TND Assignment
TND Assignment
Table of Contents
1.1 Introduction to Cisco Packet Tracer Network Simulator.....................................................2
1. Advantages of Cisco Packet Tracer................................................................................2
2. Disadvantages of Cisco Packet Tracer............................................................................2
3. Packet Tracer features.....................................................................................................2
1.2 What Is Modular Network Design.......................................................................................4
1.3 LAN Network Redundancy..................................................................................................5
1.4 Link Aggregation.................................................................................................................6
1.5 How link Aggregation supporting to Load Balancing.........................................................7
1.5.1 EtherChannel.................................................................................................................7
2.1 Introduction..........................................................................................................................8
2.2 Screenshot and Configuration..............................................................................................8
2.3 Explain Different Types of Switch Redundancy Protocols...............................................19
2.4 Introduction of Spanning Tree Protocols...........................................................................21
2.4.1 Difference between RSTP and PVST.........................................................................21
2.5 Redundant layer 3 switches................................................................................................23
3.1 Installation and Configuration of pf Sense Firewall..........................................................27
3.1.1 Installation of pf Sense..........................................................................................28
3.1.2 pfSense Configuration...........................................................................................31
3.2 Discuss the differences between a public and a private WAN..........................................40
3.3 Hamachi configuration Screenshots..............................................................................42
4.1 Introduction of network monitoring...................................................................................47
4.1.1 What is network monitoring?......................................................................................47
4.1.2 Important is network monitoring................................................................................47
4.1.3 What kind of networks can they monitor?..................................................................47
4.2 What is Nessus?................................................................................................................47
4.2.1 Screenshot Configuring the Policy:.........................................................................48
4.3 Layer by Layer Troubleshooting with a Cisco Router.......................................................56
4.3.1 Router Troubleshooting at OSI Layer 3......................................................................56
4.3.2 Router Troubleshooting at OSI Layer 1 & 2 – Physical & Data link.........................58
4.3.2 Router Troubleshooting at OSI Layers 4 – 7..............................................................59
Harvard Reference...................................................................................................................60
1|Page
Transport Network Design
PART 01
It is easy to use and can be used on the any place you want.
One of the best advantage of it is the Sim mode which otherwise do not available in
the real gear thing.
It enables it’s users to simulate the configuration relating to the Cisco routers
2|Page
Transport Network Design
Other devices
1. LLDP
2. SPAN/RPAN
3. Precision Time Protocol (PTP)
4. Resilient Ethernet Protocol (REP)
5. Improved POE support
6. IOT switch protocol support
3|Page
Transport Network Design
4|Page
Transport Network Design
1. Core layer: Provides optimal transport between sites and high-performance routing. Due
the criticality of the core layer, the design principles of the core should provide an
appropriate level of resilience that offers the ability to recover quickly and smoothly after
any network failure event with the core block.
3. Access layer: Provides workgroup/user access to the network. The two primary and
common hierarchical design architectures of enterprise campus networks are the three-tier
and two-tier layers models.
The server is down! The Internet is down! Systems administrators and network administrators
would prefer never to hear these words—and after all, the words are seldom literally accurate.
How often is an entire server destroyed? How often does the Internet suffer a global failure?
Most system failures are the result of a single component failure. Your job is to find that
component, fix it, and return the system to normal operation.
For crucial systems, you're always looking for ways to predict and reduce downtime. One
approach is to analyze the system's communication path from servers to users and look for
potential single points of failure that is, individual system components that, when broken, can
cause the unavailability of the entire system. After you identify potential single points of
failure, your next challenge is to decide what to do about them. Because money is often a
consideration, you undertake risk analysis—either formally or informally. A considered
response often includes one or more of the following strategies:
Do nothing. Either the risk is low or the cost of a fix is too high.
Acquire cold spare parts. Cold spare parts are components that you can use to replace
broken parts quickly. This strategy comes with moderate cost and risk and is appropriate
when some downtime is acceptable.
Acquire hot spare parts. Hot spare parts are redundant components that are running all the
time, ready to take over for broken components in the system. Clustering, load balancing,
and hot sites are all forms of such redundancy, depending on the part of a system that
needs repair.
As a network administrator, you need to ensure that packets continue to flow. Often,
redundant network connections are your best bet. In a network setting, you can use
redundancy to provide fault tolerance and to increase communications capacity. To build
reliable network communications paths, you need to understand how to implement redundant
LAN and WAN connections.
5|Page
Transport Network Design
Link aggregation is a technique used in a high-speed-backbone network to enable the fast and
inexpensive transmission of bulk data. The best feature of link aggregation is its ability to
enhance or increase the network capacity while maintaining a fast transmission speed and not
changing any hardware devices, thus reducing cost.
