACLs reside in a firewall router or in a router connecting two internal networks. In addition,
an access control list is a set of rules that is usually used to filter network traffic.

ACLs can be configured on network devices with packet filtering capabilities, such as
routers and firewalls. ACLS contains a list of conditions that categorize packets and help

23
you determine when to allow or deny network traffic. They are applied on the interface
basis to packets leaving or entering an interface. (Bierman & Bjorklund, 2018)

Two types of ACLs are available on a Cisco device:

 Standard Access Lists: allow you to evaluate only the source IP address of a packet.

Standard ACLs are not as powerful as extended access lists, but they are less CPU
intensive for the device.

 Extended access lists: allow you to evaluate the source and destination IP address, the
types of layer3-protocol, source and destination port, and other parameters. Extended

ACLs are more complex to configure and require more CPU time than the standard
ACLs, but they allow more granular level of control. (Bierman & Bjorklund, 2018)

3.12 Software Requirements

Setting up an inter-campus network involves both hardware and software requirements

The software requirements for an inter-campus network are crucial for managing and
maintaining network operations, security, and services efficiently. Here there are some of
software that were used in our project:

 DNS and DHCP Software: Configure Domain Name System (DNS) and Dynamic
Host Configuration Protocol (DHCP) servers to simplify name resolution and IP
address assignment
 Routing and Switching Software: Utilize routing protocols and switch
management software to configure and monitor network devices effectively.
 Authentication and Authorization Software: Authentication and authorization
software plays a critical role in network and system security by ensuring that only
authorized users and devices can access resources and perform specific actions
within a network

24
 Cloud Management Tools: If the network incorporates cloud services, consider
cloud management tools such as AWS Management Console or Azure Portal for
cloud resource management

3.13 Hardware Requirements

The hardware requirements for an inter-campus network depend on the specific needs and
scale of the network, but here are the hardware components and considerations that are
typically involved in setting up in my network: router, switch, computer, wireless access
point, cabling, Network Servers,

3.14 Agile Model

Figure 11: Agile development

a. Requirements Analysis: Projects are envisioned, crafted, and prioritized based on


the needs of the users and the goals of the company.

25
b. Planning: Teams are formed, appropriate funding is designated, and initial
requirements are discussed and formulated. There are only initial requirements,
which are likely to change as the process evolves.
c. Design: Development teams work to deliver software-based on requirements and
feedback. Multiple teams are involved in the iterations of the development and
communicate the progress of each respective step.
d. Implementation, coding, or development: Quality Assurance (QA) testing,
documentation development, internal and external training, and final release of the
iteration go into production during this phase of the process.
e. Testing: Teams continue to create, troubleshoot, and support the software product as
it progresses.
f. Deployment: The product is delivered to customers for them to use. Customer
notifications and migrations are considered, along with end-of-life activities.
Agile relies on a continuous, cyclic process that encourages flexibility, experimentation,
and adaptability. This approach includes cross-functional teams that work on iterations of
a product, which is then organized and prioritized based on the evolving needs and wants
of the customer. Business stakeholders and developers work hand-in-hand to create a
product that aligns with both the customer needs and the company goals. Agile combines
each working piece of a project to create the most comprehensive, effective product
possible. Six phases make up the agile approach, but these phases are not set in stone. More
often than not, the phases evolve as the product changes or overlaps one another so there
are multiple stages in the process concurrently. These steps include

26
CHAPTER IV: DESIGN, RESULTS AND IMPLEMENTATION

4.1 Introduction

This chapter focuses on results and implementation of the design and implementation of
secured inter campus network and simulation in Cisco packet tracer. This will show us how
inter campus network will have implemented in our INES successfully.

4.2 INES Ruhengeri network architecture

INES Ruhengeri network architecture made by of different network devices such as ISP
(seen as cloud), main switch, servers, router, wireless access point, network cables and
network end devices.

