0% found this document useful (0 votes)
6 views

Project12

The document outlines the design and implementation of a secure campus network system for Martin Luther King University, which has two campuses and approximately 30,000 users. It details the necessary infrastructure components, including firewalls, switches, servers, and VPN configurations, to ensure secure and scalable connectivity between campuses. The project emphasizes performance, redundancy, and security, with specific IP address allocations and technical requirements for the network setup.

Uploaded by

Jabir Bakar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Project12

The document outlines the design and implementation of a secure campus network system for Martin Luther King University, which has two campuses and approximately 30,000 users. It details the necessary infrastructure components, including firewalls, switches, servers, and VPN configurations, to ensure secure and scalable connectivity between campuses. The project emphasizes performance, redundancy, and security, with specific IP address allocations and technical requirements for the network setup.

Uploaded by

Jabir Bakar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Advanced Enterprise Networking Project #12

Design and Implementation of a Secure Campus Network System

Martin Luther King University stands as a prominent institution with a vast footprint, encompassing two
campuses strategically positioned 100 miles apart within the United States. The university's organizational
structure revolves around four key faculties: Health and Sciences, Business, Engineering/Computing, and
Art/Design, both in the main and branch campuses. This diverse array of faculties accommodates the dynamic
needs of both students and staff, fostering a rich academic environment. To ensure seamless connectivity and
technological cohesion, an integral component of the university is its Information Technology (IT) department
situated at the main campus. This central hub orchestrates the management of both campuses, overseeing the
intricate network that binds them together. Currently, the university caters to a substantial community, boasting
a collective headcount of approximately 30,000 users spread across the two campuses. In anticipation of
significant growth on the horizon, the university envisions a doubling of user counts within each department by
the year 2025. This foresight underscores the necessity for a robust and scalable infrastructure, prompting a
strategic emphasis on scalability throughout the design and implementation phases.

At the heart of the technological infrastructure lies the main campus, which hosts a server farm, often referred to
as the Demilitarized Zone (DMZ). Within this fortified zone, essential servers such as DHCP, DNS, FTP, WEB,
Email, and SMTP are strategically housed. Recognizing the importance of secure resource access, users at the
branch campus are equipped with the capability to securely connect to and utilize these centralized servers. This
safeguarded connectivity ensures that educational, informational, and communication resources are readily
available to all users, irrespective of their physical location.
.
As an integral part of the University's ICT infrastructure, the following components have been incorporated:
a) Internet Services Provider (ISP): The University has established a subscription with Airtel to ensure
internet connectivity.
b) Network Security: Two Cisco ASA Firewalls from the 5500-X series have been acquired to enhance
network security. Each campus will have its firewall but the main campus will contain the DMZ or the
server farm.
c) Network Routing: Both the firewalls and the core switches will be used instead of a router.
d) Switching Infrastructure: The network includes two Catalyst 3850 48-Port Switches for each
campus, and Catalyst 2960 48-Port Switches per faculty to ensure robust local network connectivity.
e) Server Hardware and Virtualization: Two physical servers will be utilized for virtualization through
the hypervisor to achieve multiple virtual machines for various services. For redundancy or failover,
we will have two DHCP servers running at the same time.
f) Wireless Infrastructure: Two Cisco Wireless LAN Controllers (WLC) and various Lightweight
Access Points (LAPs) will centralize the management of the wireless network.
g) Site-to-site IPsec VPN: Configure IPsec VPN on the two firewalls to enable secure communication
between the main and the branch campus.

Cloud computing as an important technology is used to connect clients across the world to University services
and resources thus the University system is linked to the Google Cloud platform to facilitate service delivery
thus this is one of the core business functions of the firm. The proposed network should allow the team access to
these resources.

Due to security requirements, it has been decided that all LAN and WLAN users will be on a separate network
segment within the same local area network. The firewall will be used to set security zones and filter traffic that
moves in and out of the zones based on the configured inspection policies. Finally, the two campuses should
have a secure tunnel of communication via an IPsec VPN.

You have been hired as a network security engineer to design the network according to the requirements set by
the senior management. You will consult an appropriate robust network design model to meet the design
requirements. You are required to design and implement a secured, reliable, scalable, and robust network system
that is paramount to safeguarding the Confidentiality, Integrity, and Availability of data and communication.
Requirements
The University places a strong emphasis on achieving top-tier performance, redundancy, scalability, and
availability within its network infrastructure. As such, your task involves creating a comprehensive network
design and executing its implementation. To facilitate this endeavor, the University has designated specific IP
address ranges:
o Management Network: For the management, the IP address range of 192.168.10.0/24 has been allocated.
o WLAN: The WLAN network will operate within the IP address range of 10.10.0.0/16 for the main campus
and 10.11.0.0/16 for the branch campus.
o LAN: For the local area network (LAN), the IP address range of 172.16.0.0/16 for the main campus and
172.17.0.0/16 for the branch campus.
o DMZ: The Demilitarized Zone (DMZ) will be assigned IP addresses from the range 10.20.20.0/27.
o Public Addresses: Public IP addresses from the range 105.100.50.0/30 for the main campus and
205.200.100.0/30 for the branch campus.
Technical Requirements
1. Design Tool: Utilize Cisco Packet Tracer for designing and implementing the network solution.
2. Hierarchical Design: Implement a hierarchical model that incorporates redundancy for enhanced
network resilience.
3. ISPs: Establish connectivity to an Airtel ISP Router within the network infrastructure.
4. WLC: Ensure that each department is equipped with a Wireless Access Point (WAP) to provide
WiFi access to employees, corporate users, external auditors, and guests, all centrally managed by
the Wireless LAN Controllers (WLC).
5. VLAN: Maintain VLANs with the following IDs: 10 for Management, 20 for LAN, 50 for
WLAN, and finally, 199 for Blackhole in which all unused ports are placed.
6. EtherChannel: Implement the Link Aggregation Control Protocol (LACP) for EtherChannel
configuration, enhancing link aggregation efficiency.
7. STP PortFast and BPDUguard: Configure Spanning Tree Protocol (STP) PortFast and
BPDUguard to expedite port transitions from blocking to forwarding states.
8. Subnetting: Utilize subnetting techniques to allocate the appropriate number of IP addresses to
each network group.
9. Basic Settings: Configure fundamental device settings, including hostnames, and console
passwords, enable passwords, banner messages, password encryption, and disable IP domain
lookup.
10. Inter-VLAN Routing: Enable devices in all departments to communicate with one another by
configuring the respective multilayer switch for inter-VLAN routing.
11. Core Switch: Assign IP addresses to Multilayer switches to enable both routing and switching
functionalities.
12. DHCP Server: Ensure that all devices in the network obtain IP addresses dynamically from the
DHCP servers located at the server farm site.
13. HSRP: Implement high-availability router protocols such as HSRP to achieve redundancy, load
balancing, and failover capabilities.
14. Static Addressing: Allocate static IP addresses to devices located in the server room.
15. Routing Protocol: Utilize Open Shortest Path First (OSPF) as the routing protocol to advertise
routes on the firewall, routers, and multilayer switches.
16. Standard ACL for SSH: Establish a simple standard Access Control List (ACL) on the VTY line
to permit remote administrative tasks via SSH only for the Senior Network Security Engineer PC.
17. Cisco ASA Firewall: Configure default static routes, basic settings, security levels, zones, and
policies on the Cisco ASA Firewall to define access control and resource utilization within the
network.
18. Final Testing: Conduct thorough testing to verify proper communication and ensure that all
configured elements function as intended.

You might also like