Cost Effectiveness
LAG is a very common technique for establishing a new network infrastructure using extra
cabling above the current requirements. Labor cost is much more than the cost of cabling.
Thus, when a network extension is required, the extra cables are used without incurring any
additional labor. However, this can be done only when extra ports are available.
Higher-Link Availability
This is the best feature of LAG. A communication system keeps working even when a link
fails. In such situations, link capacity is reduced but data flow is not interrupted.
Network Backbone
Formerly, there were many techniques used for networking, but IEEE standards are always
preferred. LAG supports network load balancing. Different load balancing algorithms are set
by network engineers or administrators. Furthermore, network speed is increased by small
increments, saving both resources and cost.
Limitations
With all kinds of implementations, each link and piece of hardware is standardized and
engineered to not affect the network efficiency or link speed. Additionally, with single
switching all kind of ports (802.3ad, broadcast, etc.) must reside on a single switch or the
same logical switch.
6|Page
Transport Network Design
1.5.1 EtherChannel
You can create a link aggregation group (LAG) for a group of Ethernet ports. Layer 2
bridging traffic is load balanced across the member links of this group, making the
configuration attractive for congestion concerns as well as for redundancy. You can configure
up to 128 LAG bundles on M Series, and T Series routers, and 480 LAG bundles on MX
Series routers and EX9200 switches. Each LAG bundle contains up to 16 links. (Platform
support depends on the Junos OS release in your installation.)
By default, the hash key mechanism to load-balance frames across LAG interfaces is based
on Layer 2 fields (such as frame source and destination address) as well as the input logical
interface (unit). The default LAG algorithm is optimized for Layer 2 switching. Starting with
Junos OS Release 10.1, you can also configure the load balancing hash key for Layer 2 traffic
to use fields in the Layer 3 and Layer 4 headers using the payload statement. For more
information, see Configuring Load Balancing on a LAG Link. IN a Layer 2 switch, one link
is over utilized and other links are underutilized.
7|Page
Transport Network Design
PART 02
2.1 Introduction
According to the scenario I need to build and explain about the design a LAN diagram for an
organization consisting for three stories building with a proper structural platform. Through
the stimulator cisco packet tracer. So I build the structures and configuration for three stories
building. In below I will explain one by one steps. These building has three floors. Here I am
going to explain about the first floor. This floor using from employees. In this floor most of
employees use for the data entries.
First floor
In first floor should consist around 12 working machines and server with only single
range. This particular floor should only function with one department.
Needed devices (requirements)
Router
Cable type - Copper straight through cable
Switch - 24 port Cisco switch
12 PC
First of all, I selected a router (2620XM) through the ISP. Next I selected a 24 port cisco
switch (2950-24) and chose the generic pcs and one server. For connect the nodes. I should
have select 12 nodes to build this network. And the next step is select a proper cable
connection. In this step according to the network rule when we connect the cables router to
switch we need to choose copper straight through cable. This type of situation we do not
choose copper cross over cable. Because in this process only we have to use copper straight
through cable. If we use copper cross over cable, the whole network doesn’t work. We can’t
send the data packets through the network.
For an example, assume you had a small network. if you connect switch and PCs through the
copper cross over cable. Assume all the configurations are completely done. Now you are
ready to send data packets through the network. Before, you have to check the connection
between sender and receiver. So type “ping” command in to command prompt.
8|Page
Transport Network Design
Step 01
In this exercise, we wanted to create a simple network with 1 router, 1 switches, and 12 pcs
and Server. Then the router should be configured in the Command Line (CLI), with some
commands or steps to follow
Step 02
Configuration of the router to start the configuration, the router must be clicked.
9|Page
Transport Network Design
Step 03
Step 04
10 | P a g e
Transport Network Design
Step 05
The most important steps have been completed and ping commands, etc. can now be
performed in the Command Prompt. The components can also be viewed in a physical view.
(Network cabinet)
Ping PC to PC
Ping Router to PC
Second floor
11 | P a g e
Transport Network Design
In first floor should consist around 15 working machines and 2 server with only Two
range. This particular floor should only function with one department.
Needed devices (requirements)
Router
Cable type - Copper straight through cable
2 Switch - 24 port Cisco switch
15 PC
2 Server
First of all, I selected a router (2620XM) through the ISP. Next I selected a 24 port cisco
switch (2950-24) and chose the generic pcs and one server. For connect the nodes. I should
have select 12 nodes to build this network. And the next step is select a proper cable
connection. In this step according to the network rule when we connect the cables router to
switch we need to choose copper straight through cable. This type of situation we do not
choose copper cross over cable. Because in this process only we have to use copper straight
through cable. If we use copper cross over cable, the whole network doesn’t work. We can’t
send the data packets through the network. For an example, assume you had a small network.
if you connect switch and PCs through the copper cross over cable. Assume all the
configurations are completely done. Now you are ready to send data packets through the
network. Before, you have to check the connection between sender and receiver. So type
“ping” command in to command prompt.