Figure 12: INES Ruhengeri inter campus network architecture in Cisco packet tracer

27
The Project called “Intercampus Network within INES-Ruhengeri, have different
functionalities based on the security of the network. There are two part applied to the
current network such as the DHCP and VLAN security. The DHCP configured without the
separation of the IP address, this method would cause the IP confusing. But when you are
dividing the Network into different VLANs and based on that provide different network
configured in the DHCP. The confusion of IP address would be removed and also if one
VLAN overlaps on the network the other VLANs would continue to work and also provide
the access to the users. And also there is the application of the port security has done with
different protocols called PPP to HDLC which would protect the ports to be penetrated
with third party or hackers. All that security would be applied will provide secure access in
better way to all users.
There are three different routers used in the same institution in an inter-campus network
because it can serve various purposes and provide several benefits. Each router may have
a distinct role or function in ensuring network reliability, security, and performance. Here
are some reasons why an institution might choose to deploy three different routers
 Geographical Distribution: In a multi-campus network, each campus may have
its own router to manage local network traffic efficiently.
This geographical distribution minimizes the impact of network issues in one
campus on the others
 Security Isolation: Isolating certain network segments or services on separate
routers can enhance security by preventing unauthorized access or minimizing the
impact of a security breach.

28
4.3 Network Devices Configuration

4.3.1 ISP Router Configuration

Figure 13: ISP Configuration

Internet Service Provider (ISP) is a company, which is able to service INES network
through the fiber optic cable. ISP router will be connected on INES network with serial
interface and serial cable. Which has IP address of 20.0.0.0 especially; we have configured
dynamic routing protocol (RIP). Which allow router for ISP and INES router to exchange
packets?

29
4.3.2 INES Main Switch Configuration

Figure 14:VLAN1 IP configuration in INES main switch

INES Main Switch is a type of switch, which is called multilayer switch, either is a center
switch in the whole network, which is connecting other switches such as: Kinigi switch,
administration switch and civil engineering switch. In addition, has DHCP server, which
will provide the IP addresses for all devices, connected to the all switches? Basically,
contains the VLANs, standard for” virtual local area network” DHCP server will deploy
the IP address separate for every host connected for every VLAN.

Additionally, we have main access point. Configured to give us access for wireless devices

30
The IP address configured on VLAN1, will enable DHCP to serve all devices are connected
to VLAN1, all to be turned ON by using no shutdown.

4.3.4 DHCP Server Configuration


Here we use Graphical User Interface(GUI)

Figure 15: DHCP Configuration entering networks of VLANs

Usually, the function of the DHCP server is to serve the IP address on network devices
automatically. The DHCP server of INES network contains a network ID for each VLAN.
In addition, has role to serve the IP address to the all devices connected to all VLANs
separated in the Local Area Network (LAN) Especially DHCP server has the ability to
know the all IP addresses served to the users. Always all devices will fetch or discover the
IP address from DHCP server based the network ID for each VLAN. DHCP has mechanism
such us DHCP response, DHCP discover, DHCP acknowledgement and DHCP offer.

31
4.3.5 Civil Engineering Switch Configuration

Figure 16: Civil Engineering Switch Configuration

Based on the figure above here, if we set VLANs in the switches, We have to set or
configure the interfaces on the VLANs virtual ports.

32
4.3.6 Kinigi Switch Configuration

Figure 17: KINIGI Switch Configuration

Based on the figure above, if we set VLANs in the switches. We have to set or configure
the interfaces on the VLANs virtual ports.

33
4.3.7 Architecture Switch Configuration

Figure 18: Architecture Switch Configuration

Based on the figure above here, if we set the VLANs in the switches, We have to set or
configure the interfaces on the VLANs virtual ports.

4.3.8 Wi-Fi Configuration

Here We Have Configured the Configuration the Password Is ines1111, Username for
Access Point Is INES-WI-FI All Those Are Inserted On Telephone Purpose of Accessing
Wireless.

