Lab Report: Routers - IP Addressing and Services

Categories: Technology

Abstract

The objective of this lab was to design and configure routers with IP addresses and security features, perform port association, and test router interface connectivity using protocols such as ICMP and ARP.

1. Objective and Introduction

The primary goal of this experiment was to:

  • Design routers with IP addresses and security features
  • Configure router interfaces and perform port association
  • Test router interface connectivity using ICMP and ARP protocols

IP addressing was performed for two ISPs, involving network and host components. Subnetting was used to generate additional sub-networks.

Router interfaces were configured based on IP addressing. Security zones were assigned to system interfaces, and protocols like ICMP and ARP were tested.

2. Results and Discussion

Router Interface Configuration

In this section, layer 3 operations over layer 2 were performed. ISP-2 was used for configuration and testing. The network topology included routers R7, R8, and R9 connected to EDU1 of POD 3, as well as routers in ISP-1. The following tasks were performed:

  • Router interface configuration, including media interfaces
  • Testing network connectivity using the ping command
  • Subnetting of network addresses

Section Questions:

Router Status:

  1. Use the command show interface terse ge-0/0/* to view existing Layer 3 interfaces on the router.

    Get quality help now
    Bella Hamilton
    Bella Hamilton
    checked Verified writer

    Proficient in: Technology

    star star star star 5 (234)

    “ Very organized ,I enjoyed and Loved every bit of our professional interaction ”

    avatar avatar avatar
    +84 relevant experts are online
    Hire writer

    How many Ethernet interfaces does the router have? How many Ethernet interfaces have link up?

The command show interface terse ge-0/0/* revealed that there are 16 Ethernet interfaces on the router, with the first 4 (ge-0/0/0 to ge-0/0/4) having a link up status.

  1. Verify the status of the router interfaces using the command show interface terse ge-0/0/* and then show interface terse lo0. Note that the system interface or the loopback interface does not have port association.

    Get to Know The Price Estimate For Your Paper
    Topic
    Number of pages
    Email Invalid email

    By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

    "You must agree to out terms of services and privacy policy"
    Write my paper

    You won’t be charged yet!

    Verify that the administrative status and link status of the configured interfaces are up.

The IP system address was configured on the router interface to the system with family inet addressing. Each interface was configured with respect to the provided table, and the administrative and link status were verified. Loopback interfaces did not have port association.

  1. Using the command show route table inet.0 terse, check the route tables for all routers in your pod. How many routes are in the PE, P, and CE routers? Is the next hop local or remote?

After configuring the IP system address, point-to-point (P2P) links were established between each router in EDU1 POD3. The command show route table inet.0 terse revealed that there were 11 active routes, and the next hop was local.

  1. Using the command show route detail, check the details of each interface.

The command show route detail provided detailed information about the active entries in the table for all system interfaces, including timers, next hop, state, MAC address, and validation state. This information verified the network's functionality for performing layer 3 operations over layer 2.

Security Interface Configuration

To enhance network security, a security policy was created to control traffic flow and apply rules. Security zones were assigned to system interfaces, and individual interfaces were configured to allow specific system services and protocols in host inbound traffic.

Key steps in security interface configuration:

  1. Check for existing policies using the command show security policies.
  2. Check for existing security zones using the command show security zones.
  3. Create a policy to allow traffic within the trust zone using specific commands in the configuration mode.
  4. Assign a security zone to the system interface, permitting system services and protocols.
  5. Assign security zones to individual interfaces, allowing system services and protocols in host inbound traffic.
  6. Verify changes using show security policies and show security zones.

3. Results and Discussion

Security Interface Configuration

Network security is of paramount importance in today's digital world. In this section, we delve into the configuration of security features to safeguard our network.

Existing Policies and Zones:

Before proceeding with the security policy configuration, it is essential to examine the existing policies and security zones on the router. This allows us to identify any pre-existing configurations that might affect our network security implementation.

The command show security policies was used to view the existing policies. In this particular setup, we observed that there were no default policies present, indicating a clean slate for our security policy design.

Next, we checked for any pre-existing security zones using the command show security zones. The output revealed that there were no active zones defined at this point. This meant that we had a blank canvas to create our security zones according to our network's specific requirements.

Creating a Security Policy:

With a clear understanding of the absence of existing policies and zones, we proceeded to create a security policy. A security policy, in the context of Junos OS, defines a set of instructions that govern the flow of traffic within a network. It specifies which traffic is allowed or denied based on various attributes such as source and destination addresses, applications, and services.

The objective of our security policy was to allow unrestricted communication within the trust zone. This meant that any traffic from any source address, destined for any destination address, and using any application, should be permitted within the trust zone. To achieve this, we used the following commands in the configuration mode:

    set security policies from-zone trust to-zone trust policy allow-all match source-address any
    set security policies from-zone trust to-zone trust policy allow-all match destination-address any
    set security policies from-zone trust to-zone trust policy allow-all match application any
    set security policies from-zone trust to-zone trust policy allow-all match then permit
    

After coding these rules, we committed the changes to activate the security policy.

Assigning Security Zones:

With the security policy in place, the next step was to assign security zones to system interfaces. A security zone, in Junos OS, represents a logical grouping of one or more network segments that share a common security policy. These zones are essential for controlling traffic flow between interfaces.

We focused on the "trust" zone and assigned it to the system interface, allowing all system services and protocols in the host inbound traffic. The following commands were used for this configuration:

    set security zones security-zone trust interfaces lo0.0 host-inbound-traffic system-services all
    set security zones security-zone trust interfaces lo0.0 host-inbound-traffic protocol all
    

These commands ensured that the trust zone encompassed the system interface, providing a secure environment for communication.

Assigning Security Zones to Individual Interfaces:

While the trust zone covered the system interface, we needed to configure individual interfaces to belong to the trust zone as well. This allowed us to control traffic at a granular level, specifying which system services and protocols were permitted for each interface.

We concentrated on configuring router 7's interfaces for this purpose. The following commands were used to assign the trust zone to individual interfaces (ge-0/0/0 and ge-0/0/1) and allow all system services and protocols in the host inbound traffic:

    set security zones security-zone trust interfaces ge-0/0/0 host-inbound-traffic system-services all
    set security zones security-zone trust interfaces ge-0/0/0 host-inbound-traffic protocols all
    set security zones security-zone trust interfaces ge-0/0/1 host-inbound-traffic system-services all
    set security zones security-zone trust interfaces ge-0/0/1 host-inbound-traffic protocols all
    

By assigning these zones to individual interfaces, we ensured that the trust zone's security policy was applied to each interface, regulating traffic according to our defined rules.

Verification:

After implementing the security policy and configuring security zones for both the system interface and individual interfaces, it was crucial to verify that our changes had taken effect as intended.

We used the following commands to check the status of our security policies and zones:

    show security policies
    show security zones
    

Running show security policies displayed the configured security policies, allowing us to confirm that our "allow-all" policy was in place, permitting traffic within the trust zone. Similarly, show security zones showed that the trust zone existed and was associated with the relevant interfaces.

3. Conclusions

Router Interface Configuration

In this section, we successfully configured router interfaces, established point-to-point links, and ensured proper connectivity within the network segment. The comprehensive testing using the ping command verified that packets were transmitted without issues, and our network was ready to perform layer 3 operations over layer 2.

Security Interface Configuration

Network security is a critical aspect of any modern network infrastructure. In this section, we created a robust security policy that allowed unrestricted communication within the trust zone while ensuring that the system interface and individual interfaces were appropriately secured.

By carefully configuring security policies and zones, we established a secure network environment, providing a solid foundation for data protection and network integrity.

4. Future Considerations

While this lab report covers the successful implementation of router configurations and security measures, there are several aspects to consider for future enhancements:

  • Continuous Monitoring: Network security is an ongoing process. Regular monitoring and updates to security policies and zones are essential to adapt to evolving threats.
  • Intrusion Detection and Prevention: Implementing intrusion detection and prevention systems can further enhance network security by identifying and mitigating threats in real-time.
  • User Authentication: Implementing user authentication mechanisms can add an extra layer of security, ensuring that only authorized individuals can access the network.
  • Security Auditing: Conducting periodic security audits and vulnerability assessments can help identify potential weaknesses and vulnerabilities in the network.

Incorporating these considerations into our network infrastructure will help maintain a robust and secure network environment.

Updated: Jan 05, 2024
Cite this page

Lab Report: Routers - IP Addressing and Services. (2024, Jan 05). Retrieved from https://studymoose.com/document/lab-report-routers-ip-addressing-and-services

Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment