Back to Projects

Office Network Infrastructure

Network Segmentation & Security Implementation

A small company running on a flat network and employees from other departments might gain potentially unauthorized access of other department devices. That might arise the security concern and may lead to unauthorized access to the system files and resources.

Problem

A small company running on a flat network and employees from other departments might gain potentially unauthorized access of other department devices. That might arise the security concern and may lead to unauthorized access to the system files and resources. They wanted to have separate networks for departments such as IT, FINANCE, SALES and GUEST. By creating a separated network for each group of devices, we can reduce the attack surface and shrink down the broadcast domain for better efficiency and speed.

Objectives

  • Secure and Efficient Network

  • Internet should be accessible by everyone

  • Only IT department can access others departments network

  • Create isolated broadcast domains for each groups (IT, HR, Finance, Guest & Security)

Logical Network Topology

Internet

ISP

Edge Router

Firewall

Core Switch

Distribution

Security

VLAN 40

192.168.1.128/27

HR Dept

VLAN 10

192.168.1.0/26

IT Dept

VLAN 30

192.168.1.64/26

Finance

VLAN 20

192.168.0.128/25

Guest

VLAN 50

192.168.0.0/25

IP Scheme Calculation

  • Small company usually have up to 10-20 employees per department
  • We use VLSM ranging from /25 to /27 based on department size
  • One VLAN per department
  • Assuming 20 employees x 3 devices per employee = 60 hosts per department
  • For 50% future growth: 60 x 1.5 = 90 IPs per department
  • Current subnets: 5 departments + 2 point-to-point links = 7 subnets
  • With 50% growth: 7 x 1.5 = 10.5, rounded up to 11 subnets
  • Total IP requirement: 90 IPs x 11 subnets = 990 IPs
  • To contain 990 IPs, we need a parent block with at least 1024 IPs
  • Parent IP block: 192.168.0.0/22

IP Address Table

Dept/LinkHostsNetworkGatewayVLAN
Guest120
192.168.0.0/25
192.168.0.1 - 192.168.0.126
192.168.0.150
Finance90
192.168.0.128/25
192.168.0.129 - 192.168.0.254
192.168.0.12920
HR60
192.168.1.0/26
192.168.1.1 - 192.168.1.62
192.168.1.110
IT50
192.168.1.64/26
192.168.1.65 - 192.168.1.126
192.168.1.6530
Security25
192.168.1.128/27
192.168.1.129 - 192.168.1.158
192.168.1.12940
Edge Router Link2
192.168.1.192/30
192.168.1.193 - 192.168.1.194
NANA
Firewall Link2
192.168.1.196/30
192.168.1.197 - 192.168.1.198
NANA

Network Services

  • DHCP Server
  • NAT (PAT)
  • File Server
  • Printer
  • Wireless Network using WLC & L-APs
  • Firewall

Configurations

  • Create VLANs & SVIs
  • Assign IP addresses
  • Enable Portfast on Access Ports
  • Enable Trunking for WLC & APs
  • Enable Intervlan Routing on L3 Switch
  • Apply ACLs
  • Add ISP routing to Edge Router
  • Set up Firewall

Security

  • ACLs Planning
  • Block guest to access other Internal VLANs
  • Allow IT VLAN to access all VLANs
  • Allow DHCP from IT VLAN to access other VLANs
  • Other departments shouldn't be able to access each other networks
  • DHCP Snooping
  • Firewall Rules
  • Port Security
  • Device Hardening (AAA Framework, Role Based Access Control, Syslog and Local User Databases)