Final CCNA Lab Project
Final CCNA Lab Project
Hostnameتغيير الـ
Switch> enable
Switch# configure terminal
Switch(config)# hostname SW-1
VLANsإنشاء الـ
SW-1(config)# vlan 2
SW-1(config-vlan)# vlan 3
SW-1(config-vlan)# vlan 4
SW-1(config-vlan)# vlan 5
SW-1(config-vlan)# vlan 10
SW-1(config-vlan)# vlan 15
VLAN لكلPorts تخصيص الـ
Port F0/2 → VLAN 2 (IT)
Port F0/3 → VLAN 3 (Sales)
Port F0/4 → VLAN 4 (HR)
Port F0/5 → VLAN 5 (Manager)
Port F0/8 → VLAN 10 (Customers)
Ports F0/21 – F0/24 → VLAN 15 (Servers)
SW-1(config)# interface f0/2
SW-1(config-if)# switchport access vlan 2
SW-1(config-if)# switchport mode access
SW-1(config)# interface f0/3
SW-1(config-if)# switchport access vlan 3
SW-1(config-if)# switchport mode access
SW-1(config)# interface f0/4
SW-1(config-if)# switchport access vlan 4
SW-1(config-if)# switchport mode access
SW-1(config)# interface f0/5
SW-1(config-if)# switchport access vlan 5
SW-1(config-if)# switchport mode access
SW-1(config)# interface f0/8
SW-1(config-if)# switchport access vlan 10
SW-1(config-if)# switchport mode access
SW-1(config)# interface range f0/21-24
SW-1(config-if-range)# switchport access vlan 15
SW-1(config-if-range)# switchport mode access
R1 لالتصال بالراوترTrunk Port 🔹 تفعيل الـ
🔹 Note
"In this step, we configured VLANs on switch SW-1 and assigned
the appropriate interfaces for each department, in addition to
configuring the trunk port towards Router R1."
SW-1 علىPort Security 🔹 تفعيل
صغير ويخلي أكتر من جهاز يدخل على الشبكةHub/Switch منع توصيل أكثر من جهاز على نفس البورت مثالً مستخدم يركب:الغرض
Violation( لو حصلshutdown) ( ويغلق نفسهsticky) أوتوماتيكMAC Address كمان بنخلي البورت يتعلم الـ
Configuration
F0/3 (Sales)على بورت
SW-1(config)# interface f0/3
SW-1(config-if)# switchport port-security
SW-1(config-if)# switchport port-security maximum 1
SW-1(config-if)# switchport port-security violation shutdown
SW-1(config-if)# switchport port-security mac-address sticky
F0/4 (HR)على بورت
SW-1(config)# interface f0/4
SW-1(config-if)# switchport port-security
SW-1(config-if)# switchport port-security maximum 1
SW-1(config-if)# switchport port-security violation shutdown
SW-1(config-if)# switchport port-security mac-address sticky
🔹 Note
"To enhance security, port-security was configured on all access ports to allow only one device
per port. The MAC address of the connected device is learned dynamically (sticky) and saved in
the running configuration. If any violation occurs (e.g., an unauthorized device is connected), the
port will automatically shut down to prevent unauthorized access."
🔹 Router Basic Security (R1)
Configuration
Hostname: تغيير الـ.1
Router> enable
Router# configure terminal
Router(config)# hostname R1
privilege modeعشان الدخول لـEnable Password إضافة.2
R1(config)# enable password 0236
Console Line: حماية الـ.3
R1(config)# line console 0
R1(config-line)# password asd
R1(config-line)# login
VTY (Telnet) Lines: حماية الـ.4
R1(config)# line vty 0 4
R1(config-line)# password qwe
R1(config-line)# login
config):لتشفير كل الباسوردات في الـService Password Encryption ( تفعيل.6
R1(config)# service password-encryption
🔹 Note
"On router R1, basic security was applied by setting an enable password, configuring
console and VTY line access with authentication, and creating a local user account.
