SlideShare a Scribd company logo
Enterprise network manager: The router-on-a-stick
At present, a lot of small and medium-sized enterprises’ network are formed by
multiple L2 switches + a router(you can use any one of Cisco router), and then
connect the router into the internet. So far, this is a common way to use router-on-
a-stick to manage the enterprise network.
In order to realize the communications between all the employees and the Internet in the
enterprises, it is unrealistic for a person using a public network address. Generally, the
enterprise has one or several public addresses while has dozens or even hundreds of
employees. How to communicate all these public addresses using employees with the
Internet? NAT technology definitely!
In general, there are lots of departments in a enterprise, such as finance department,
technology department, engineering department and so on, each department doing his
coherent responsibility. How to clearly distinguish these departments to facilitate the
management? VLAN technology absolutely!
In order to the convenient work and enhancement of the working efficiency, managers
from different departments have to communicate with each other while the employees’
are forbidden. How to do ? ACL technology without any doubt!
Now, let’s learn how to use the NAT+VLAN+ACL technology to manage the
enterprises’ network.
NTE ( Network Testing Environment) is as below:
Introduction:
The only public network address: 172.16.1.1/24
Three departments of the enterprise:
1
Finance department (PC1 for manager)
Technology department (PC3 for manager)
Engineering department (PC5 for manager)
IP:
PC1:192.168.1.2/24PC2:192.168.1.3/24
PC3:192.168.2.2/24PC4:192.168.2.3/24
PC5:192.168.3.2/24PC6:192.168.3.3/24
Test for purpose:
By NAT configuration, all the computers will be connected to communicate with Internet
through the only public network address.
To divide various departments through VLAN configuration and to realize the
intercommunications among managers from different departments through ACL
configuration while not among the employees.
Ok, let’s down to work as we’ve known the intention.
Firstly, basic configuration on R1 and R2 (dot1Q is needed to encapsulate for sub-
interface configuration as we have to use routing process among VLANs.)
R1
Router>en
Router#conft
Enterconfiguration commands, one per line. End withCNTL/Z.
Router(config)#host r1
r1(config)#int s0/0
r1(config-if)#ip addr 172.16.1.1 255.255.255.0
r1(config-if)#no shut
%LINK-5-CHANGED: Interface Serial0/0, changed state to up
r1(config-if)#clock rate 64000
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changedstate to u
r1(config-if)#exit
r1(config)#int f0/0
r1(config-if)#no ip addr
r1(config-if)#no shut
r1(config-if)#exit
r1(config)#intf0/0.1 (sub-interface configuration)
r1(config-subif)#encapsulation dot1Q2 (dot1Q is needed to encapsulate for sub-interface
configuration)
r1(config-subif)#ip addr 192.168.1.1 255.255.255.0
r1(config-subif)#no shut
r1(config-subif)#exit
2
r1(config)#intf0/0.2 (sub-interface configuration)
r1(config-subif)#encapsulation dot1Q3 (dot1Q is needed to encapsulate for sub-interface
configuration)
r1(config-subif)#ip addr 192.168.2.1 255.255.255.0
r1(config-subif)#no shut
r1(config-subif)#exit
r1(config)#intf0/0.3 (sub-interface configuration)
r1(config-subif)#encapsulation dot1Q4 (dot1Q is needed to encapsulate for sub-interface
configuration)
r1(config-subif)#ip addr 192.168.3.1 255.255.255.0
We just need the IP configuration on S0/0 port of R2 cause we take R2 as public
network.
R2
Router>en
Router#conft
Enterconfiguration commands, one per line. End withCNTL/Z.
Router(config)#host r2
r2(config)#int s0/0
r2(config-if)#ip addr 172.16.1.2 255.255.255.0
r2(config-if)#no shut
Secondly, to have all the employees passed through the only public network—IP
172.16.1.1/24 for
Internetcommunications.
R1
r1(config)#ip nat pool internet 172.16.1.1 172.16.1.1 netmask255.255.255.0
r1(config)#access-list 10 permit 192.168.0.00.0.255.255
r1(config)#ip nat inside source list 10 pool internet overload
r1(config)#int s0/0
r1(config-if)#ip nat outside
r1(config-if)#exit
r1(config)#int f0/0
r1(config-if)#ip nat inside
To divide various departments through VLAN configuration and to realize the
intercommunications among managers from different departments through ACL
configuration while not among the employees.