Step 01
In this exercise, we wanted to create a simple network with 1 router, 2 switches, and 15 pcs
and 2 Server. Then the router should be configured in the Command Line (CLI), with some
commands or steps to follow
12 | P a g e
Transport Network Design
Step 02
Configuration of the router to start the configuration, the router must be clicked
13 | P a g e
Transport Network Design
Step 03
Step 04
14 | P a g e
Transport Network Design
Step 05
The most important steps have been completed and ping commands, etc. can now be
performed in the Command Prompt. The components can also be viewed in a physical view.
(Network cabinet)
Ping PC to PC
Ping Router to PC
15 | P a g e
Transport Network Design
Second floor
In first floor should consist around 22 working machines and one normal router one
backup router with only Two range. This particular floor should only function with one
department.
Needed devices (requirements)
2 Router
Cable type - Copper straight through cable
2 Switch - 24 port Cisco switch
22 PC
First of all, I selected a router (2620XM) through the ISP. Next I selected a 24 port cisco
switch (2950-24) and chose the generic pcs and one server. For connect the nodes. I should
have select 12 nodes to build this network. And the next step is select a proper cable
connection. In this step according to the network rule when we connect the cables router to
switch we need to choose copper straight through cable. This type of situation we do not
choose copper cross over cable. Because in this process only we have to use copper straight
through cable. If we use copper cross over cable, the whole network doesn’t work. We can’t
send the data packets through the network. For an example, assume you had a small network.
if you connect switch and PCs through the copper cross over cable. Assume all the
configurations are completely done. Now you are ready to send data packets through the
network. Before, you have to check the connection between sender and receiver. So type
“ping” command in to command prompt.
Step 01
In this exercise, we wanted to create a simple network with 1 router, 2 switches, and 15 pcs
and 2 Server. Then the router should be configured in the Command Line (CLI), with some
commands or steps to follow
16 | P a g e
Transport Network Design
Step 02
Configuration of the router to start the configuration, the router must be clicked
17 | P a g e
Transport Network Design
Step 03
Step 04
The most important steps have been completed and ping commands, etc. can now be
performed in the Command Prompt. The components can also be viewed in a physical view.
(Network cabinet)
Ping
PC to PC
18 | P a g e
Transport Network Design
Ping Router to PC
Unmanaged Switches
19 | P a g e
Transport Network Design
This category of switch is the most cost effective for deployment scenarios that require only
basic layer 2 switching and connectivity. As such, they fit best when you need a few extra
ports on your desk, in a lab, in a conference room, or even at home.
With some unmanaged switches in the market, you can even get capabilities such as cable
diagnostics, prioritization of traffic using default QoS settings, Energy savings capabilities
using EEE (Energy Efficient Ethernet) and even PoE (Power over Ethernet). However, as the
name implies, these switches generally cannot be modified/managed. You simply plug them
in and they require no configuration at all.
Cisco 100 Series switches are good examples of this category.
20 | P a g e
Transport Network Design
21 | P a g e
Transport Network Design
22 | P a g e
Transport Network Design
As Cisco's proprietary version of the Spanning Tree Protocol, they cannot be used on most
third-party switches. Another such Cisco's protocol is the PVST+ (Per-VLAN Spanning Tree
Plus). PVST works only with ISL, which is Cisco's proprietary protocol for VLAN
encapsulation. This is due to the ISL’s embedded Spanning tree ID, which is the default
protocol on Cisco switches that support ISL.
Due to the high penetration of the IEEE 802.1Q VLAN turning standard and PVST's
dependence on ISL, Cisco defined a different PVST+ standard. The PVST+ standard is
compatible with 802.1Q encapsulation. This eventually became the default protocol for Cisco
switches when Cisco discontinued and removed ISL support from its switches.
It think it’s a fairly typical design. like I said i already have tried to experiment with the
design in packet tracer. I used OSPF to route al the networks and used trunks and
etherchannels for the vlans. I know a 3560 doesn’t support stacking, but I didn’t know as
much of HSRP thanks for clearing that up.
In this scenario i want the 2 routers too function as 1 gateway for all traffic but i still want
them to be redundant, this is achieved by HSRP right?
the redundant links between the routers and switches are just normal layer 3 links with IP
addresses assigned to them. The links between the layer 2 and layer 3 switches are trunks and
etherchannels. (Correct me if this is not the right way to go) As routing protocol I am using
OSPF, I have OSPF configured on both routers and switches.
Until this far all went well.
How do i create redundancy the correct way from to layer 2 to layer 3 switches, I probably
have to make ether channels with trunks between them? And what are the correct
configurations of the layer 3 switches? Do I have to give the vlans on both switches an IP so
that if on goes down all traffic is routed to the other IP of the same vlan on the layer 3
switch? What I mean by this is to create two gateways per vlan.
23 | P a g e
Transport Network Design
2.6 First hop redundancy protocols will work for IPv4 and IPv6
If a router or router interface (that serves as a default gateway) fails, the hosts configured
with that default gateway are isolated from outside networks. IN practice, it is common for a
multilayer switch to act as the default gateway for each VLAN in a switched network. This
discussion focuses on the functionality of routing, regardless of the physical device used. End
devices are typically configured with a single IP address for a default gateway. This address
does not change when the network topology changes.
To implement this type of router redundancy, multiple routers are configured to work
together to present the illusion of a single router to the hosts on the LAN, as shown in the
figure. By sharing an IP address and a MAC address, two or more routers can act as a single
virtual router.
The IP address of the virtual router is configured as the default gateway for the workstations
on a specific IP segment.
24 | P a g e
Transport Network Design
1. Virtual router: a set of routers working together to present the illusion of a single router
to the hosts on a LAN segment.
Forwarding router: a device that is part of a virtual router group assigned to the role of default
gateway.
2. Standby router: a device that is part of a virtual router group assigned the role of
alternate default gateway.
3. Virtual MAC address: the layer 2 address returned by ARP for an FHRP gateway.
There are two version of HSRP.
With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx
is the HSRP group.
With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the
HSRP group.
Note: Another case is HSRP for IPv6, in which the MAC address range from
0005.73A0.0000 through 0005.73A0.0FFF.
How it works
Normal working:
1. When frames are sent from host devices to the default gateway, the hosts use ARP to
resolve the MAC address that is associated with the IP address of the default gateway. The
ARP resolution returns the MAC address of the virtual router, which is the Active Virtual
Gateway (AVG).
2. Frames that are sent to the MAC address of the virtual router can then be physically
processed by the currently active router within the virtual router group. A protocol is used to
identify two or more routers as the devices that are responsible for processing frames that are
sent to the MAC or IP address of a single virtual router.
3. Host devices send traffic to the address of the virtual router. The physical router that
forwards this traffic is transparent to the host devices.
25 | P a g e
Transport Network Design
1. The standby router stops seeing Hello messages from the forwarding router.
2. The standby router assumes the role of the forwarding router.
3. Because the new forwarding router assumes both the IP and MAC addresses of the virtual
router, the host devices see no disruption in service.
Redundancy protocols
A redundancy protocol provides the mechanism for determining which router should take the
active role in forwarding traffic. It also determines when the forwarding role must be taken
over by a standby router. The transition from one forwarding router to another is transparent
to the end devices.
The ability of a network to dynamically recover from the failure of a device acting as a
default gateway is known as first-hop redundancy.
Hot standby Router Protocol (HSRP): Cisco-proprietary FHRP. HSRP is used in a group
of routers for selecting an active device and a standby device. In a group of device
interfaces, the active device is the device that is used for routing packets; the standby device
is the device that takes over when the active device fails, or when pre-set conditions are met.
An HSRP active router has the following characteristics:
Responds to default gateway’s ARP requests with the virtual router’s MAC.
Assumes active forwarding of packets for the virtual router.
Sends Hello messages (every 3 second, dead timer is 10 seconds).
Knows the virtual router IP address.
An HSRP standby router has the following characteristics:
Listens for periodic Hello messages.
Assumes active forwarding of packets if it does not hear from the active router.
Verify show standby
HSRP is Cisco proprietary which allows several routers or multilayer switches to
appear as a single gateway IP address.
HSRP has 5 states: Initial, listen, speak, standby and active.
HSRP allows multiple routers to share a virtual IP and MAC address so that the end-
user hosts do not realize when a failure occurs.
The active (or Master) router uses the virtual IP and MAC addresses.
Standby routers listen for Hellos from the Active router. A hello packet is sent every 3
seconds by default. The hold time (dead interval) is 10 seconds.
Virtual MAC of 0000.0C07.ACxx , where xx is the hexadecimal number of HSRP
group.
The group numbers of HSRP version 1 range from 0 to 255. HSRP does support
group number of 0 (we do check it and in fact, it is the default group number if you
don’t enter group number in the configuration) so
HSRP version 1 supports up to 256 group numbers.
HSRP version 2 supports 4096 group numbers.
26 | P a g e
Transport Network Design
PART 03
Once ‘dd’ has finished writing to the USB drive or the CD has been burnt, place the media
into the computer that will be setup as the pfSense firewall. Boot that computer to that media
and the following screen will be presented.
27 | P a g e
Transport Network Design
At this screen, either allow the timer to run out or select 1 to proceed booting into the installer
environment. Once the installer finishes booting, the system will prompt for any changes
desired in the keyboard layout. If everything shows in a native language, simply click on
‘Accept these Settings’.
The next screen will provide the user with the option of a ‘Install pfSense’ or more advanced
install options. For the purposes of this guide, it is suggested to simply use the ‘Install
pfSense’ option.
28 | P a g e
Transport Network Design
The next screen will simply confirm that the user desires to use the ‘Quick/Easy Install’
method which won’t ask as many questions during the installation.
The first question that is likely to be presented will ask about which kernel to install. Again, it
is suggested that the ‘Standard Kernel’ be installed for most users.
When the installer has finished this stage, it will prompt for a reboot. Be sure to remove the
installation media as well so the machine doesn’t boot back into the installer.
29 | P a g e
Transport Network Design
30 | P a g e
Transport Network Design
After the reboot, and the removal of the CD/USB media, pfSense will reboot into the newly
installed operating system. By default, pfSense will pick an interface to set-up as the WAN
interface with DHCP and leave the LAN interface unconfigured.
While pfSense does have a web based graphical configuration system, it is only running on
the LAN side of the firewall but at the moment, the LAN side will be unconfigured. The first
thing to do would be to set an IP address on the LAN interface.
To do this follow these steps:
Take note of which interface name is the WAN interface (em0 above).
Enter ‘1’ and press the ‘Enter’ key.
Type ‘n’ and press the ‘Enter’ key when asked about VLANs.
Type in the interface name recorded in step one when prompted for the WAN interface or
change to the proper interface now. Again this example, ‘em0’ is the WAN interface as it
will be the interface facing the Internet.
The next prompt will ask for the LAN interface, again type the proper interface name and
hit the ‘Enter’ key. In this install, ‘em1’ is the LAN interface.
pfSense will continue to ask for more interfaces if they are available but if all interfaces
have been assigned, simply hit the ‘Enter’ key again.
pfSense will now prompt to ensure that the interfaces are assigned properly.
31 | P a g e
Transport Network Design
The next step will be to assign the interfaces the proper IP configuration. After pfSense
returns to the main screen, type ‘2’ and hit the ‘Enter’ key. (Be sure to keep track of the
interface names assigned to the WAN and LAN interfaces).
NOTE-for this install the WAN interface can use DHCP without any problems but there may
be instances where a static address would be required. The process for configuring a static
interface on the WAN would be the same as the LAN interface that is about to be configured.
Type ‘2’ again when prompted for which interface to set IP information. Again 2 is the LAN
interface in this walk through.
When prompted, type the IPv4 address desired for this interface and hit the ‘Enter’ key. This
address should not be in use anywhere else on the network and will likely become the default
gateway for the hosts that will be plugged into this interface.
The next prompt will ask for the subnet mask in what is known as prefix mask format. For
this example network a simple /24 or 255.255.255.0 will be used. Hit the ‘Enter’ key when
done.
The next question will ask about an ‘Upstream IPv4 Gateway’. Since the LAN interface is
currently be configured, simply hit the ‘Enter’ key.
32 | P a g e
Transport Network Design
The next prompt will ask to configure IPv6 on the LAN interface. This guide is simply using
IPv4 but should the environment require IPv6, it can be configured now. Otherwise, simply
hitting the ‘Enter’ key will continue.
The next question will ask about starting the DHCP server on the LAN interface. Most home
users will need to enable this feature. Again this may need to be adjusted depending on the
environment.
This guide assumes that the user will want the firewall to provide DHCP services and will
allocate 51 addresses for other computers to obtain an IP address from the pfSense device.
The next question will ask to revert pfSense’s web tool to the HTTP protocol. It is strongly
encouraged NOT to do this as the HTTPS protocol will provide some level of security to
prevent disclosure of the admin password for the web configuration tool.
33 | P a g e
Transport Network Design
Once the user hits ‘Enter’, pfSense will save the interface changes and start the DHCP
services on the LAN interface.
Notice that pfSense will provide the web address to access the web configuration tool via a
computer plugged in on the LAN side of the firewall device. This concludes the basic
configuration steps to make the firewall device ready for more configurations and rules.
The web interface is accessed through a web browser by navigating to the LAN interface’s IP
address.
