Home Blog Certs Knowledge Base About

Network Engineer โ€” 17. Corporate Office Network

Corporate Office Network

This post covers the device configurations. Topics like network security and design rationale are broken out into smaller separate posts for readability.

Contents

  1. Network addressing
  2. OSPF and connectivity verification
  3. STP, HSRP
  4. DHCP and L2 Security
  5. ISP, PAT, FTP, NTP

Network addressing

Private address ranges 172.16.0.0/16 and 10.0.0.0/8 were chosen to avoid subnet overlap when setting up remote access for employees in the future.

The network follows Cisco’s Enterprise Campus Architecture โ€” a three-tier hierarchical model. The traffic split is approximately 80% internal and 20% external. Here’s what each tier handles:

Access Layer โ€” each device handles no more than ~5% of total enterprise traffic on average.

Distribution Layer โ€” each device handles no more than ~20% of total enterprise traffic on average.

Core Layer โ€” each device handles no more than ~80% of total enterprise traffic on average (up to 100% is acceptable).

Traffic is divided into 9 VLANs:

2    ENGINEER
3    ACCOUNTING
4    LAWYER
5    SKLAD
6    PROVISION
7    IT
20   MANAGEMENT
21   MANAGEMENT

VLAN 20 MANAGEMENT was also added when deploying Windows Server in the 3rd Distribution block. The entire enterprise network is divided into 3 Distribution blocks connected hierarchically:

Block 1: D-SW1 and D-SW2

Block 2: D-SW3 and D-SW4

Block 3: FarmDistSW1 and FarmDistSW2

Everything below these devices is L2; everything above is L3.


STP, HSRP

HSRP is used for first-hop redundancy at the L2/L3 boundary for the first two blocks. The first challenge was STP (PVST), which builds a spanning tree per VLAN. The problem: STP blocks ports, causing traffic to route through access switches and breaking the hierarchical model.

Block 1 (D-SW1 and D-SW2) has 3 traffic domains: VLAN 2, 3, 20 โ€” so 3 STP trees must align with the hierarchy. Root Primary and Root Secondary must be set manually.

Block 2 has 5 STP trees to configure.

Example configuration using D-SW1:

D-SW1 โ€” STP priorities + HSRP + Loopback

enable
configure terminal
spanning-tree vlan 2,20 priority 24576
spanning-tree vlan 3 priority 28672

interface Vlan2 ip address 172.16.2.251 255.255.255.0 ip helper-address 5.5.5.11 standby 0 ip 172.16.2.1 standby 0 priority 150 standby 0 preempt

interface Vlan3 ip address 172.16.3.251 255.255.255.0 ip helper-address 5.5.5.11 standby 0 ip 172.16.3.1 standby 0 preempt

interface Loopback0 ip address 5.5.5.1 255.255.255.255 end copy running-config startup-config

Same configuration applies to the other L3 Distribution switches.


OSPF and connectivity verification

IP addresses were assigned on all Router and L3 Switch interfaces, and OSPF was configured for dynamic routing.

D-SW1 โ€” OSPF config

enable
configure terminal
router ospf 1
 router-id 1.1.1.1
 network 5.5.5.1 0.0.0.0 area 0
 network 10.0.1.0 0.0.0.3 area 0
 network 10.0.2.0 0.0.0.3 area 0
 network 172.16.2.0 0.0.0.255 area 0
 network 172.16.3.0 0.0.0.255 area 0
 network 172.16.20.0 0.0.0.255 area 0

interface Ethernet1/2 no switchport ip address 10.0.1.1 255.255.255.252 ip ospf dead-interval 20 duplex auto

interface Ethernet1/3 no switchport ip address 10.0.2.1 255.255.255.252 ip ospf dead-interval 20 duplex auto end copy running-config startup-config

Failover and convergence were tested at this stage.


DHCP and L2 Security

DHCP

DHCP server โ€” excluded addresses + pools (all VLANs)

enable
configure terminal
ip dhcp excluded-address 172.16.2.1
ip dhcp excluded-address 172.16.3.1
ip dhcp excluded-address 172.16.4.1
ip dhcp excluded-address 172.16.5.1
ip dhcp excluded-address 172.16.6.1
ip dhcp excluded-address 172.16.7.1
ip dhcp excluded-address 172.16.20.1 172.16.20.5
ip dhcp excluded-address 172.16.21.1
ip dhcp excluded-address 172.16.21.5 172.16.21.8
ip dhcp excluded-address 172.16.2.251 172.16.2.252
ip dhcp excluded-address 172.16.3.251 172.16.3.252
ip dhcp excluded-address 172.16.3.253 172.16.3.254
ip dhcp excluded-address 172.16.4.253 172.16.4.254
ip dhcp excluded-address 172.16.5.253 172.16.5.254
ip dhcp excluded-address 172.16.6.253 172.16.6.254
ip dhcp excluded-address 172.16.7.253 172.16.7.254

ip dhcp pool VLAN2 network 172.16.2.0 255.255.255.0 default-router 172.16.2.1 dns-server 192.168.1.1

ip dhcp pool VLAN3 network 172.16.3.0 255.255.255.0 default-router 172.16.3.1 dns-server 192.168.1.1

ip dhcp pool VLAN4 network 172.16.4.0 255.255.255.0 default-router 172.16.4.1 dns-server 192.168.1.1

ip dhcp pool VLAN5 network 172.16.5.0 255.255.255.0 default-router 172.16.5.1 dns-server 192.168.1.1

ip dhcp pool VLAN6 network 172.16.6.0 255.255.255.0 default-router 172.16.6.1 dns-server 192.168.1.1

ip dhcp pool VLAN7 network 172.16.7.0 255.255.255.0 default-router 172.16.7.1 dns-server 192.168.1.1 end copy running-config startup-config