34
Figure19: WI-FI Configuration

4.4 Results Presentation

4.4.1 VLANs Performance

The VLANs configuration will enable network administration to manage the network
through the DHCP configuration applied to every VLAN. Every VLAN has its own IP
address, for instance VLAN on KINIGI block has Network ID:192.168.20.0/24, on civil
engineering block has 192.168.30.0/24, on architecture block has 192.168.40.0/24.
Especially the VLANs will be managed those IP address. Then the one network can work
without depend on others.

35
Figure 20: Computer DHCP Discover Configuration

As you see above the computers are communicating successful. Means that all data are
transmitted suite or successful, means that all computers have IP address from DHCP
services,

36
CHAPTER V: CONCLUSION AND RECOMANDATION.

5.1 Conclusion

As explained in above chapters, the main purpose of this project was to design and
implementation of a secured inter-campus network at INES Ruhengeri likely yielded
benefits such as improved communication, enhanced security, streamlined resource
sharing, and a foundation for future growth. The conclusion would likely emphasize the
positive impact on the institution's operations and stress the need for continuous monitoring
and adaptation to technological advancements. In concluding the inter-campus network
design, it becomes evident that the establishment of a robust and interconnected network
infrastructure spanning multiple campuses is a pivotal step towards achieving enhanced
communication, efficiency, and resource sharing.

And The design encompasses various elements that contribute to a seamless and secure
networking environment, tailored to meet the organization's evolving needs. The
interconnectedness of the campuses through this network fosters collaboration, data
accessibility, and streamlined operations. By effectively implementing IP addressing,
subletting, and routing protocols, we ensure efficient data flow between campuses,
minimizing latency and bottlenecks. The utilization of VLANs enhances network
segmentation and security, providing isolated environments for specific tasks or user
groups. Security measures are at the forefront of this design, as safeguarding sensitive data
and communications remains paramount.

Incorporating firewalls, intrusion detection systems, and access control mechanisms


fortifies the network against potential threats, ensuring the confidentiality, integrity, and
availability of critical information. In conclusion, the inter-campus network design
represents a holistic approach towards achieving a cohesive, secure, and high-performance
network infrastructure across multiple campuses. By incorporating strategic planning,
advanced technologies, and a commitment to future scalability, this design sets the stage
for improved collaboration, resource sharing, and operational efficiency, ultimately

37
contributing to the organization's success and growth in an interconnected digital
landscape.

5.2 Recommendation

Based on time and the research carried out, to finish this Network design I recommend the
following:

To INES Ruhengeri requesting that INES can continue to maintain a secured inter-campus
network that supports communication, collaboration, and data exchange while prioritizing
the protection of sensitive information and network infrastructure. In addition, INES they
look for materials that would enable students to make hardware implementation. INES
Ruhengeri has multiple campuses that need to securely share resources and data. The
network must ensure the confidentiality and integrity of student and faculty data. Reliable
communication between campuses is essential for academic and administrative purposes.

Compliance with relevant data protection regulations is mandatory. For Network Topology,
Implement a hub-and-spoke topology, with the main campus serving as the hub and satellite
campuses as spokes. This ensures centralized control and monitoring. By following these
recommendations and tailoring them to the specific needs and resources of INES
Ruhengeri, you can design and implement a secured inter-campus network that ensures the
confidentiality, integrity, and availability of data while promoting secure and efficient
communication between campuses. If anyone is able to increase or update my work, he/she
is welcomed to help. If I ever find more time and resources, I may continue to development
of the project.

38
REFERENCES

ADEBAYO, S. A. (2013). NETWORK SECURITY.

Ahmad. (2020). Design and Implementation of Network Security using Inter-VLAN-Routing and
DHCP. Asian Journal of Applied Science and Technology Volume , 1-2.

Al Maskari, D. K. (2014). Security and Vulnerability Issues in University Networks.

Ali, M. N. (2013). Network Architecture and Security Issues in Campus Networks.

Armstrong. (2007). Wireless connectivity for health and sports monitoring. BMJ, 1-2.