The default information for pf Sense at the time of this writing is as follows:
Username: admin
Password: pfsense
After a successful login through the web interface for the first time, pfSense will run through
an initial setup to reset the admin password.
34 | P a g e
Transport Network Design
The first prompt is for a registration to pfSense Gold Subscription which has benefits such as
automatic configuration backup, access to the pfSense training materials, and periodic virtual
meetings with pfSense developers. Purchasing of a Gold subscription isn’t required and the
step can be skipped if desired.
The following step will prompt the user for more configuration information for the firewall
such as hostname, domain name (if applicable), and DNS servers.
The next prompt will be to configured Network Time Protocol, NTP. The default options can
be left unless different time servers are desired.
35 | P a g e
Transport Network Design
After setting up NTP, the pfSense installation wizard will prompt the user to configure the
WAN interface. pfSense supports multiple methods for configuring the WAN interface.
The default for most home users is to use DHCP. DHCP from the user’s internet service
provider is the most common method for obtaining the necessary IP configuration.
The next step will prompt for configuration of the LAN interface. If the user is connected to
the web interface, the LAN interface has likely already been configured.
However, if the LAN interface needs to be changed, this step would allow for changes to be
made. Make sure to remember what the LAN IP address is set to as this is how the
administrator will access the web interface!
36 | P a g e
Transport Network Design
As with all things in the security world, default passwords represent an extreme security risk.
The next page will prompt the administrator to change the default password for the ‘admin’
user to the pfSense web interface.
The final step involves restarting pfSense with the new configurations. Simply click the
‘Reload’ button.
37 | P a g e
Transport Network Design
After pfSense reloads, it will present the user with a final screen before logging into the full
web interface. Simply click the second ‘Click Here’ to log into the full web interface.
38 | P a g e
Transport Network Design
Now that pfSense is up and running, the administrator will need to go through and create
rules to allow the appropriate traffic through the firewall. It should be noted that pfSense has
a default allow all rule. For security sake, this should be changed but this is again an
administrator’s decision.
39 | P a g e
Transport Network Design
For implementing a Wide Area Network, connection has to be made between two areas,
which are geographically apart. A dedicated link or the internet can be used to establish a link
between networks. The most important consideration to be addressed at the very first stage of
implementing a WAN is, whether a public or a private network is to be used. Analyzing
private and public WAN's
40 | P a g e
Transport Network Design
2. Private Networks: Private Networks are on of the best ways to make connection
between two LAN's, but it presupposes that there are no budget limitations. Private
Networks can be created using many technologies. A private network is built keeping the
needs of the organization in mind. The resultant network can be simple, complex,
expensive or inexpensive, secure or insecure. Fiber based networks are considered better
on the consideration of security over networks using a copper base or even wireless
networks.
Advantages of Private Networks:
The advantages of using Public Networks are:
Security is never an issue with these systems;
It offers a complete managed solution to the communication needs of a company.
Disadvantages of Private Networks:
The disadvantages of using Private Networks are:
It is a costly affair as compared to the PSTN, which is made available at a very nominal
rate.
Requires more administrative control than the public networks.
Specialized staff is required to manage the network, which further adds to the costs.
As the network grows so does the complexity of the same.
41 | P a g e
Transport Network Design
Step 01
Hamachi pages are very slow at times so it is possible that your download hasn’t completed
yet, so grab a coffee and wait if download isn’t complete, but when it finishes -> start
hamachi.msi.
Step 02
Click the power button to get started, and enter a name for your client.
42 | P a g e
Transport Network Design
Step 03
This is the point where you need that Network ID and password what you created earlier in
LogMeIn website. After you have write them, click Create.
Step 04
Log in with same account that you used in LogMeIn website.
43 | P a g e
Transport Network Design
Step 04
Go to My Networks and click Add Clients
Step 05
Click Continue and your Hamachi download should start.
44 | P a g e
Transport Network Design
Step 06
Go to My Networks and click Create Networks.
Step 07
Select Accept automatically and A password is required. At this time when i’m writing this,
there is still option for Free subscription.
45 | P a g e
Transport Network Design
Step 08
Try to ping from one machine to the other and hope it works
46 | P a g e
Transport Network Design
PART 04
47 | P a g e
Transport Network Design
Nessus has a modular architecture consisting of centralized servers that conduct scanning,
and remote clients that allow for administrator interaction. Administrators can include NASL
descriptions of all suspected vulnerabilities to develop customized scans. Significant
capabilities of Nessus include:
Compatibility with computers and servers of all sizes.
Detection of security holes in local or remote hosts.
Detection of missing security updates and patches.
Simulated attacks to pinpoint vulnerabilities.
Execution of security tests in a contained environment.
Scheduled security audits.
The Nessus server is currently available for UNIX, Linux and FreeBSD. The client is
available for UNIX- or Windows-based operating systems.
Under the General settings tab select the “setting type” based on scan requirement, like Port
Scanning, Performance scanning etc… Based on the type Nessus prompts different options
that has to be filled. For example, ‘Port Scanning’ has the following options
48 | P a g e
Transport Network Design
Config 01
49 | P a g e
Transport Network Design
Config 02
The above figure shows the sub-plugins for the plugin Backdoors.
In the above Figure the green one shows the parent plugin and the blue once shows the sub-
plugins or the plugins under the plugin (backdoor). You can enable or disable by simply
clicking on the enabled button.
In the Preferences, you are provided with a drop down box to select different
types of plugins. Select the plugin based on the scan requirement and specify the
settings as per the plugins requirement. Click finish once completed. For
example: configure the database.
Config 03
50 | P a g e
Transport Network Design
SCANS:
Once you are done with configuring the policies as per your scan requirement, you need to
configure the scan details properly. You can do it under Scan tab.
Under the Scan tab, you can create a new scan by clicking New Scan on the top right. Then a
pop up appears where you need to enter the details like Scan Name, Scan Type, Scan Policy
& Target.
Scan Name: The name that you are willing to give to the scan.
Scan Type: You have options to RUN the scan instantly by selecting RUN NOW.
Or you can make a template which you can launch later when you are willing to
run. All the templates are moved under the TEMPLATE tab beside the SCAN
tab.
Scan Policy: Select the policy that you have configured previous in the policies
section.
Select Target: Enter the target machine, which you are planning to test.
Depending upon the targets Nessus takes time to scan the targets.
Results:
51 | P a g e
Transport Network Design
Once the scanning process has been completed successfully, results can be analyzed from
RESULTS menu.
Once the scan has been completed, you can see the name of the scan under the results
section. Click on the name to see the report.
Hosts: Specifies all the target systems that you have scanned.
Vulnerabilities: Displays all the vulnerabilities on the target machine that has been
tested.
Export Results: You can export the results into difference formats like html, pdf,
etc… You can also select an individual section or complete result to export based on
your requirement.
Config 04
The above figure shows configuration settings of Port Scanning for the policy Basic Scan.
You do not need credentials now, so skip the credentials tab and move to Plugins tab. You
need to configure the specific plug-in as per the scan requirement that you are willing to
perform on remote machine.
52 | P a g e
Transport Network Design
Config 05
The above figure shows the plugins that I have enabled for the policy Basic Scan. I have
enabled few plugins for windows machine scan.
Config 06
53 | P a g e
Transport Network Design
Once all the details has been entered click on Create Scan which shows the Scan is running as
shown in the below Figure.
Config 07
Once the scanning has been completed then you can see the results in Results tab. Below
Figure shows the same.
Config 08
54 | P a g e
Transport Network Design
Config 09
The above figure shows the Hosts details. It includes all the targets that you have scanned
during the test. Double clicking on the host address displays the vulnerabilities Nessus have
identified during the test. You can also click on Vulnerabilities tab to check out the
vulnerabilities.
Config 10
The above figure shows the Vulnerabilities that Nessus found during its scan. Based on the
Risk Nessus marks it as high, medium, info etc… Clicking on the Vulnerability gives you
brief description of it.
For example let us go with Netstat ports canner, displays you the following information
55 | P a g e
Transport Network Design
Config 11
The above figure shows the ports opened in the target machine.
In the same manner, you can analyze complete details by clicking on the vulnerabilities.
Nessus also suggests the solutions or remedies for the vulnerabilities with few references.
Every network admin is going to have trouble with network links on a Cisco router, at one
point or another. The best way to troubleshoot any networking issues is to use the OSI model
and go layer by layer. In my article How to use the OSI Model to Troubleshoot Networks, we
talked about the different troubleshooting approaches and how to use them to troubleshoot
your network, in general. In this article, you will find out how to use the OSI model to
troubleshoot, bottom up, using a Cisco router.
Once you have Layers 1 & 2 working, (your show interface command shows the line is “UP
& UP”, it is time to move on to layer 3 – the OSI Network layer. The easiest thing to do here
to see if layer 3 is working is to ping the remote side of the LAN or WAN link from this
router. Make sure you ping as close as possible to the router you are trying to communication
with – from one side across to the other side.
