Shared Server/Shared Internet Access Application Shared Servers (Mail Server, data server, Internet Access servers) can be access by all user groups, but.

Slides:



Advertisements
Similar presentations
SAVI Requirements and Solutions for ISP IPv6 Access Network ISP-access-01.txt.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 6 – Switch Configuration Switch Configuration Starting the.
V1: port 1-8, untagged Shared Server(s) or Internet Gateway V2: port 9-16, untagged VLAN2 users (PC or hub/switch) V3: port 17-24, untagged VLAN3 users.
Static Routing Exercise AFNOG 2003/ Track 2 # 1 Static Routing Exercise u Unix network interface configuration u Cisco network interface configuration.
/30 Host Name : R1 Serial 0/0/0.1.2 Host Name : R2 Router Lab 3 : 2 - Routers Connection DTE DCE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Static Routing Exercise. What will the exercise involve?  Unix network interface configuration  Cisco network interface configuration  Static routes.
© Tejas Networks India Ltd., 2007, Proprietary Information Rev1.1 Last update 24 Oct 07 DEMO.
VoIP Network Diagram Internet PSTN Network DVX
Instructor & Todd Lammle
Threaded Case Study - RE Miller (Nick Effler, Brian Ford, Cindy Coultas & Teresa Duchardt) April-May, 2000 b Project Goals Implement WAN Access to connect.
1 Access Lists. 2 Introduction ACL (access list)  a list of conditions that categorize packets. Rules:  Sequential order.  Until a match is made. 
Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture.
Small Office Service Serial Router Connects Internal Stations to Shared Broadband Access Service Small Office Serial Router Shared Broadband Line ISP.
Access Lists 1 Network traffic flow and security influence the design and management of computer networks Access lists are permit or deny statements that.
ACACIA Threaded Case Study Seamus Burns Ronan Conaghan Eugene Cullen.
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
H.323/ SIP Internet Telephony Gateway
Networking Components
VIP-2/4/8/16/24 port Series P2P Configuration H.323/ SIP Internet Telephony Gateway Copyright © PLANET Technology Corporation. All rights.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Networking Components
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
– Chapter 5 – Secure LAN Switching
/24 Host Name :R1 Model : 1841 WIC-1T Serial 0/0/0 Basic Configuration.
Asymmetric VLAN with DAP
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Product: DGS-3324SRI FW: 4.10-B15 Boot PROM: 2.00-B04 VLAN 3 VLAN 1
HPLL Demo. How did we get here? Brainstormed how we would utilize the WAN Talked with TEACH about our plan Presented this idea to the TRITON Board Converted.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Washington School District Project. General Requirements: Functional =7-10 Years 100X Growth in LAN 2X Growth in WAN 10X Growth in Internet Connectivity.
1 Semester 3 Threaded Case Study Royal Palm A/3B Ip Siu Tik Tsang Man Wu Wai Hung Wong Lai Ting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Vlan 34 Solution 1: [1] change vlan 33 attached to SG500 to new vlan (vlan 34) [2] SG500 as DHCP server for vlan 34 [3] DHCP ACL.
Page 1 of 28 Group A (VLAN A) 1) VID: 2 2) IP Interface: a) IP Address: b) Subnet Mask: ) Ports: 1x to 8x PC10 IP Address:
Switching Topic 2 VLANs.
Objectives Blue Color VLAN’s Should reach Message Server from all locations Red Color VLAN’s Should not Reach Message Server In Each L2 Switch Blue Color.
OSI Model Topology Patch cable Flow control Common layer 2 device Best path Purpose of Layer 2 devices.
NAT & PAT Network Address Translation Port Address Translation.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
VLAN Cisco (Router/Switch)
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Andre’s VLAN Andre’s VLAN Nykoya’s VLAN Nykoya’s VLAN Patrick’s VLAN Patrick’s VLAN.
VLAN Cisco (Router/Switch)
N5 Building Switches (4500) in Ist Floor L3 In N4 Building
Pertemuan 11 Virtual LANs
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
VceTests VCE Questions Answers
Virtual LANs.
Pass4itsure Cisco Dumps
Firewall Exercise.
Instructor & Todd Lammle
2018 Real CompTIA N Exam Questions Killtest
Cisco Real Exam Dumps IT-Dumps
Access Control Lists CCNA 2 v3 – Module 11
Firewalls Purpose of a Firewall Characteristic of a firewall
Professional Network Services
Access Control Lists (ACLs)
Chabot College ELEC Access Control Lists - Introduction.
Presentation transcript:

Shared Server/Shared Internet Access Application Shared Servers (Mail Server, data server, Internet Access servers) can be access by all user groups, but the access between groups are not allowed (for the performance or security consideration) L2 solution: Asymmetric VLAN or Traffic Segmentation L3 solution: L3 switch + ACL to limit the access between group. Servers V2V3V4

V x Gw V x Gw V1, Servers x V1, Internet Gateway ISP V1: port 1-8 Shared Server(s) or Internet Gateway V2: port 9-16 VLAN2 users (PC or hub/switch) V3: port VLAN3 users (PC or hub/switch) Requirement: 1.V2 and V3 can access V1 for shared Server (with IPX, same network IP, AppleTalk, NetBEUI etc) 2.V2 and V3 can access Internet Gateway for Internet Access using same network IP. 3.No access between V2 and V3. Traffic Segmentation Standalone configuration Config traffic_segmentation 1-24 forwarding_list 1-24 Config traffic_segmentation 9-16 forwarding_list 1-16 Config traffic_segmentation forwarding_list 1-8,17-24

Net x/24 Gw Net1 ( x) can be accessed by Net2, Net3, Net4. Net2, Net3, Net4 cannot access each other Des-3326S Net x/24 Gw Servers Net x/24 Gw Net x/24 Gw L3 Switch Shared Server application Scenario: Only shared IP network can be accessed

# create access_profile rule # permit only x to be accessed by other subnet create access_profile ip destination_ip_mask permit profile_id 10 config access_profile profile_id 10 add access_id 11 ip destination_ip create access_profile ip source_ip_mask permit profile_id 20 config access_profile profile_id 20 add access_id 21 ip source_ip # permit x and x can access themselves. create access_profile ip source_ip_mask destination_ip_mask permit profile_id 30 config access_profile profile_id 30 add access_id 31 ip source_ip destination_ip config access_profile profile_id 30 add access_id 32 ip source_ip destination_ip config access_profile profile_id 30 add access_id 33 ip source_ip destination_ip #### other nets added here # deny others. create access_profile ip source_ip_mask deny profile_id 40 config access_profile profile_id 40 add access_id 41 ip source_ip Rules: 1.If Dest. IP= x, permit 2.If Src. IP= x, permit 3.If DestIP= x and destIP= x, permit 4.If DestIP= x and SrcIP= x, permit 5.If DestIP= x and SrcIP= x, permit 6.Deny Others Test: 1.Net2 ( x), Net3, Net4 PCs can Ping Net1 PC ( x). 2.Net2, Net3, Net4 PCs cannot ping each other. L3 Switch Shared Server application