Download presentation
Presentation is loading. Please wait.
1
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Lucas Maupin Eastern Kentucky University Network Security/Electronics
2
Project Overview Cisco 3550 Switch Layer 2 and 3 capability
Secure Login Features Can be used in a small home or office network Scales well into larger network designs
3
Motivation Originally designed for home implementation Change of scope
Demonstration of concept To gain Cisco knowledge and expertise Future networking projects
4
Introduction Layer 3 Switch removes need for router
Cost more than switches/less than routers Consolidate into 1 device Perfect for small to large business routing
5
Introduction Windows 10 Machine Linux Mint 17.1
6
Problem Statement Logically Must be able to Inter-VLAN route DHCP
Secure Shell Access Access Lists Physically Wire must be run to patch panel Wall ports must work when connected
7
Assumptions Ports will be functional
Both systems will be able to reach one another upon connection to switch The switch will be able to route
8
Physical Design
9
Logical Design
10
Implementation
11
IMPLEMENTATION
12
Replacing Cisco Firmware
3550 had incorrect software image No Routing No Cryptography Replacement of Cisco Firmware Xmodem- Transfer via console cable
13
Basic commands Hostname Passwords Console VTY Enable Secret
Logging Synchronous Banner Password Encryption
14
VLANs VLAN 1: Default VLAN. No assigned ports
VLAN 2: Student VLAN. Routed VLAN 3: Server VLAN. Routed VLAN 999: Lockdown. Non-routing.
15
VLAN Interfaces Virtual interfaces on the switch
Assigned network addresses and subnet masks Defines the network that the VLAN will operate in Gateway into the VLAN VLSM design
16
Routing Switch will route packets to destined VLAN Directly connected
No routing protocols needed for this network Can be added layer to reach other networks Command: ip routing
17
DHCP Will hand out addresses to devices on respective networks
Domain Name Network Assignment Excluded Addresses Default Router VLAN Interfaces Will hand out addresses to devices on respective networks
18
Secure Shell Encrypted traffic during remote management
2048 RSA encryption key Extremely important for security Replaces Telnet
19
Access lists Applied inbound to VLAN interfaces VLAN 2:
Restrict Telnet Restrict SSH VLAN 3
20
Routing confirmed on different VLANs
21
Routing confirmed on same VLAN.
23
Video Refer to Video
24
Conclusions All features work as intended Future Work
Set up WAN connection to allow network to reach the internet Implement a full physical network instead of a prototype Create an actual server to use on Data VLAN Static Assignment of SERVER IP addresses
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.