Sw
Switch>en
3
Switch#conft
Enterconfiguration commands, one per line. End withCNTL/Z.
Switch(config)#int f0/1
Switch(config-if)#switchport modetrunk (Trunk link configuration)
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1,changed state to
down
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1,changed state to up
Switch(config-if)#exit
Switch(config)#vlan2 (VLAN 2 setting up)
Switch(config-vlan)#namegongchengbu (Vlan2: Engineering department)
Switch(config-vlan)#exit
Switch(config)#vlan3 (VLAN 3 setting up)
Switch(config-vlan)#namecaiwubu (VLAN3: Finance department)
Switch(config-vlan)#exit
Switch(config-vlan)#vlan4 (VLAN 4 setting up)
Switch(config-vlan)#namejishubu (VLAN4: Technology department)
Switch(config-vlan)#exit
Switch(config)#int f0/2
Switch(config-if)#switchport access vlan2 (Member adding to VLAN 2 manually)
Switch(config-if)#exit
Switch(config)#int f0/3
Switch(config-if)#switchport access vlan 2
Switch(config-if)#exit
Switch(config)#int f0/4
Switch(config-if)#switchport access vlan3 (Member adding to VLAN 3 manually)
Switch(config-if)#exit
Switch(config)#int f0/5
Switch(config-if)#switchport access vlan 3
Switch(config-if)#exit
Switch(config)#int f0/6
Switch(config-if)#switchport access vlan4 (Member adding to VLAN 4 manually)
Switch(config-if)#exit
Switch(config)#int f0/7
Switch(config-if)#switchport access vlan 4
Switch(config-if)#exit
The definition of ACL (Access Control List):
Be careful for ACL definition and you’d better put the most peculiar ACL on the top.
Note: The interface binding is needed if the ACL can be applied.
R1
r1(config)#access-list 10 permit 192.168.2.2 0.0.0.0
r1(config)#access-list 10 deny 192.168.2.0 0.0.0.255
4
r1(config)#access-list 10 permit 192.168.3.2 0.0.0.0
r1(config)#access-list 10 deny 192.168.3.0 0.0.0.255
r1(config)#access-list 10 permit any
r1(config)#int f0/0.1
r1(config-subif)#ip access-group 10 out
r1(config-subif)#exit
r1(config)#access-list 11 permit 192.168.1.2 0.0.0.0
r1(config)#access-list 11 deny 192.168.1.0 0.0.0.255
r1(config)#access-list 11 permit 192.168.3.2 0.0.0.0
r1(config)#access-list 11 deny 192.168.3.0 0.0.0.255
r1(config)#access-list 11 permit any
r1(config)#int f0/0.2
r1(config-subif)#ip access-group 11 out
r1(config-subif)#exit
r1(config)#access-list 12 permit 192.168.1.2 0.0.0.0
r1(config)#access-list 12 deny 192.168.1.0 0.0.0.255
r1(config)#access-list 12 permit 192.168.2.2 0.0.0.0
r1(config)#access-list 12 deny 192.168.2.0 0.0.0.255
r1(config)#access-list 12 permit any
r1(config)#int f0/0.3
r1(config-subif)#ip access-group 12 out
r1(config-subif)#exit
Now, all the employees can intercommunicates after configuration.
PC>ping 172.16.1.2
Pinging172.16.1.2 with 32 bytes of data:
Replyfrom 172.16.1.2: bytes=32 time=94ms TTL=254
Reply from172.16.1.2: bytes=32 time=94ms TTL=254
Reply from172.16.1.2: bytes=32 time=94ms TTL=254
Reply from172.16.1.2: bytes=32 time=90ms TTL=254
Pingstatistics for 172.16.1.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximateround trip times in milli-seconds:
Minimum =90ms, Maximum = 94ms, Average = 93ms
The intercommunications among managers from different departments (PC1, PC3
and PC5) have been realized after configuration.
PC1>ping 192.168.2.2
Pinging192.168.2.2 with 32 bytes of data:
Replyfrom 192.168.2.2: bytes=32 time=125ms TTL=127
Reply from192.168.2.2: bytes=32 time=110ms TTL=127
5
Reply from192.168.2.2: bytes=32 time=110ms TTL=127
Reply from192.168.2.2: bytes=32 time=125ms TTL=127
Pingstatistics for 192.168.2.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximateround trip times in milli-seconds:
Minimum =110ms, Maximum = 125ms, Average = 117ms
PC1 PING PC5
PC1>ping 192.168.3.2
Pinging192.168.3.2 with 32 bytes of data:
Replyfrom 192.168.3.2: bytes=32 time=111ms TTL=127
Reply from192.168.3.2: bytes=32 time=120ms TTL=127
Reply from192.168.3.2: bytes=32 time=111ms TTL=127
Reply from192.168.3.2: bytes=32 time=105ms TTL=127
Pingstatistics for 192.168.3.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximateround trip times in milli-seconds:
Minimum = 105ms, Maximum = 120ms, Average = 111ms
PC3 PING PC5
PC3>ping 192.168.3.2
Pinging192.168.3.2 with 32 bytes of data:
Replyfrom 192.168.3.2: bytes=32 time=125ms TTL=127
Reply from192.168.3.2: bytes=32 time=125ms TTL=127
Reply from192.168.3.2: bytes=32 time=109ms TTL=127
Reply from192.168.3.2: bytes=32 time=94ms TTL=127
Pingstatistics for 192.168.3.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximateround trip times in milli-seconds:
Minimum = 94ms, Maximum = 125ms, Average = 113ms
There is no intercommunications among employees.(PC2,PC4 and PC6)
PC2 PING PC4
PC2>ping 192.168.2.3
Pinging192.168.2.3 with 32 bytes of data:
Requesttimed out.
Requesttimed out.
Requesttimed out.
Requesttimed out.
Pingstatistics for 192.168.2.3:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
PC2 PING PC6
6
PC2>ping 192.168.3.3
Pinging192.168.3.3 with 32 bytes of data:
Requesttimed out.
Requesttimed out.
Requesttimed out.
Requesttimed out.
Pingstatistics for 192.168.3.3:
Packets:Sent = 4, Received = 0, Lost = 4 (100% loss),
PC4 PING PC 6
PC4>ping 192.168.3.3
Pinging192.168.3.3 with 32 bytes of data:
Requesttimed out.
Requesttimed out.
Requesttimed out.
Requesttimed out.
Pingstatistics for 192.168.3.3:
Packets:Sent = 4, Received = 0, Lost = 4 (100% loss),
We get to our goals by all configurations as above:
All the employees can intercommunicate with Internet through one public network
address.
Managers from different departments can communicate with each other while not among
the employees.
We recommend you to use the Layer 3 Switches for Distribution Layer and Core
Switch and then connect to the Internet by routers.
More related:
Cisco Integrated Services Router Generation 2
The available power supplies for the Cisco routers
How to recover password for the Cisco 1900 and 2900 router?
The Difference of The Cisco Catalyst 2900 and Cisco Catalyst 1900
More Cisco products and Reviews you can visit: http://www.3anetwork.com/blog
3Anetwork.com is a world leading Cisco networking products wholesaler, we wholesale
original new Cisco networking equipments, including Cisco Catalyst switches, Cisco
7
routers, Cisco firewalls, Cisco wireless products, Cisco modules and interface cards
products at competitive price and ship to worldwide.
Our website: http://www.3anetwork.com
Telephone: +852-3069-7733
Email: info@3Anetwork.com
Address: 23/F Lucky Plaza, 315-321 Lockhart Road, Wanchai, Hongkong
8

More Related Content

PDF
Ssh config note
PDF
corporate network
PDF
Packet Tracer Simulation Lab Layer3 Routing
DOCX
How to configure vlan, stp, dtp step by step guide
DOC
Cisco router command configuration overview
PPTX
Cisco CCNA-Router on Stick
PPTX
Juniper JNCIA – Juniper Floating Static Route Configuration
PPTX
Cisco CCNA- PPP Multilink Configuration
Ssh config note
corporate network
Packet Tracer Simulation Lab Layer3 Routing
How to configure vlan, stp, dtp step by step guide
Cisco router command configuration overview
Cisco CCNA-Router on Stick
Juniper JNCIA – Juniper Floating Static Route Configuration
Cisco CCNA- PPP Multilink Configuration

What's hot (20)

PPTX
Cisco CCNA IPV6 Static Configuration
PDF
Basic Configurations on Router
PPTX
Cisco CCNA Port Security
PPTX
Cisco CCNA- NAT Configuration
DOC
Router commands
PDF
Router commands
PDF
Cisco commands List for Beginners (CCNA, CCNP)
PDF
Cisco Commands
PPTX
Cisco CCNA-CCNP IP SLA Configuration
DOCX
Ccna command
PDF
Ccna Commands In 10 Minutes
DOCX
How to create and delete vlan on cisco catalyst switch
PPTX
Juniper JNCIA – Juniper RIP Route Configuration
PDF
Service Provider Networks and Frame Relay
PPTX
Cisco CCNA GRE Tunnel Configuration
PDF
CCNA - Routing & Switching Commands
PPT
Integrated Service Digital Network
PPTX
Cisco CCNA- How to Configure Multi-Layer Switch
PDF
ccna cheat_sheet
PPTX
Cisco CCNA CCNP VACL Configuration
Cisco CCNA IPV6 Static Configuration
Basic Configurations on Router
Cisco CCNA Port Security
Cisco CCNA- NAT Configuration
Router commands
Router commands
Cisco commands List for Beginners (CCNA, CCNP)
Cisco Commands
Cisco CCNA-CCNP IP SLA Configuration
Ccna command
Ccna Commands In 10 Minutes
How to create and delete vlan on cisco catalyst switch
Juniper JNCIA – Juniper RIP Route Configuration
Service Provider Networks and Frame Relay
Cisco CCNA GRE Tunnel Configuration
CCNA - Routing & Switching Commands
Integrated Service Digital Network
Cisco CCNA- How to Configure Multi-Layer Switch
ccna cheat_sheet
Cisco CCNA CCNP VACL Configuration
Ad

Similar to Enterprise Network Manager: the Router-On-A-stick (20)

PDF
IRJET - Implementation of Network Security and Traffic Filtering using Access...
PDF
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
PPTX
Network Design on cisco packet tracer 6.0
PPT
CCNP 642-732 Training
PPTX
Reflexive Access List
PDF
Design and Simulation of Secure Network for University Campus
PPT
CCNA Security - Chapter 4
PPT
Chapter 4 overview
PDF
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
PDF
6.5.1.3 packet tracer layer 2 vlan security instructor
PDF
Ch4-Implementing Firewall Technologies.pdf
PDF
Modul 5 access control list
PDF
Ccna 4 v5 practice skills assessment – packet tracer
PPTX
Time Based ACL
PDF
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
PDF
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
DOCX
1 SEC450 ACL Tutorial This document highlights.docx
PPT
redes telematicas CISCO para ingenieros parte 2
PPT
Chapter10ccna
PDF
BACIK CISCO SKILLS
IRJET - Implementation of Network Security and Traffic Filtering using Access...
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Network Design on cisco packet tracer 6.0
CCNP 642-732 Training
Reflexive Access List
Design and Simulation of Secure Network for University Campus
CCNA Security - Chapter 4
Chapter 4 overview
Ccnav5.org ccna 4-v5_practice_skills_assessment__packet_tracer
6.5.1.3 packet tracer layer 2 vlan security instructor
Ch4-Implementing Firewall Technologies.pdf
Modul 5 access control list
Ccna 4 v5 practice skills assessment – packet tracer
Time Based ACL
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
1 SEC450 ACL Tutorial This document highlights.docx
redes telematicas CISCO para ingenieros parte 2
Chapter10ccna
BACIK CISCO SKILLS
Ad

More from 3Anetwork com (20)

DOC
Cisco sfp modules
DOC
Cisco 3900 and cisco 2900 series routers
DOC
Cisco catalyst 2960 x series
DOC
Cisco catalyst 3750 x series switches
DOC
Cisco switches for small business
DOC
How to recover the password for cisco 2900 integrated services router
DOC
Cisco 4 and 8-port gigabit ethernet ehwi cs
DOC
Configuring the cisco switch with the cli based setup program
DOC
Cisco 2960 basic configuration – vlan configuration
DOC
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
DOC
Cisco catalyst 3850 series switches datasheet
DOC
Cisco catalyst 2960 series switches overview
DOC
Cisco Catalyst 2960-X Datasheet
DOC
How to configure a catalyst 3750 x
DOC
Hubs vs switches vs routers
DOC
Installing and removing sfp and sfp+ transceiver modules
DOC
Dmvpn with configuration example
DOC
Cisco unified access from vision to reality
DOC
How to use time domain reflectometer (tdr)
DOC
Cisco switch commands cheat sheet
Cisco sfp modules
Cisco 3900 and cisco 2900 series routers
Cisco catalyst 2960 x series
Cisco catalyst 3750 x series switches
Cisco switches for small business
How to recover the password for cisco 2900 integrated services router
Cisco 4 and 8-port gigabit ethernet ehwi cs
Configuring the cisco switch with the cli based setup program
Cisco 2960 basic configuration – vlan configuration
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Cisco catalyst 3850 series switches datasheet
Cisco catalyst 2960 series switches overview
Cisco Catalyst 2960-X Datasheet
How to configure a catalyst 3750 x
Hubs vs switches vs routers
Installing and removing sfp and sfp+ transceiver modules
Dmvpn with configuration example
Cisco unified access from vision to reality
How to use time domain reflectometer (tdr)
Cisco switch commands cheat sheet

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Enterprise Network Manager: the Router-On-A-stick

  • 1. Enterprise network manager: The router-on-a-stick At present, a lot of small and medium-sized enterprises’ network are formed by multiple L2 switches + a router(you can use any one of Cisco router), and then connect the router into the internet. So far, this is a common way to use router-on- a-stick to manage the enterprise network. In order to realize the communications between all the employees and the Internet in the enterprises, it is unrealistic for a person using a public network address. Generally, the enterprise has one or several public addresses while has dozens or even hundreds of employees. How to communicate all these public addresses using employees with the Internet? NAT technology definitely! In general, there are lots of departments in a enterprise, such as finance department, technology department, engineering department and so on, each department doing his coherent responsibility. How to clearly distinguish these departments to facilitate the management? VLAN technology absolutely! In order to the convenient work and enhancement of the working efficiency, managers from different departments have to communicate with each other while the employees’ are forbidden. How to do ? ACL technology without any doubt! Now, let’s learn how to use the NAT+VLAN+ACL technology to manage the enterprises’ network. NTE ( Network Testing Environment) is as below: Introduction: The only public network address: 172.16.1.1/24 Three departments of the enterprise: 1
  • 2. Finance department (PC1 for manager) Technology department (PC3 for manager) Engineering department (PC5 for manager) IP: PC1:192.168.1.2/24PC2:192.168.1.3/24 PC3:192.168.2.2/24PC4:192.168.2.3/24 PC5:192.168.3.2/24PC6:192.168.3.3/24 Test for purpose: By NAT configuration, all the computers will be connected to communicate with Internet through the only public network address. To divide various departments through VLAN configuration and to realize the intercommunications among managers from different departments through ACL configuration while not among the employees. Ok, let’s down to work as we’ve known the intention. Firstly, basic configuration on R1 and R2 (dot1Q is needed to encapsulate for sub- interface configuration as we have to use routing process among VLANs.) R1 Router>en Router#conft Enterconfiguration commands, one per line. End withCNTL/Z. Router(config)#host r1 r1(config)#int s0/0 r1(config-if)#ip addr 172.16.1.1 255.255.255.0 r1(config-if)#no shut %LINK-5-CHANGED: Interface Serial0/0, changed state to up r1(config-if)#clock rate 64000 %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changedstate to u r1(config-if)#exit r1(config)#int f0/0 r1(config-if)#no ip addr r1(config-if)#no shut r1(config-if)#exit r1(config)#intf0/0.1 (sub-interface configuration) r1(config-subif)#encapsulation dot1Q2 (dot1Q is needed to encapsulate for sub-interface configuration) r1(config-subif)#ip addr 192.168.1.1 255.255.255.0 r1(config-subif)#no shut r1(config-subif)#exit 2
  • 3. r1(config)#intf0/0.2 (sub-interface configuration) r1(config-subif)#encapsulation dot1Q3 (dot1Q is needed to encapsulate for sub-interface configuration) r1(config-subif)#ip addr 192.168.2.1 255.255.255.0 r1(config-subif)#no shut r1(config-subif)#exit r1(config)#intf0/0.3 (sub-interface configuration) r1(config-subif)#encapsulation dot1Q4 (dot1Q is needed to encapsulate for sub-interface configuration) r1(config-subif)#ip addr 192.168.3.1 255.255.255.0 We just need the IP configuration on S0/0 port of R2 cause we take R2 as public network. R2 Router>en Router#conft Enterconfiguration commands, one per line. End withCNTL/Z. Router(config)#host r2 r2(config)#int s0/0 r2(config-if)#ip addr 172.16.1.2 255.255.255.0 r2(config-if)#no shut Secondly, to have all the employees passed through the only public network—IP 172.16.1.1/24 for Internetcommunications. R1 r1(config)#ip nat pool internet 172.16.1.1 172.16.1.1 netmask255.255.255.0 r1(config)#access-list 10 permit 192.168.0.00.0.255.255 r1(config)#ip nat inside source list 10 pool internet overload r1(config)#int s0/0 r1(config-if)#ip nat outside r1(config-if)#exit r1(config)#int f0/0 r1(config-if)#ip nat inside To divide various departments through VLAN configuration and to realize the intercommunications among managers from different departments through ACL configuration while not among the employees. Sw Switch>en 3
  • 4. Switch#conft Enterconfiguration commands, one per line. End withCNTL/Z. Switch(config)#int f0/1 Switch(config-if)#switchport modetrunk (Trunk link configuration) %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1,changed state to down %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1,changed state to up Switch(config-if)#exit Switch(config)#vlan2 (VLAN 2 setting up) Switch(config-vlan)#namegongchengbu (Vlan2: Engineering department) Switch(config-vlan)#exit Switch(config)#vlan3 (VLAN 3 setting up) Switch(config-vlan)#namecaiwubu (VLAN3: Finance department) Switch(config-vlan)#exit Switch(config-vlan)#vlan4 (VLAN 4 setting up) Switch(config-vlan)#namejishubu (VLAN4: Technology department) Switch(config-vlan)#exit Switch(config)#int f0/2 Switch(config-if)#switchport access vlan2 (Member adding to VLAN 2 manually) Switch(config-if)#exit Switch(config)#int f0/3 Switch(config-if)#switchport access vlan 2 Switch(config-if)#exit Switch(config)#int f0/4 Switch(config-if)#switchport access vlan3 (Member adding to VLAN 3 manually) Switch(config-if)#exit Switch(config)#int f0/5 Switch(config-if)#switchport access vlan 3 Switch(config-if)#exit Switch(config)#int f0/6 Switch(config-if)#switchport access vlan4 (Member adding to VLAN 4 manually) Switch(config-if)#exit Switch(config)#int f0/7 Switch(config-if)#switchport access vlan 4 Switch(config-if)#exit The definition of ACL (Access Control List): Be careful for ACL definition and you’d better put the most peculiar ACL on the top. Note: The interface binding is needed if the ACL can be applied. R1 r1(config)#access-list 10 permit 192.168.2.2 0.0.0.0 r1(config)#access-list 10 deny 192.168.2.0 0.0.0.255 4
  • 5. r1(config)#access-list 10 permit 192.168.3.2 0.0.0.0 r1(config)#access-list 10 deny 192.168.3.0 0.0.0.255 r1(config)#access-list 10 permit any r1(config)#int f0/0.1 r1(config-subif)#ip access-group 10 out r1(config-subif)#exit r1(config)#access-list 11 permit 192.168.1.2 0.0.0.0 r1(config)#access-list 11 deny 192.168.1.0 0.0.0.255 r1(config)#access-list 11 permit 192.168.3.2 0.0.0.0 r1(config)#access-list 11 deny 192.168.3.0 0.0.0.255 r1(config)#access-list 11 permit any r1(config)#int f0/0.2 r1(config-subif)#ip access-group 11 out r1(config-subif)#exit r1(config)#access-list 12 permit 192.168.1.2 0.0.0.0 r1(config)#access-list 12 deny 192.168.1.0 0.0.0.255 r1(config)#access-list 12 permit 192.168.2.2 0.0.0.0 r1(config)#access-list 12 deny 192.168.2.0 0.0.0.255 r1(config)#access-list 12 permit any r1(config)#int f0/0.3 r1(config-subif)#ip access-group 12 out r1(config-subif)#exit Now, all the employees can intercommunicates after configuration. PC>ping 172.16.1.2 Pinging172.16.1.2 with 32 bytes of data: Replyfrom 172.16.1.2: bytes=32 time=94ms TTL=254 Reply from172.16.1.2: bytes=32 time=94ms TTL=254 Reply from172.16.1.2: bytes=32 time=94ms TTL=254 Reply from172.16.1.2: bytes=32 time=90ms TTL=254 Pingstatistics for 172.16.1.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximateround trip times in milli-seconds: Minimum =90ms, Maximum = 94ms, Average = 93ms The intercommunications among managers from different departments (PC1, PC3 and PC5) have been realized after configuration. PC1>ping 192.168.2.2 Pinging192.168.2.2 with 32 bytes of data: Replyfrom 192.168.2.2: bytes=32 time=125ms TTL=127 Reply from192.168.2.2: bytes=32 time=110ms TTL=127 5
  • 6. Reply from192.168.2.2: bytes=32 time=110ms TTL=127 Reply from192.168.2.2: bytes=32 time=125ms TTL=127 Pingstatistics for 192.168.2.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximateround trip times in milli-seconds: Minimum =110ms, Maximum = 125ms, Average = 117ms PC1 PING PC5 PC1>ping 192.168.3.2 Pinging192.168.3.2 with 32 bytes of data: Replyfrom 192.168.3.2: bytes=32 time=111ms TTL=127 Reply from192.168.3.2: bytes=32 time=120ms TTL=127 Reply from192.168.3.2: bytes=32 time=111ms TTL=127 Reply from192.168.3.2: bytes=32 time=105ms TTL=127 Pingstatistics for 192.168.3.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximateround trip times in milli-seconds: Minimum = 105ms, Maximum = 120ms, Average = 111ms PC3 PING PC5 PC3>ping 192.168.3.2 Pinging192.168.3.2 with 32 bytes of data: Replyfrom 192.168.3.2: bytes=32 time=125ms TTL=127 Reply from192.168.3.2: bytes=32 time=125ms TTL=127 Reply from192.168.3.2: bytes=32 time=109ms TTL=127 Reply from192.168.3.2: bytes=32 time=94ms TTL=127 Pingstatistics for 192.168.3.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximateround trip times in milli-seconds: Minimum = 94ms, Maximum = 125ms, Average = 113ms There is no intercommunications among employees.(PC2,PC4 and PC6) PC2 PING PC4 PC2>ping 192.168.2.3 Pinging192.168.2.3 with 32 bytes of data: Requesttimed out. Requesttimed out. Requesttimed out. Requesttimed out. Pingstatistics for 192.168.2.3: Packets: Sent = 4, Received = 0, Lost = 4 (100% loss), PC2 PING PC6 6
  • 7. PC2>ping 192.168.3.3 Pinging192.168.3.3 with 32 bytes of data: Requesttimed out. Requesttimed out. Requesttimed out. Requesttimed out. Pingstatistics for 192.168.3.3: Packets:Sent = 4, Received = 0, Lost = 4 (100% loss), PC4 PING PC 6 PC4>ping 192.168.3.3 Pinging192.168.3.3 with 32 bytes of data: Requesttimed out. Requesttimed out. Requesttimed out. Requesttimed out. Pingstatistics for 192.168.3.3: Packets:Sent = 4, Received = 0, Lost = 4 (100% loss), We get to our goals by all configurations as above: All the employees can intercommunicate with Internet through one public network address. Managers from different departments can communicate with each other while not among the employees. We recommend you to use the Layer 3 Switches for Distribution Layer and Core Switch and then connect to the Internet by routers. More related: Cisco Integrated Services Router Generation 2 The available power supplies for the Cisco routers How to recover password for the Cisco 1900 and 2900 router? The Difference of The Cisco Catalyst 2900 and Cisco Catalyst 1900 More Cisco products and Reviews you can visit: http://www.3anetwork.com/blog 3Anetwork.com is a world leading Cisco networking products wholesaler, we wholesale original new Cisco networking equipments, including Cisco Catalyst switches, Cisco 7
  • 8. routers, Cisco firewalls, Cisco wireless products, Cisco modules and interface cards products at competitive price and ship to worldwide. Our website: http://www.3anetwork.com Telephone: +852-3069-7733 Email: info@3Anetwork.com Address: 23/F Lucky Plaza, 315-321 Lockhart Road, Wanchai, Hongkong 8