Skip to content


1. Overview

This project is based on making an analysis of complex concepts of networking and that includes the concepts of the working principles of networking along with setting up interconnections among a variety of network devices available in Cisco network tracer. Furthermore, this project includes the concepts of the network infrastructure configuration along with active directory configuration in windows server 2008.

2. Aims and Objectives

This is mentionable that this project comprises some specific aims and objectives regarding performing the tasks and they are documented hereunder as follows.

  • Planning and IP implementation of IP addressing.
  • Choosing proper hardware.
  • Planning to manage IP traffic.
  • Installation and configuration of the IP routers
  • Implementation of the services in the network topology.
  • Implementation of the ‘active directory infrastructure
  • VPN configuration.

3. Materials used

2 PCs get chosen in order to run the windows server 2008 and there is a need for 3 network cards present in the system. Windows server 2008 along with student data files is also required.

4. Project specifications

Step 1: Creating a plan for performing IP addressing

In the first step, an ISDFN network has been set up to the internet. This is mentionable that as per the provided network diagram can be seen hereunder there are several routers, hubs, and PCs get interconnected in the overall topology while a cloud server is also there.

Figure 1: Provided network model

(Source: Provided)

Based on the above figure this can be seen that there are overall 4 routers while 7 Hubs and multiple Pcs are there. In such a scenario, Cisco Packet Tracer software gets utilized in order to perform the task. The software gets utilized so that that can be utilized in order to set up the connection.

Figure 2: Built in network model

(Source: Self-created in Cisco)

As per the given network model, the model gets developed in the software by following a specific topology so that the configuration of the IP address along with setting up the default gateway in the subnet mask can be done.

Segment Subnet Address Subnet Mask Host addresses
L 192.168.31..1

Table 1: IP address table

(Source: Self-created)

As seen from the above figure, based on the different segment mentioned in the provided network model, the IP address gets configured and the subnet mask automatically get ‘generated each time after the configuration of the IP

Step 2: Choosing proper devices in the Cisco network

This step is based on making the choice of appropriate network devices inside the framework of Cisco. This is mentionable that, in doing so, the hub series get selected in order to perform the task is the 2901 series of the routers. However, some series get mentioned earlier but due to unavailability, those series could not be performed. All the units that get utilized are nothing but single units while 4 different routers get utilized in order to set up the ISDN connection.

Network Devices Hardware Models
Hub 1 Hub-PT
Hub 2 Hub-PT
Hub 3 Hub-PT
Hub 4 Hub-PT
Hub 5 Hub-PT
Hub 6 Hub-PT
Hub 7 Hub-PT
Router 1 Router PT
Router 2 Router PT
Router 3 Windows server 2008
Router 4 Linux

Table 2: Hardware models

(Source: Self-created)

As seen from the above table, this need to be mentioned that during the configuration process, 7 Hub get selected with the model Hub-PT while Router 1 and the Router 2 belongs to 2901 series. On the other hand, router 3 belongs to windows server 2008 while router 4 comprises a Linux interface (Ccexpert, 2022).

Step 3: Accommodation of the extra IP address requirements

After setting up all required IP addresses and the generation of the subnet mask k, there is a need of adding the PCs. This can be seen in segments A, B, D, and C, 12 PCs get added to each terminal. This need to be mentioned that, in segment E total of 10 Pcs get added while from Hub 6 and Hub 7, 6 Pcs get joined. This is mentionable that during doing so, there has been difficulty regarding the port availability in the Hubs. However, the problem can be solved by adding ports and adding subnets for the configuration process.

Figure 3(a): Addition of Ports

(Source: Self-created)

Figure 3(b): Addition of Ports

(Source: Self-created)

As seen from the above two figures, extra ports get added so that the existing issues regarding port availability can be solved.

Step 4: Access List Creation

This step is based on making the creation of the access list. In doing so, this is mentionable that, the Linux system gets used in order to perform the task while the floppy disk gets utilized so that the required command gets saved. This is mentionable that, the IP address configuration gets done following the addressing scheme as mentioned in the previous steps.

Figure 4(a): Addition of access lists through RIP Routing

(Source: Self-created)

As per the requirements, the above picture is showing that computers on segments G, H, I and J

get connected together while the A, B, C, D, E are the other segments and get connected as seen from the downside picture.

Figure 4(b): Addition of access lists through RIP Routing

(Source: Self-created)

This is mentionable that, as per the requirement that the access list get created following the criteria that the segments of  G, H, I and J  get connected together while the A, B, C, D, E has no connection with the previous segments.

Step 5: Installation and configuration of the IP routers

In this step, the installation and the configuration of the IP routers get done. In this step, windows server 2008 gets utilized to get matched with address schemes. This is how the connectivity of all available segments gets configured. This is mentionable that, 10 static routers get used so that they can be added to the router table can set up the required connection.

Figure 5(a): IP configuration of PC

(Source: Self-created)

Figure 5(b): IP configuration of Router

(Source: Self-created)

Figure 5(c): IP configuration with ipconfig command

(Source: Self-created)

Step 6: Configuration of the Domain Name Server

This step is based on the implementation of the DNS configuration. During doing the implementation of both the case Ip address to name resolution and vice versa have been performed.

Figure 6(a): DNS server setup

(Source: Self-created)

As seen from the above figure, in order to turn on the DNS service, for all the PCs going to be added to the network need to be configured with the ip address. This is mentionable; this step is followed by testing of the domain name with the ip configuration.

Figure 6(b): Further configuration through command prompt and pinging

(Source: Self-created)

As seen from the above figure, the ping is showing success. DNS service get turned on and configuration also seems okay.

Step 7: Implementation of the DHCP services

For the implementation of DHCP, the Linux system gets enabled for dealing with the Network layout diagram. This is mentionable that, during doing so, the Active Directory Domain controller gets utilized.

Figure 7(a): DHCP configuration

(Source: Self-created)

As seen from the above figure, at first there is needed to go in to the configuration mode in which the above code need to be entered. At first there is necessity of excluding addresses that get assigned by DHCP. This is mentionable that, in the next step a subnet has been to the host. This is followed by the enabling the DHCP server.

Figure 7(b): DHCP configuration

(Source: Self-created)

As seen from the above code, this is showing the information’s regarding managing the DHCP pools. The “Linux system” get utilized with this router. This is mentionable the static address of this router get configured as per the requirement.

Figure 7(c): Setting up DHCP services

(Source: Self-created)

Step 8: Administrating Active Directory

In this step, the administration of the active directory gets managed. This is mentionable that, during doing so, a delegation of the control wizard gets done. This is mentionable that, in the process client 1 and client 2 both are responsible for implementing DSET.

Step 9: Addition of second domain

In this step, Active Directory Domain Controller gets used so that domain-specific FSMO roles can be managed. This is mentionable that router 3 has acted as the active directory domain.

Step 10: Configuration of the VPN server

In this step, the configuration of the VPN server gets performed. This is mentionable that, the VPN server is responsible for allowing connections with the use of PPTP protocol.

Figure 8: VPN server set up

(Source: Self-created)

In order to perform this task four basic steps has been followed and they are like creation of the extending ACL along with the creation of the IPSEC transform. The previous steps have been followed by creation of the crypto map and then application of that crypto map in the public interface.

In the console for performing the first step, the following code needs to be written

Router3(config)# ip access-list extended VPN-TRAFFIC

Router3(config-ext-nacl)# permit ip

The above code helps to create extended ACL. In the next step IPSEC creation has been done followed by matching address VPN-TRAFFIC. After this, establishment and the verification of the VPN tunnel get done.


Ccexpert, 2022, Calculating a Subnet Mask

Geeksforgeeks, 2022, Subnetting Implementation in Cisco Packet Tracer

Leave a Reply

Your email address will not be published. Required fields are marked *