Additionally, the service password-encryption command was enabled to ensure that all
passwords are stored in encrypted format in the running configuration."
🔹 DHCP Configuration – R1
• VLAN 2:
R1(config)# ip dhcp pool vlan2
R1(dhcp-config)# network 192.168.1.8 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.9
R1(dhcp-config)# dns-server 8.8.8.8
• VLAN 3:
R1(config)# ip dhcp pool vlan3
R1(dhcp-config)# network 192.168.1.16 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.17
R1(dhcp-config)# dns-server 8.8.8.8
• VLAN 4:
R1(config)# ip dhcp pool vlan4
R1(dhcp-config)# network 192.168.1.24 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.25
R1(dhcp-config)# dns-server 8.8.8.8
• VLAN 5:
R1(config)# ip dhcp pool vlan5
R1(dhcp-config)# network 192.168.1.32 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.33
R1(dhcp-config)# dns-server 8.8.8.8
• VLAN 10:
R1(config)# ip dhcp pool vlan10
R1(dhcp-config)# network 192.168.1.72 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.73
R1(dhcp-config)# dns-server 8.8.8.8
• VLAN 15:
R1(config)# ip dhcp pool vlan15
R1(dhcp-config)# network 192.168.1.112 255.255.255.248
R1(dhcp-config)# default-router 192.168.1.113
🔹 Note
"DHCP pools were configured on R1 for each VLAN to dynamically assign IP addresses to client
devices. Each pool specifies the network, default gateway, and DNS server, allowing hosts to
obtain the correct IP configuration automatically."
🔹 Note:
"The same configurations implemented on R1, including Router-on-a-Stick for inter-
VLAN routing, DHCP pools for each VLAN, RIP version 2 dynamic routing, and basic
security settings, were also applied on the branch routers in Jeddah (R2) and Riyadh
(R3), along with their connected switches. This ensures consistent VLAN
segmentation, IP address allocation, and routing across all sites."
🔹 Advice
When working on a large-scale project or a Final CCNA Lab, it’s always better to
complete all Router and Switch configurations for each branch first (VLANs, Inter-
VLAN Routing, DHCP, Security, etc.).
After that, move on to configuring the WAN and interconnecting the branches.
This approach keeps the work organized and makes troubleshooting much easier,
since you ensure that each branch is fully functional internally before integrating it
with the others.
🔹 WAN Connectivity
WAN Setup in Packet Tracer:
*"The Frame Relay cloud in the lab was configured first by:
1. Opening the Cloud and selecting Frame Relay as the connection type.
2. Adding the appropriate DLCIs for each point-to-point connection.
After that, each branch router and HQ router was configured with a WIC-2T module to enable
serial connectivity, allowing the DCE/DTE cables to be connected correctly. This setup ensures
that each router can communicate over the Frame Relay WAN with the correct timing and IP
addressing for RIP routing."*
🔹 Frame Relay Configuration (R1)
Configuration Commands:
R1(config)# interface s0/0/0.2 point-to-point
R1(config-subif)# ip address 172.16.1.1 255.255.255.252
R1(config-subif)# frame-relay interface-dlci 200
🔹 Note
"Frame Relay point-to-point sub-interfaces were configured on R1 to connect HQ with the Jeddah
and Riyadh branches. Each sub-interface has a dedicated IP address and is mapped to its
corresponding DLCI, enabling WAN communication and integration with RIP routing."
🔹 WAN Connectivity – Frame Relay (R2 & R3)
Branch Routers Configuration:
R2 – Jeddah Branch:
R2(config)# interface s0/0/0
R2(config-if)# no shutdown
R2(config-if)# frame-relay interface-dlci 200
R2(config-if)# ip address 172.16.1.2 255.255.255.252
R3 – Riyadh Branch:
R3(config)# interface s0/0/0
R3(config-if)# no shutdown
R3(config-if)# frame-relay interface-dlci 300
R3(config-if)# ip address 172.16.1.6 255.255.255.252
Explanation:
.(لكل راوتر فرعيSerial) تم تفعيل •
HQ (R1). فيSub-Interface المقابل للـDLCI كل راوتر مربوط بـ •
. لكل رابط لضمان اتصال مباشر فقط بين الراوتراتIP /30 تم تخصيص •
🔹 Note
"The Jeddah (R2) and Riyadh (R3) branch routers were configured with Frame Relay interfaces,
assigned DLCIs corresponding to their connections with HQ (R1). Each interface received a
dedicated /30 IP address to enable WAN connectivity and RIP routing across the enterprise
network."
🔹 Site-to-Site Tunnel Configuration (R2 & R3)
R2 – Jeddah Branch:
R2(config)# interface tunnel 1
R2(config-if)# ip address 50.0.0.2 255.255.255.0
R2(config-if)# tunnel source s0/0/0
R2(config-if)# tunnel destination 172.16.1.6
R3 – Riyadh Branch:
R3(config)# interface tunnel 1
R3(config-if)# ip address 50.0.0.3 255.255.255.0
R3(config-if)# tunnel source s0/0/0
R3(config-if)# tunnel destination 172.16.1.1
Explanation:
Frame Relay.بين الفروع لتأمين االتصال بين المواقع عبر شبكة الـIP Tunnel تم إنشاء •
(tunnel destination). وجهة الراوتر اآلخرIP ( وtunnel source) كمصدرSerial Interface يستخدم الـTunnel كل •
. لتسهيل التوجيه بين الفروعTunnel Interfaces للـSubnet 50.0.0.0/24 تم تخصيص •
🔹 Note
"Site-to-Site tunnels were configured on the branch routers to provide secure communication
between Jeddah and Riyadh branches over the existing Frame Relay WAN. Each tunnel interface
was assigned a unique IP address and mapped to the correct source and destination serial
interfaces, allowing routing and data flow between remote sites."
🔹 Access-Lists Configuration – R1
R1(config)#ip access-list extended Acl_IT
R1(config-ext-nacl)#permit ip 192.168.1.8 0.0.0.7 any
R1(config-ext-nacl)#ip access-list extended Acl_Sales
R1(config-ext-nacl)#permit ip 192.168.1.16 0.0.0.7 10.10.10.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.16 0.0.0.7 10.10.20.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.16 0.0.0.7 192.168.1.16 0.0.0.7
R1(config-ext-nacl)#deny ip 192.168.1.16 0.0.0.7 any
R1(config-ext-nacl)#ip access-list extended Acl_HR
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 192.168.1.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 10.10.10.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 10.10.20.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 192.168.1.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 10.10.10.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.24 0.0.0.7 10.10.20.16 0.0.0.7
R1(config-ext-nacl)#deny ip 192.168.1.24 0.0.0.7 any
R1(config-ext-nacl)#ip access-list extended Acl_Manager
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 192.168.1.32 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 192.168.1.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 192.168.1.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.10.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.10.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.10.32 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.20.16 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.20.24 0.0.0.7
R1(config-ext-nacl)#permit ip 192.168.1.32 0.0.0.7 10.10.20.32 0.0.0.7
R1(config-ext-nacl)#deny ip 192.168.1.32 0.0.0.7 any
R1(config-ext-nacl)#ip access-list extended Acl_Customer
R1(config-ext-nacl)#permit tcp 192.168.1.72 0.0.0.7 any eq 80
R1(config-ext-nacl)#deny ip 192.168.1.72 0.0.0.7 any
🔹 Note
"Based on organizational security policies, each VLAN was restricted according to its role: IT has
full access, Sales communicates only with Sales across branches, HR can communicate with HR
and Sales, Managers have access to all except IT, and Customers are limited to Internet access
via HTTP. These rules were enforced using Extended ACLs applied on router R1 sub-interfaces."
🔹 EtherChannel Configuration (Jeddah & Riyadh Branches)
Jeddah Branch:
SW-JED1(config)# interface range f0/21-24
SW-JED1(config-if-range)# switchport mode trunk
SW-JED1(config-if-range)# channel-group 1 mode active
SW-JED2(config)# interface range f0/21-24
SW-JED2(config-if-range)# switchport mode trunk
SW-JED2(config-if-range)# channel-group 1 mode passive
Riyadh Branch:
SW-RYD1(config)# interface range f0/21-24
SW-RYD1(config-if-range)# switchport mode trunk
SW-RYD1(config-if-range)# channel-group 1 mode active
SW-RYD2(config)# interface range f0/21-24
SW-RYD2(config-if-range)# switchport mode trunk
SW-RYD2(config-if-range)# channel-group 1 mode passive
Explanation:
(Redundancy). ( وتحسينBandwidth) بين السويتشات في كل فرع لتجميع البورتات وزيادة الـEtherChannel تم إنشاء •
. لتحقيق قناة افتراضية واحدة لكل زوج من السويتشاتActive/Passive مع وضعLACP تم استخدام بروتوكول •
🔹 Note:
"EtherChannel was configured on the access switches in both Jeddah and Riyadh branches to
aggregate multiple physical links into a single logical link. LACP was used to ensure link
Redundancy and load balancing between the connected switches, enhancing overall network
performance and reliability."
🔹 Note
"SSH was configured on R1 to provide secure remote management access. A 1024-bit RSA key
was generated, and a local admin user with full privileges was created. VTY lines were restricted
to SSH access, ensuring encrypted and authenticated connections to the router."
🔹 Note
"The same SSH configuration was applied on the branch routers R2 and
R3 (Jeddah and Riyadh) to secure remote access. Each router had a
local RSA key generated, a privileged user account created, and the VTY
lines were configured to allow SSH only, just like on the main router R1."
🔹 Configuration Backup & Syslog – R1, R2 & R3
R1 – HQ Router:
R1# copy running-config tftp:
Address or name of remote host []? 192.168.1.114
Destination filename [R1-confg]? R1-Backup.cfg
R1(config)# logging 192.168.1.117
R1(config)# logging trap debugging
Explanation:
. لضمان سالمة اإلعداداتTFTP Server لكل راوتر على الـRunning Configuration تم عمل نسخة احتياطية من الـ •
مما يسهل مراقبة أداء الشبكة والكشف، إلى سيرفر مركزيDebugging على جميع الراوترات إلرسال رسائل الـSyslog تم تمكين •
.عن أي مشاكل بشكل فوري
🔹 Note
"All routers had their running configurations backed up to the TFTP server to ensure configuration
safety. Additionally, syslog logging was enabled on each router to send debugging messages to
the central syslog server, providing centralized monitoring and troubleshooting capabilities."
🔹 Note
R2 & R3 – Branch Routers:
"The same steps were applied on the Jeddah branch router (R2) and the Riyadh branch router (R3)
to back up their running configurations to the TFTP server and enable Syslog to send debugging
messages to the central server for network monitoring and troubleshooting."
🔹 Testing & Verification
بعد االنتهاء من إعداد الشبكة ،تم إجراء مجموعة من االختبارات للتأكد من أن كل شيء يعمل بشكل صحيح:
Implemented VLANs for IT, Sales, HR, Managers, Customers, Servers. Router-on-a-Stick enabled Inter-VLAN
Segmentation
routing. DHCP pools per VLAN for automated IP assignment.
SSH for secure remote access (RSA keys). Extended ACLs enforcing department-specific policies.
Security
Port Security with sticky MAC & shutdown on violation. Password encryption for router access.
Redundancy & - EtherChannel (EtherChannel with LACP for link aggregation. Frame Relay WAN with site-to-site tunnels between
Performance Jeddah & Riyadh. Dynamic routing using RIP v2 with no auto-summary.
Monitoring & - SNMP Server SNMP server for network monitoring. Syslog server for centralized logging. TFTP server for
Management configuration backup. Connectivity & Security tests verified functionality
The project successfully integrates all CCNA topics into a practical enterprise environment,
demonstrating a secure, scalable, and well-managed network design suitable for real-world
deployment.