VPCS โ€” DHCP lease verification

VPCS> ip dhcp
DORA IP 172.16.2.2/24 GW 172.16.2.1

VPCS> show ip NAME : VPCS[1] IP/MASK : 172.16.2.2/24 GATEWAY : 172.16.2.1 DNS : 192.168.1.1 DHCP SERVER : 10.0.19.1 DHCP LEASE : 86394, 86400/43200/75600 MAC : 00:50:79:66:68:1d MTU : 1500

Switching security features configured:

  1. Port-security
  2. Storm Control
  3. DHCP Snooping
  4. IP Source Guard
  5. Dynamic ARP Inspection

Some technologies had to be dropped due to firmware limitations.

Port-security

Port-security limits which MAC addresses can send frames through a port โ€” primarily a defense against MAC flooding attacks. Sticky learning is not used here since each port is limited to 2 MAC addresses, making static mode sufficient.

AccSW1 โ€” port-security on access ports

enable
configure terminal
interface Ethernet0/2
 switchport access vlan 2
 switchport mode access
 switchport port-security maximum 2
 switchport port-security

interface Ethernet0/3 switchport access vlan 2 switchport mode access switchport port-security maximum 2 switchport port-security end copy running-config startup-config

Configure on access ports only at the access layer.

Storm Control

Protects against broadcast storms by rate-limiting traffic when it exceeds a threshold. Not supported on these firmware images.

DHCP Snooping

Protects against DHCP-based attacks by distinguishing trusted (server-facing) and untrusted (client-facing) ports.

AccSW1 โ€” DHCP Snooping

enable
configure terminal
interface Ethernet0/0
 ip dhcp snooping trust

interface Ethernet0/1 ip dhcp snooping trust

ip dhcp snooping ip dhcp snooping vlan 2 no ip dhcp snooping information option ip dhcp relay information trust-all

interface Ethernet0/2 ip dhcp snooping limit rate 10

interface Ethernet0/3 ip dhcp snooping limit rate 10 end copy running-config startup-config

no ip dhcp snooping information option removes option 82 that snooping appends โ€” without it, DHCP Discover frames are dropped at the Distribution layer.

IP Source Guard

Filters IP traffic on L2 interfaces based on the DHCP snooping binding table โ€” defends against IP spoofing.

AccSW1(config-if)# ip verify source port-security

Traffic stopped flowing after this command and troubleshooting was unsuccessful โ€” skipped.

Dynamic ARP Inspection

Protects against ARP spoofing attacks.

AccSW1 โ€” Dynamic ARP Inspection

enable
configure terminal
ip arp inspection vlan 2

interface Ethernet0/0 ip arp inspection trust

interface Ethernet0/1 ip arp inspection trust

interface Ethernet0/2 ip arp inspection limit rate 2

interface Ethernet0/3 ip arp inspection limit rate 2 end copy running-config startup-config


FTP, AAA server (Tacacs+), 3rd Distribution block, ISP, PAT

Internet access is provided through the 3rd Distribution block, which connects to Edge routers. The Edge routers implement PAT to translate private addresses into a single public IP. A dual-homed topology is used for provider redundancy.

PAT

E-R1 โ€” PAT config

enable
configure terminal
interface Ethernet0/0
 ip address 10.0.12.2 255.255.255.252
 ip nat inside

interface Ethernet0/1 ip address 10.0.13.2 255.255.255.252 ip nat inside

interface Ethernet0/2 ip address 212.22.48.6 255.255.255.252 ip nat outside

ip nat inside source list 1 interface Ethernet0/2 overload ip route 0.0.0.0 0.0.0.0 212.22.48.5

access-list 1 permit 172.16.0.0 0.0.15.255 access-list 1 permit 172.20.20.0 0.0.0.255 end copy running-config startup-config

Windows Server 2012 with FTP Server is deployed in the 3rd block, connected with 2 bridged network adapters for HSRP-based failover.

interface Vlan20
 ip address 172.20.20.251 255.255.255.0
 standby 1 ip 172.20.20.1
 standby 1 priority 150
 standby 1 preempt

interface Ethernet1/3
 switchport access vlan 20
 switchport mode access

LACP

EtherChannel is configured on each distribution block.

D-SW4 โ€” LACP EtherChannel config + verification

enable
configure terminal
interface Port-channel1
 switchport trunk encapsulation dot1q
 switchport mode trunk

interface Ethernet1/0 switchport trunk encapsulation dot1q switchport mode trunk channel-group 1 mode active

interface Ethernet1/1 switchport trunk encapsulation dot1q switchport mode trunk channel-group 1 mode active

port-channel load-balance src-dst-mac

D-SW4#show etherchannel summary Group Port-channel Protocol Ports ——+————-+———–+———————————————– 1 Po1(SU) LACP Et1/0(P) Et1/1(P) end copy running-config startup-config

FTP

Automatic config archiving to FTP server on all devices:

login: admin | password: cisco

archive
 path ftp://admin:cisco@172.20.20.5/FarmDistSW1.txt
 write-memory
 time-period 360

NTP

Edge routers as NTP servers:

ntp source Loopback0
ntp master 5
ntp peer 5.5.5.8
ntp server ntp3.stratum2.ru
ntp server 1.ru.pool.ntp.org prefer

NTP clients:

ntp update-calendar
ntp server 5.5.5.8
ntp server 5.5.5.7 prefer

Network Engineer Course | Lab 17