Network Documentation ET477.com Prepared by: John Narvaiz Jim Walker Evan Fleischer INFRASTRUCTURE OVERVIEW ET477.com's network consists of six Windows 7 office computers, two Linux servers, one Windows Server 2008, two 2900 series Cisco switches, a 2800 series Cisco router, and a 2600 series Cisco router. The infrastructure has been wired using CAT5 UTP. The domain is broken up into two sites. The Cisco 2600 series router is used at the main site. A fast Ethernet module has been added to give it three physical interfaces. One interface is used to connect to the Internet, one connects to the gigabit port of the 2900 series Cisco main site LAN switch, and the third is used to connect to the remote site router. A CAT5 UTP crossover cable running at 100 Mbps is used to connect the router at the main site to the router at the remote site. A patch cable connects one router interface to a gigabit port on the main site switch. The Cisco 2800 series router is at the remote site along with the other Cisco 2900 series switch which is used for the remote LAN. Only two ports are used on the Cisco 2800 series remote site router. One to connect to the main site router and one to connect to the remote site LAN switch. VLANS AND IP SCHEME Five subnets in the 192.168.0.0/16 IP block are used to create separate VLANS and a connection between the main and remote site routers: 192.168.10.0/25 is used for the server VLAN on the main site. 192.168.20.0/25 is used for the office VLAN on the main site. 192.168.30.0/30 is used for the connection between routers. 192.168.10.128/25 is used for the server VLAN on the remote site. 192.168.20.128/25 is used for the office VLAN on the remote site. 207.108.245.224/29 is our assigned public address block. On both the main and remote site switches, ports Fa0/1 – 4 are assigned to the office VLAN. Ports Fa0/5 – 24 on both switches are assigned to the office VLAN. All servers and the printer are patched into their appropriate server VLAN ports on their respective sites. See the included IP scheme spreadsheet for device and interface IP assignments. AUTHENTICATION User authentication is enabled on the terminal lines, auxiliary ports, and console ports for all routers and switches. User authentication is also configured on all servers. See table below. USER AUTHENTICATION FOR DEVICES Username Password Device(s) group1 et477dotcom all routers and switches, server s1 remote et477dotcom server s2 Administrator et477dotcom server s3 DHCP Both routers are running separate DHCP servers. Server VLAN devices are given static IP’s from server subnet. Office VLAN devices are set to DHCP and receive dynamic addresses along with other necessary information. See the tables below. MAIN SITE DHCP OFFICE POOL Item Description Scope 192.168.20.0 – 192.168.20.127 Exclusions 192.168.20.0 – 192.168.10.10 Domain-name et477.com DNS 192.168.10.5 (s1.et477.com) REMOTE SITE DHCP OFFICE POOL Item Description Scope 192.168.20.128 - 192.168.20.255 Exclusions 192.168.20.128 - 192.168.20.138 Domain-name et477.com DNS 192.168.10.133 (s3.et477.com) NAT AND PAT An ACL was configured that permitted the private IP addresses from within our office network to be translated to a public address. PAT overload was configured using the ACL (access list 1) which established the dynamic source translation. Each server was configured with a static NAT translation for each private IP to a public IP address. See table below. Device Private IP Public Main Office Computers 192.168.20.11 – 192.168.20.254 207.108.245.226 Remote Office Computers 192.168.20.139 – 192.168.20.254 207.108.245.226 S1 192.168.10.5 207.108.245.227 S2 192.168.10.130 207.108.245.228 S3 192.168.10.133 207.108.245.229 SNMP SERVICE OpManager is installed on Windows Server 2008. This GUI management software monitors all devices on the server management VLAN. Network discovery has been performed and the two routers, the two switches, the two Linux servers, and the Windows server are listed and performance information is monitored and displayed. The NetFlow module was also installed in OpManager. The switches and routers are compatible with the NetFlow protocol and are configured globally and by interface to generate bandwidth data to OpManager. Clicking the NetFlow tab in OpManager displays this information. To research specific commands to configure Cisco devices for NetFlow, see the help module in OpManager. OpManager is running as a Windows service at boot time. To access the data click on the OpManager icon on the desktop of the Windows 2008 server. SERVER DATA The main site has one Linux server providing SSH, Web, and DNS services. The web site on server s1 is accessed by www.et477.com. The remote site has two servers. One Linux server providing TFTP and SSH services. The second server is running Windows Server 2008 providing RDP and SNMP services. See the tables below. Server S1 s1.et477.com Details Operating System CentOS Linux Based Static IP Address 192.168.10.5 /25 Services SSH, WEB, DNS Slave DNS RECORDS SOA S1.et477.com A s1.et477.com 207.108.245.227 A s3.et477.com 207.108.245.229 A s2.et477.com 207.108.245.228 NS s1.et477.com NS s3.et477.com CNAME ssh.et477.com – s1.et477.com CNAME www.et477.com – s1.et477.com SERVER S2 s2.et477.com Details Operating System CentOS Linux Based Static IP Address 192.168.10.130 /25 Services SSH, TFTP SERVER S3 s3.et477.com Details Operating System Windows Server 2008 Static IP Address 192.168.10.133 /25 Services RDP, SNMP, DNS Master DNS RECORDS SOA S1.et477.com A s1.et477.com 207.108.245.227 A s3.et477.com 207.108.245.229 A s2.et477.com 207.108.245.228 NS s1.et477.com NS s3.et477.com CNAME ssh.et477.com – s1.et477.com CNAME www.et477.com – s1.et477.com LOGGING, ROUTING, AND BACKUP The correct time and date have been entered into all devices and logging has been configured on the routers and switches. The TFTPgui TFTP server is running at all times on server s2. A folder is on the desktop where the configuration files from the routers and switches are stored and available for retrieval. Both OSPF dynamic routing and static routing protocols are enabled. OSPF was used to share routes between the main and remote site. A static default route was used on the remote router to provide access to the Internet. A static default route was used on the main router to provide a path to the ISP router and Internet access. See the table below. NETWORK PROTOCOL Routing Protocol Network Device(s) OSPF 100 192.168.0.0 0.0.255.255 area 0 Main Router to Remote Router Static IP route 0.0.0.0 0.0.0.0 207.108.245.225 Main Router to Internet Static IP route 0.0.0.0 0.0.0.0 192.168.30.1 Remote Router default route NETWORK PRINTER A network printer was installed and configured on the network and given the static IP address 192.168.10.3. A host A record on our DNS servers was created so that the printer could be installed by the name mike.et477.com. The installation process on each Windows 7 computer was as follows: add new printer, create a TCP/IP port for mike.et477.com, install downloaded driver from HP driver support web page. Once the driver was installed on each computer, installation of the new printer could be completed. See table below. Device IP HP printer 1320n 192.168.10.3 E-MAIL SERVICES A Google apps account was created and verified for the domain et477.com. After the account was created, three user accounts along with e-mail service were created for each group member. MX records were then created on the DNS servers to allow e-mail to be delivered to these accounts. The accounts were tested and verified. See tables below. GOOGLE APPS User Accounts User group1@et477.com Jim Walker JohnN@et477.com John Narvaiz EvanF@et477.com Evan Fleischer DNS RECORDS Details MX [1] Aspmx.l.google.com MX [5] Alt1.aspmx.l.google.com MX [5] alt2.aspmx.l.google.com MX [10] aspmx2.googlemail.com MX [10] aspmx3.googlemail.com ACCESS CONTROL LISTS Four access lists were created, one for PAT overload, two for controlling office VLAN access on both the Main and remote site routers, and one for controlling incoming services from the Internet into the private network. See descriptions below. ACL 1 Standard access list permitting any IP in 192.168.0.0/16 to access the NAT/PAT public overload interface. ACL 101 Extended access list for permitting access to only certain services on particular machines from the internet. Web is allowed to s1 (.227), ssh to s1 and s2(.228), RDP is allowed to s3(.229), DNS is allowed to s1 and s3. Each service is allowed to a particular IP address and explicitly denied to everything else. The last statement allows all other unstated traffic, for example web traffic to and from the office computers. The access list is placed on the interface directly connected to the internet, f0/0 on the main router. The direction is in because the unwanted requests would come from the internet into the network. ACL 110 Extended access list for blocking management services running on the server VLAN 10 to machines on the office VLAN 20. The services explicitly denied are SSH, TFTP and SNMP. The last line permits all other traffic from the office VLAN. The access list is placed on the office VLAN sub-interface of each router, the direction is in so unwanted requests going into the interfaces will be blocked. RDP AND SSH SERVICES SSH services for routers, switches, server s1, and server s2 was configured. Direct access from the internet was blocked by an ACL so that SSH access to the routers and switches remotely was only possible after logging into s1 or s2 using established credentials. Once configured, remote SSH services were available using the Linux bash prompt or the application Putty on Windows. Remote desktop services were enabled on the Windows 2008 server and permitted by the public facing ACL on the router. Any Windows operating system was then able to access the Windows server remotely with the appropriate credentials. This was desirable since the Windows server is running the SNMP software that monitors the network infrastructure.