Barry, M. (2014). A Brief History of the Internet. See discussions, stats, and author profiles for this
publication, 1-2.

Bierman, & Bjorklund. (2018).

Droms, R. (1997). Dynamic Host Configuration Protocol. Lewisburg: Bucknell University.

HALDAR. (2018). NETWORK DESIGN PROPOSAL FOR A UNIVERSITY. KK HALDAR, 1-2.

HALDAR. (2018). NETWORK DESIGN PROPOSAL FOR A UNIVERSITY. KK HALDAR, 1-2.

HALDAR, K. (2018). NETWORK DESIGN PROPOSAL FOR A UNIVERSITY. KK HALDAR,


1-2.

HALDAR, K. K. (2018). Network Design Protocol. Bangladesh: North Bengal International


University .

Jan Vykopal. (2013). Security Analysis of a Computer Network.

mohammed, n. b. (2013). Network Architecture and Security Issues in Campus Networks.

Mohammed, N. B., Hossain, E. M., & Md. Masud, P. (2015). Design and Implementation of a
Secure Campus Network.

Mulyawan, B. (2011). Campus Network Design and Implementation Using Top down.

O'Malley. (1992). A dynamic network architecture. ACM Journals, 1-2.

Papapanagiotou. (2012, November 12). IMC. Retrieved November 12, 2012, from
https://dl.acm.org/doi/abs/10.1145/2398776.2398814: Papapanagiotou

Sanad. (2011). Security and Vulnerability Issues in University Networks.

Srisuresh, & Gan. (1998).

39
vegesna, s. (2001). IP quality of service.

Vykopal, J. (2012). Security Analysis of a Computer Network.

Vykopal, J. (n.d.). Security Analysis of a Computer Network.

Wellington, B. (2000). Secure Domain Name System (DNS) Dynamic Update. Nominum:
Nominum.

Wondracek & Kirda, E. (2008,). Automatic Network Protocol Analysis. NDSS , 1-2.

40
APPENDECES

a
APPENDIX A: Configuration Router0(R0)
R0>enable
R0#config terminal
R0(config)#int se0/1/0
R0(config-if)#no shutdown
R0(config-if)#exit
Router(config)#int se0/1/1
Ro(config-if)#no shutdown
R0(config-if)#exit
R0(config)#int gig0/0
R0(config-if)#no shutdown
R0(config-if)#exit
R0(config)#do write

R0(config)#int se0/1/0
R0(config-if)#clock rate 72000
R0(config)#int se0/1/1
R0(config-if)#clock rate 72000
R0(config)#exit
R0(config)#do write

R0(config)#int se0/1/0
R0(config-if)#ip address 192.168.40.1 255.255.255.0
R0(config-if)#exit
R0(config)#do write
R0(config)#int se0/1/1
R0(config-if)#ipaddress192.168.40.2 255.255.255.0
R0(config-if)#exit
R0(config)#do write
R0(config)#int gig0/0.10
R0(config-subif)#encapsulation dot1Q 10

b
R0(config-subif)#ip address 192.168.40.3 255.255.255.0
R0(config)#int gig0/0.20
R0(config-subif)#encapsulation dot1Q 20
R0(config-subif)#ip address 192.168.8.1 255.255.255.0
R0(config)#int gig0/0.30
R0(config-subif)#encapsulation dot1Q 30
R0(config-subif)#ip address 192.168.9.1 255.255.255.0
R0(config)#int gig0/0.40
R0(config-subif)#encapsulation dot1Q 40
R0(config-subif)#ip address 192.168.10.1 255.255.255.0
R0(config-subif)#exit
R0(config)#do write

APPENDIX B: Configuration ROUTER0(R0)

Router>en
Router#conf t
Router(config)#int se0/1/0
Router(config-if)#ip address 192.1680.40.2 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#int gig0/0
Router(config-if)#ip address 192.1680.40.3 255.255.255.0
Router(config-if)#no shutdown
Router(config)#do write
Router#config t
Router(config)#int se0/1/0.40
Router(config-subif)#encapsulation dot1Q 40
Router(config-subif)#ip address 192.1680.40.2 255.255.255.0
Router(config-subif)#exit
Router(config)#do write

c
APPENDIX C: Configuration ROUTER3(0)

R3>en
R3#conf t
R3(config)#int se0/1/0
R3(config-if)#ip address 192.1680.20.1 255.255.255.0
R3(config-if)#no shutdown
R3(config-if)#exit
R3(config)#int gig0/0
R3(config-if)#ip address 192.1680.20.2 255.255.255.0
R3(config-if)#no shutdown
R3(config)#do write
R3(config)#int gig0/1
R3(config-if)#ip address 192.1680.20.3 255.255.255.0
R3(config-if)#no shutdown
R3(config-subif)#exit
R0(config)#do write

d
APPENDIX D: Configuration Hostname and Password Router

Router>en
Router#conf t
Router(config)#hostname Router
Router (config)#line console 0
Router(config-line)#password ines1111
Router(config-line)#login
Router(config-line)#exit
Router(config)#
Router(config)#enable password ines1111
Router(config)#no ip domain-lookup
Router (config)#banner motd #NO Unauthorized Access!!!#
Router (config)#service password-encryption
Router (config)#exit
Router (config)#do write
Building configuration…
[OK]

e
APPENDIX E: Configuration DHCP server

DHCP server #conf t


DHCP server (config)#service dhcp
DHCP server (config)#ip dhcp pool vlan80-pool
DHCP server(dhcp-config)#network 192.168.7.2 255.255.255.0
DHCP server ser(dhcp-config)#default-router 192.168.7.1
DHCP server (dhcp-config)#dns-server 192.168.7.1
DHCP server (dhcp-config)# exit
DHCP server (config)#ip dhcp pool vlan90-pool
DHCP server (dhcp-config)#network 192.168.8.0 255.255.255.0
DHCP server (dhcp-config)#default-router 192.168.8.1
DHCP server (dhcp-config)#dns-server 192.168.8.1
DHCP server (dhcp-config)# exit

APPENDIX F: Configuration Multilayer-SWITCH

Multilayer-switch>en
Multilayer-switch#conf t
Multilayer-switch(config)#hostname Main switch
Main switch (config)#line console 0
Main switch (config-line)#password ines1111
Main switch (config-line)#login
Main switch (config-line)#exit
Main switch (config)#
Main switch (config)#enable password ines1111
Main switch (config)#no ip domain-lookup
Main switch (config)#banner motd #NO Unauthorized Access!!!#
Main switch (config)#service password-encryption
Main switch (config)#exit
Main switch (config)#do write

f
Building configuration…..[OK]
APPENDIX G: Configuration civil engineering-switch

civil-sw#en
civil -sw#conf t
civil -sw(config)#int range fa0/3-24
civil -sw(config-if-range)#switchport mode access
civil -sw(config-if-range)#switchport port-security
civil -sw(config-if-range)#switchport port-security maximum
1
civil -sw(config-if-range)#switchport port-security mac-
address sticky
civil -sw(config-if-range)#switchport port-security
violation?
civil -sw(config-if-range)#switchport port-security
violation shutdown
civil -sw(config-if-range)#exit

APPENDIX H: Configuration kinigi switch

Switch>en
Switch#
Switch(config)#int fa1/-24
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access
Switch(config-if-range)#do write

APPENDIX I: Configuration Server-switch

Switch>en
Switch#

g
Switch(config)#int fa1/-24
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 40
Switch(config-if-range)#do write

APPENDIX J: Configuration MLT-SW and Router

MLY-SW>en
MLT-SW#confi t
MLT-SW(config)#int gig 1/0/1
MLT-SW(config-if)#switchport trunk encapsulation dot1q
MLT-SW(config-if)#switchport mode trunk
MLT-SW(config-if)#do wr

You might also like