56 | P a g e
Transport Network Design
The easiest way to check the status of Layer 3 – the network layer – is to do a show ip
interface brief, as I did above. Here is an example
For troubleshooting layers 3, all the way up, look at the output of this command:
4.3.2 Router Troubleshooting at OSI Layer 1 & 2 – Physical & Data link
Remember, if Layer 1 isn’t up, nothing else will work so make sure you start here. Examples
of layer 1 are your T1 circuit or your Ethernet cable – physical connectivity. I usually
57 | P a g e
Transport Network Design
troubleshoot layer 1 and layer 2 in union because they are so closely paired. Examples of
layer 2 – data link – are your line protocol (such as Ethernet, ATM, 802.11, PPP, frame-relay,
HDLC, or PPP).
To troubleshoot at these layers, the first thing I would do on your router is a show interface.
Here is an example of a LAN Gigabit Ethernet circuit:
Now, let’s say that you have made it to the point where you can ping from LAN to LAN,
through your WAN. Congratulations – that is a very good sign. If you are still having trouble,
58 | P a g e
Transport Network Design
it must be in OSI Layers4-7. Here are those layers listed out and possible issues you might
experience in each layer:
1. Layer 4 – Transport – in the transport layer are TCP and UDP – you could be have an
ACL or QoS feature blocking or slowing this traffic. Your TCP traffic could also be
fragmented to the point that it could not be reassembled. Another option is that you
may not be receiving an ACK back from your traffic that was successfully sent.
2. Layer 5 – Session – in the session layer are protocols like SQL, NFS, SMB, or RPC –
you could be taking errors on any one of these session protocols. I would recommend
using a protocol analyzer like Wireshark to analyze your session data.
3. Layer 6 – Presentation – in the Presentation layer are data encryption, compression,
and formatting – your VPN tunnel could be failing or perhaps you are sending one
type of data (like a MPEG) and the receiver is trying to view it as a WMV file.
4. Layer 7 – Application – in the Application layer are, of course, your applications like
FTP, HTTP, SCP, TFTP, TELNET, SSH, and more – you could be trying to connect
to a telnet server with the SSH protocol, for example.
5. Layer 8 – End User – the standing joke is that “Layer 8” is the user – the user could
be just mistyping their username or password or you, the network admin, could have
been troubleshooting the wrong IP address all along.
Summary
In summary, using the OSI model to troubleshoot connectivity issues is the fastest and most
efficient way to troubleshoot any network issue. Even if someone calls you to work on a
Windows share problem, all of the same principles in this article apply to that troubleshooting
process. So remember, the next time you work on a network issue – remember the OSI model
and how to use the bottom-up approach to troubleshooting! It could same you a while lot of
time!
59 | P a g e
Transport Network Design
Harvard Reference
https://www.petri.com/layer-by-layer-troubleshooting-ciscohttps://www.cio.com/article/
2438133/networking/network-monitoring-definition-and-solutions.html#whatishttps://
www.wikihow.it/Scaricare-Hamachi
https://topnetworkguide.com/pfsense-installation-and-configuration-step-by-step/
https://frankfu.click/cisco.html
https://www.researchgate.net/publication/
277332036_First_Hop_Redundancy_Protocols_in_IPv6_network_assessment_using_Cisco_
http://www.differencebetween.info/difference-between-rstp-and-pvstinternetworking_devices
http://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=3
https://networklessons.com/spanning-tree/per-vlan-spanning-tree-pvst/
https://blogs.cisco.com/smallbusiness/understanding-the-different-types-of-ethernet-switches
https://community.cisco.com/t5/switching/redundant-layer-3-switches/td-p/2013652
https://documentation.meraki.com/zGeneral_Administration/Tools_and_Troubleshooting/
Link_Aggregation_and_Load_Balancing
https://en.wikibooks.org/wiki/Local_Area_Network_design/
Redundancy_and_load_balancing_at_layer_3_in_LANs
https://www.packettracernetwork.com/labs/lab12-ppp.html
https://translate.google.lk/?hl=en#en/ta/Core%20layer%3A%20Provides%20optimal
%20transport%20between%20sites%20and%20high-performance%20routing.%20Due
%20the%20criticality%20of%20the%20core%20layer%2C%20the%20design%20principles
%20of%20the%20core%20should%20provide%20an%20appropriate%20level%20of
%20resilience%20that%20offers%20the%20ability%20to%20recover%20quickly%20and
%20smoothly%20after%20any%20network%20failure%20event%20with%20the%20core
%20block.
https://en.wikibooks.org/wiki/Local_Area_Network_design/
Advanced_features_on_Ethernet_networks
https://flylib.com/books/en/3.293.1.14/1/
https://brainly.in/qu https://www.packettracernetwork.com/features/packettracer-vs-
gns3.html estion/1782890
https://www.slideshare.net/AliUsman10/cisco-packet-tracer-overview
https://slideplayer.com/user/slides/#login
60 | P a g e