This repository provides a comprehensive guide to designing and implementing a secure, scalable, and highly available enterprise network infrastructure. It includes detailed configurations, subnetting schemes, and security measures to ensure optimal network performance and protection.
- Project Overview
- Network Strategy
- Network Components
- Network Addressing Requirements
- Technical Details
- Configuration Files
- Subnetting Scheme
- Packet Tracer Simulation
- Usage
- Contributing
- License
The goal of this project is to design an enterprise network that supports critical services with a focus on security, redundancy, and scalability. The design encompasses various network zones, components, and best practices to meet the organization's requirements.
The network is segmented into distinct zones to enhance security and manageability:
- DMZ Zone: Hosts publicly accessible servers such as FTP, Web, Email, and Application servers, providing external access while maintaining security.
- Internal Zone: Contains critical internal services including Active Directory, DHCP, DNS, and RADIUS, ensuring seamless internal operations.
- External Zone: Houses routers connected to two Internet Service Providers (ISPs), providing redundancy and high availability for external connectivity.
- DMZ Zone: Hosts FTP, Web, Email, and Application servers to provide essential services to external users.
- Internal Zone: Contains essential services for managing internal resources, including Active Directory, DHCP, DNS, and RADIUS services.
- External Zone: Facilitates redundant ISP connections through routers.
The network comprises the following key components:
- ISP Connections: Dual ISP links for redundancy.
- Network Security: Cisco ASA Firewalls to enforce robust perimeter security.
- Routing and Switching: Managed by Cisco Firewalls and multi-layer switches for efficient data flow.
- Server Virtualization: Utilizes two physical servers running virtual machines for various network services.
- Wireless Infrastructure: Cisco Wireless LAN Controllers (WLC) managing lightweight access points (LAPs) for wireless connectivity.
- VoIP: Deployment of Voice over IP services for seamless communication.
- External Access: Secure access for external users via the cloud.
The network employs the following IP addressing scheme:
- Management Network:
192.168.100.0/24– Dedicated for network management devices. - WLAN:
10.20.0.0/16– Used for wireless LAN infrastructure. - LAN:
172.16.0.0/16– Internal LAN addressing for general devices. - VoIP:
172.30.0.0/16– Separate IP range for Voice over IP services. - DMZ:
10.11.11.0/27– Addressing for servers in the DMZ zone. - Public IPs:
Vodafone 105.100.50.0/30,Orange 197.200.100.0/30– Public IPs for ISP connections.
Key technical aspects of the network design include:
- Hierarchical Network Design: Implements Core, Distribution, and Access layers to ensure redundancy and minimize single points of failure.
- Wireless LAN Controller (WLC): Each department has its own Wireless Access Point (WAP), centrally managed by the Cisco WLC.
- VLANs:
- VLAN 10: Management network
- VLAN 20: LAN network
- VLAN 50: WLAN network
- VLAN 70: VoIP network
- VLAN 199: Blackhole VLAN for unused or unassigned ports, enhancing security.
- EtherChannel (LACP): Enhances link aggregation efficiency, increases bandwidth, and dynamically resolves physical link failures between devices.
- STP PortFast and BPDU Guard: Prevents broadcast storms and reduces network downtime by configuring STP PortFast and BPDU Guard on edge ports.
- Subnetting: Proper subnetting techniques allocate appropriate IP ranges for each group and service.
- Inter-VLAN Communication: Trunk and access ports facilitate inter-VLAN communication, ensuring VLANs can communicate as needed while maintaining security and segmentation.
- Core Switches: Multi-layer switches enable both routing and switching, ensuring efficient data transmission across VLANs.
- DHCP: A DHCP server dynamically allocates IP addresses to devices within the enterprise.
- HSRP (Hot Standby Router Protocol): Ensures router redundancy for network reliability, allowing seamless failover.
- Static IPs for Servers: Critical servers are assigned static IP addresses to ensure consistent access and reliability.
- OSPF (Open Shortest Path First): Used for internal routing between routers, providing dynamic routing capabilities and efficient path selection.
- ACLs and SSH: Implements Access Control Lists (ACLs) for traffic control and uses SSH for secure remote administration.
The repository includes configuration files for various network devices:
- Routers: Located in the
routers/directory. - Switches: Located in the
switches/directory. - Firewalls: Located in the
firewalls/directory.
These files provide detailed command-line configurations for each device type.
A detailed subnetting scheme is provided in the subnets.txt file, outlining the IP address allocations for different network segments.
The University.pkt file is a Packet Tracer simulation of the network, allowing for practical exploration and testing of the network design.
To explore the network configurations:
- Clone the repository:
git clone https://github.com/osamaloay/Enterprise-Network.git
