Ccna Full Project Task

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

The scenario is to Configure High available, redundant and secure two

enterprise sites with modular design for each site (CORE –Distribution – Access)
4 private vlans for each site, Data Center contain DHCP, DNS, AAA, WEB, NTP
and syslog servers for a company connected to the other site through VPN, each
site have a wireless network (3 LWAP with wireless controller) and all the 2 sites
Access the internet through NAT on CORE 1
Project Tasks :
1 -Layer 2 Switch’s (Access Layer )
1. configure Basic initial configuration: Hostname, username & password,
2. username : admin password : admin123
3. Secure enable, console & vty modes
4. Enable SSH , ip default getaway & Service password encryption
5. Create VLANS (10,20,30,40) for site 1 ( 2 vlans per switch ,10 interfaces
per vlan ) and (100,100,300,400) for site 2
6. create management vlan for each switch with ip 50 from any vlan
7. identify Trunk links (G0/1-2) for each switch and determine the allowed
vlans through trunk links
8. shutdown unused ports
9. free loop topo (R-PVST) configure RPVST and change vlans priority to
61440
10. Configure BPDU guard for edge ports ( all end user ports )
11. Configure port security with violation shutdown for all end user ports

Layer 3 Switch’s (Distribution)


1. configure Basic initial configuration: Hostname, username & password,
2. Secure enable, console & vty modes
3. Enable SSH , ip default getaway & Service password encryption
4. create vlans (10,20,30,40 for site 1 on active & standby multi-layer) and
(100,200,300,400 40 for site 2 on active & standby multi-layer) by name
only with no physical ports
5. identify trunk links (G1/0/1-2) for each multi-layer switch
6. Configure RPVST and choose the active multi-layer switch to be root
primary and standby to be root secondary for all vlans (you can make load
balance root between Multi-layer switches )
7. Create interface vlan for each vlan and enable ipv4, ipv6 ip for each vlan
to enable intervlan routing (SVI Multi layer switch)
 Vlan 10 ……..192.168.10.0/24 / 192:10::/64
 Vlan 20 ……..192.168.20.0/24 / 192:20::/64
 Vlan 30 ……..192.168.30.0/24 / 192:30::/64
 Vlan 40 ……..192.168.40.0/24 / 192:40::/64
 Vlan 100 ……..172.16.1.0/24 / 172:1::/64
 Vlan 200 ……..172.16.2.0/24 / 172:2::/64
 Vlan 300 ……..172.16.3.0/24 / 172:3::/64
 Vlan 400 ……..172.16.4.0/24 / 172:4::/64
 Vlan 90 for data center …. 10.10.10.0/24 / 10:10::/64

8. Create redundant Gateways (HSRP) for each vlan on active & standby
switch’s (change the router priority statically on active multi-layer switch to
be active router & select ip 100 on each network to be the active getaway
9. Configure Dynamic Routing OSPF 10 for site 1 & EIGRP 10 for site 2 , and
redistribute between them
10. create static floating backup route with admin distance 200 as a
backup for dynamic route
11. enable router interface on each multi-layer switch to connect them
with CORE 1&2
12. configure DHCP IOS server on each multi-layer switch to allow
end user to request dhcp ip and disable it to be a backup for the relay
agent DHCP server on data center

CORE Routers Configurations


1. configure Basic initial configuration :Hostname, username & password,
2. Secure enable, console & vty modes
3. Enable SSH , ip default getaway & Service password encryption
4.
Configure ip addressing v4,v6 as shown in figure 1
configure dynamic Routing with static floating backup
5. Configure redistribution between OSPF 10 & EIGRP 10
6. Configure VPN site to site connection between Core 1 & core 2
7. Configure NAT on core 1 to allow all 2 sites to access internet through
g0/0 in core 1
8. Configure ACL to allow only http,smtp,pop,dhcp,dns traffic and deny any
between all sites and data center servers

Services
 servers with static IP address
 DHCP server ip 10.10.10.10/2
 Syslog server 10.10.10.10/24
 DNS 10.10.10.20/24
 AAA authentication for Wireless 10.10.10.20/24
 NTP server 10.10.10.20/24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy