To install StudyMoose App tap and then “Add to Home Screen”
Save to my list
Remove from my list
The objective of this lab was to design and configure routers with IP addresses and security features, perform port association, and test router interface connectivity using protocols such as ICMP and ARP.
The primary goal of this experiment was to:
IP addressing was performed for two ISPs, involving network and host components. Subnetting was used to generate additional sub-networks.
Router interfaces were configured based on IP addressing. Security zones were assigned to system interfaces, and protocols like ICMP and ARP were tested.
In this section, layer 3 operations over layer 2 were performed. ISP-2 was used for configuration and testing. The network topology included routers R7, R8, and R9 connected to EDU1 of POD 3, as well as routers in ISP-1. The following tasks were performed:
Section Questions:
Router Status:
show interface terse ge-0/0/*
to view existing Layer 3 interfaces on the router.How many Ethernet interfaces does the router have? How many Ethernet interfaces have link up?
The command show interface terse ge-0/0/*
revealed that there are 16 Ethernet interfaces on the router, with the first 4 (ge-0/0/0 to ge-0/0/4) having a link up status.
show interface terse ge-0/0/*
and then show interface terse lo0
. Note that the system interface or the loopback interface does not have port association.Verify that the administrative status and link status of the configured interfaces are up.
The IP system address was configured on the router interface to the system with family inet addressing. Each interface was configured with respect to the provided table, and the administrative and link status were verified. Loopback interfaces did not have port association.
show route table inet.0 terse
, check the route tables for all routers in your pod. How many routes are in the PE, P, and CE routers? Is the next hop local or remote?After configuring the IP system address, point-to-point (P2P) links were established between each router in EDU1 POD3. The command show route table inet.0 terse
revealed that there were 11 active routes, and the next hop was local.
show route detail
, check the details of each interface.The command show route detail
provided detailed information about the active entries in the table for all system interfaces, including timers, next hop, state, MAC address, and validation state. This information verified the network's functionality for performing layer 3 operations over layer 2.
To enhance network security, a security policy was created to control traffic flow and apply rules. Security zones were assigned to system interfaces, and individual interfaces were configured to allow specific system services and protocols in host inbound traffic.
Key steps in security interface configuration:
show security policies
.show security zones
.show security policies
and show security zones
.Network security is of paramount importance in today's digital world. In this section, we delve into the configuration of security features to safeguard our network.
Existing Policies and Zones:
Before proceeding with the security policy configuration, it is essential to examine the existing policies and security zones on the router. This allows us to identify any pre-existing configurations that might affect our network security implementation.
The command show security policies
was used to view the existing policies. In this particular setup, we observed that there were no default policies present, indicating a clean slate for our security policy design.
Next, we checked for any pre-existing security zones using the command show security zones
. The output revealed that there were no active zones defined at this point. This meant that we had a blank canvas to create our security zones according to our network's specific requirements.
With a clear understanding of the absence of existing policies and zones, we proceeded to create a security policy. A security policy, in the context of Junos OS, defines a set of instructions that govern the flow of traffic within a network. It specifies which traffic is allowed or denied based on various attributes such as source and destination addresses, applications, and services.
The objective of our security policy was to allow unrestricted communication within the trust zone. This meant that any traffic from any source address, destined for any destination address, and using any application, should be permitted within the trust zone. To achieve this, we used the following commands in the configuration mode:
set security policies from-zone trust to-zone trust policy allow-all match source-address any set security policies from-zone trust to-zone trust policy allow-all match destination-address any set security policies from-zone trust to-zone trust policy allow-all match application any set security policies from-zone trust to-zone trust policy allow-all match then permit
After coding these rules, we committed the changes to activate the security policy.
With the security policy in place, the next step was to assign security zones to system interfaces. A security zone, in Junos OS, represents a logical grouping of one or more network segments that share a common security policy. These zones are essential for controlling traffic flow between interfaces.
We focused on the "trust" zone and assigned it to the system interface, allowing all system services and protocols in the host inbound traffic. The following commands were used for this configuration:
set security zones security-zone trust interfaces lo0.0 host-inbound-traffic system-services all set security zones security-zone trust interfaces lo0.0 host-inbound-traffic protocol all
These commands ensured that the trust zone encompassed the system interface, providing a secure environment for communication.
While the trust zone covered the system interface, we needed to configure individual interfaces to belong to the trust zone as well. This allowed us to control traffic at a granular level, specifying which system services and protocols were permitted for each interface.
We concentrated on configuring router 7's interfaces for this purpose. The following commands were used to assign the trust zone to individual interfaces (ge-0/0/0 and ge-0/0/1) and allow all system services and protocols in the host inbound traffic:
set security zones security-zone trust interfaces ge-0/0/0 host-inbound-traffic system-services all set security zones security-zone trust interfaces ge-0/0/0 host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1 host-inbound-traffic system-services all set security zones security-zone trust interfaces ge-0/0/1 host-inbound-traffic protocols all
By assigning these zones to individual interfaces, we ensured that the trust zone's security policy was applied to each interface, regulating traffic according to our defined rules.
After implementing the security policy and configuring security zones for both the system interface and individual interfaces, it was crucial to verify that our changes had taken effect as intended.
We used the following commands to check the status of our security policies and zones:
show security policies show security zones
Running show security policies
displayed the configured security policies, allowing us to confirm that our "allow-all" policy was in place, permitting traffic within the trust zone. Similarly, show security zones
showed that the trust zone existed and was associated with the relevant interfaces.
In this section, we successfully configured router interfaces, established point-to-point links, and ensured proper connectivity within the network segment. The comprehensive testing using the ping command verified that packets were transmitted without issues, and our network was ready to perform layer 3 operations over layer 2.
Network security is a critical aspect of any modern network infrastructure. In this section, we created a robust security policy that allowed unrestricted communication within the trust zone while ensuring that the system interface and individual interfaces were appropriately secured.
By carefully configuring security policies and zones, we established a secure network environment, providing a solid foundation for data protection and network integrity.
While this lab report covers the successful implementation of router configurations and security measures, there are several aspects to consider for future enhancements:
Incorporating these considerations into our network infrastructure will help maintain a robust and secure network environment.
Lab Report: Routers - IP Addressing and Services. (2024, Jan 05). Retrieved from https://studymoose.com/document/lab-report-routers-ip-addressing-and-services
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment