Malek Report
Malek Report
By
Ounis Malek AND Ghabi Imen
By
Ghabi Imen AND Ounis Malek
Issued on : Issued on :
Signature: Signature:
Dedication
Ounis Malek
i
Dedication
I dedicate this modest work to my dear mother ”Nadia” and my dear father ”Ali” for
their patience, sacrifice and support.
No homage could be equal to the love with which they never cease to shower me. May
God grant them health and long life.
I dedicate this work to my brothers and sisters, for always being by my side during
my years of study.
I dedicate this work to my dear fiance. May this day be filled with joy and shared
love. You are the greatest blessing in my life, a priceless treasure that I cherish every day.
Thank you for being there for me, supporting me and encouraging me. Your presence
by my side fills me with happiness and gratitude.
May our family ties remain strong forever and may our love flourish. You are my
strength, my inspiration and my greatest comfort.
Ghabi Imen
ii
Acknowledgements
We are honored to express our profound gratitude towards our professional supervisor
Aaza BenChaieb and the member of the department’s team for their assistance and
valuable contributions.
Unable to mention all the names, we would like to express our sincere thanks to all
those who, through their advice and expertise, have made this work possible.
Finally, we’d like to thank the members of the jury for their willingness to give us
their attention and their support.
iii
Contents
Dedication i
Dedication ii
Remerciements iii
General Introduction 1
1 Project presentation 2
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Host Company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 The company activities . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Project Presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.1 Project context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.2 Study of the existing . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.3 Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
iv
Contents Contents
3.3.2 Switches : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3.3 Access points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4 Showcasing the new architecture . . . . . . . . . . . . . . . . . . . . . . . . 26
3.5 The Topology configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.5.1 Configuration of Switch Core . . . . . . . . . . . . . . . . . . . . . 27
3.5.2 LAG configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.5.3 Configuration of Switch Access . . . . . . . . . . . . . . . . . . . . 29
3.6 AC configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.6.1 Wired network connectivity . . . . . . . . . . . . . . . . . . . . . . 31
3.6.2 APs configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.6.3 WLAN service parameters . . . . . . . . . . . . . . . . . . . . . . . 34
3.7 Tests: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.8 Firewall huawei . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.8.1 Firewall USG6000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.8.2 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.8.3 HA between two firewalls . . . . . . . . . . . . . . . . . . . . . . . . 41
3.8.4 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.9 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4 Network monitoring 49
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2 Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2.2 Network monitoring tools . . . . . . . . . . . . . . . . . . . . . . . 51
4.2.3 Simple Network Management Protocol . . . . . . . . . . . . . . . . 52
4.2.4 Zabbix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.3 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.3.1 Vmware and Zabbix download . . . . . . . . . . . . . . . . . . . . . 54
4.3.2 SNMP’s firewall configuration . . . . . . . . . . . . . . . . . . . . . 57
4.3.3 SNMPv3 display . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
General Conclusion 64
Webographie 65
v
List of Figures
3.1 Ensp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.2 Wireshark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3 AC6605 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.4 Capwap tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.5 VAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.6 SSID example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.7 Radio management example . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.8 S5700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.9 Switch core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.10 AP3030 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.11 New topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.12 VLANs display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.13 DHCP display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.14 DHCP-client example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.15 Link-aggregation SC1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.16 Lacp SC1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.17 VTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.18 Switch access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.19 VLAN ip interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.20 DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.21 AP-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.22 Regulatory domain profile . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
vi
List of Figures List of Figures
vii
List of Figures List of Figures
viii
List of Tables
ix
General introduction
It’s undeniable that IT technology has evolved enormously and has become an integral
part of our daily lives. From social life to professional one , It’s amazing to think how far
we’ve come and how much we can achieve with a way that become impossible to survive
without it.
However, the network computing still faces critical problems that stand in the way
for a perfect productivity that we can summarize in connectivity availability and security
issues . Those factors can raise significant challenges for users,so it’s important to address
them properly,whether it’s related to internet connectivity, difficulty accessing certain
websites and data, or security problems that may range from minor inconveniences to
major breaches that compromise sensitive data.
Our report describes the necessary steps to achieve our goals and it based on four
chapters:
-The first chapter aims to clarify the goal of our project by identifying the issues and
offers a practical solutions.
-The second chapter focuses on the theoretical study of the secure LAN and the nec-
essary policy and protocols.
-The third chapter spotlights the theoretical implementation and the necessary con-
figurations to ensure the availability and security.
-The fourth chapter is based on the network monitoring by using an advanced tech-
nology to determine, in real time, whether a network is operating optimally.
1
Chapter 1
Project presentation
1.1 Introduction
This chapter is devoted to the general scope of our project ”Study and implementation
of a secure LAN and WLAN architecture”starting with a thorough introduction to PRO-
LOGIC, followed by an overview of the project context, problems and solutions.
2
Chapter 1. Project presentation 1.2. Host Company
IT infrastructure :
[2]PROLOGIC Tunisia has put all its efforts and experience into setting up a successful
IT infrastructure includes:
Virtualization:
To keep peace with today’s high-performance businesses, IT departments need to provide
a digital infrastructure that supports modern applications everywhere and to do this vir-
tualized environments are essential.
Cloud Solutions :
PaaS-Platform As A Service :
Prologic enables to modernize your IT infrastructure by migrating to the public cloud
services and infrastructure-as-a-service for on-premise workloads, fully managed in a pay-
per-use model.
3
Chapter 1. Project presentation 1.3. Project Presentation
Ict Housing :
Information systems have become crucial to every organization. Hosting an ICT infras-
tructure in a secure, highly available, energy-efficient and ultra-connected datacenter has
become a must.
PC and Impression :
Business Workstations:
PROLOGIC Tunisia brings you the solution and provides :
- The right IT equipment and solution in the right place.
- Solutions that simplify the administration of your IT assets.
IT as a Service:
DaaS-Device As A Service in Tunisia :
We offer you Prologic’s DAAS ”Device as a Service” service. Hardware, software and
services combined in a single contract with a single price per device. With ”Device as a
Service” or DAAS, itcan offer the employees the latest, best-performing devices on the
market.
4
Chapter 1. Project presentation 1.3. Project Presentation
Network connectivity describes the extensive process of connecting various parts of a net-
work together, for instance, through the use of routers, switches and gateways,and how
it works
Availability guarantees that users can access the systems and the needed resources .
Confidentiality means that data, objects and resources are protected from unauthorized
viewing and other access.
Therefore Prologic recognized the need for a robust network architecture that would
guarantee not only the high connectivity but also the necessary protection as well as the
network supervision.
The figure 1.3 shows the current architecture where only access switches access exist
with an absence of the core switches as well as the out-of-balance fragmentation concerning
the sub-departments that caused a traffic problems without mentioning the equipment
bad choice with no back-up plans.
1.3.3 Solutions
In an attempt to resolve the above problems ,a number of measures have been taken.
First of all we propose to create a new architecture that aims to :
5
Chapter 1. Project presentation 1.4. Conclusion
*Ensure data protection by the installation of the firewalls , using two instead of one
applying High availability (HA) configuration within which leads to the existence of a
standby firewall.
*Ensure data distribution and management by adding two switch core interconnected with
a Link Aggregation Group (LAG) configuration for connection reliability and resilience.
*Network segmentation by dividing the edge switches into department where each one
has an own sub-departments improving network performance, better security and traffic
management.
*Network monitoring to track and analyze the network execution in order to prevent fail-
ure and violation.
1.4 Conclusion
In this chapter, we dived into the inner workings of the company,studying the primary
issues that brought about the inception of our project, analyzing the challenges and
preparing the path for strategic approach to resolve these problems where our next step
will be to immerse into the necessary requirements of our project.
6
Chapter 2
2.1 Introduction
Whether the network is down or there is an unauthorized access ,a traffic sniffing
threatening the company infrastructure, it is important to take cautions to prevent any
catastrophic events.
LAN availability is a common issue that affects the productivity and the customers con-
fidence. LAN security is vital in ensuring the data and resources safeguard.
This chapter dives into the fundamentals of the network computer, with a focus on the
LAN components ,the network segmentation basics and the various protocols that will
facilities our work.
7
Chapter 2. State of the art of a secure LAN 2.2. Computer networks
Personal area network (PAN): refers to a network used by just one person to
connect multiple devices, such as laptops or scanners with small connectivity range as
shown below
Local area network (LAN): connects devices within a limited geographical area,
such as schools, hospitals where data transmission is much more higher as displaced in
the figure 2.3
8
Chapter 2. State of the art of a secure LAN 2.2. Computer networks
Wide area network (WAN): it cover larger areas such as large cities, states, and
even countries using satellites as shown in the figure2.5.
The figure 2.6 shows a global view on the computer network’s standards:
Since our work is limited in the enterprise environment we will be interested in the LAN
maintenance.
9
Chapter 2. State of the art of a secure LAN 2.3. Local Area Networks
Client-server LAN:
In a client-server LAN environment, a single server connects multiple devices known as
clients. Users devices could not establish an inter-communication.A centralized machine
handles and control activities such as network traffic management.
10
Chapter 2. State of the art of a secure LAN 2.3. Local Area Networks
This LAN type is preferred to be used in small perimeters because it cause too much
pressure on the central server.
Wired LAN:
Wired LAN is the most common LAN type in use nowdays. It uses electronic waves to
transfer data across optical fiber. it is highly reliable and it depends on the performance
of the central server
Wireless LAN:
Commonly used in home environments to connect computing devices, smart appliances,
etc.
Cloud-managed LAN:
It is a specific type of wireless LAN where a centralized cloud platform isin place to con-
trol network provisioning, access control, network performance and security[4].
11
Chapter 2. State of the art of a secure LAN 2.3. Local Area Networks
4. Centralized server:
The centralized server is the most crucial component ,particularly for enterprise implemen-
tations. Enterprises may purchase or lease servers from vendors like IBM, Cisco, HPE, etc.
5. Network switches:
A LAN cannot function properly without a network switch, which plays a crucial role
in managing the distribution of data packets and network resources among the devices
12
Chapter 2. State of the art of a secure LAN 2.4. Network segmentation
linked to the central server. There are two kinds of switches that we can consider for LAN
environment managed and unmanaged, where in one hand , managed switches provide
more control ,performance and a range of data on performance ,in the other hand unman-
aged switches are used to plug in and run without configuration and it may be cheaper
and easier to maintain but less efficient and secure.
6. Wi-Fi router:
A Wi-Fi router is now a staple component of LAN . The router is connected to the modem
so that it can receive network signals, and it converts them into wireless signals that a
mobile end-user devices can process.
7. Modem:
A modem is an indispensable component as this is what converts the analog signals trans-
mitted into a digital format.
8. Firewall appliance :
A firewall protects end-user devices and servers from network-related security attacks by
restricting specific kinds of traffic.Most end-user devices ship with built-in firewall soft-
ware where its possible to download additional software from the internet
After understanding the LAN environment. we will proceed with conducting a study
on network segmentation.
13
Chapter 2. State of the art of a secure LAN 2.4. Network segmentation
2.4.1 Definition
Network segmentation represents the division of the network into sub-networks where
Each segment acts as its own network.
The segmentation network enhances data security by preventing and minimizing the
chances of getting hacked ensuring the confidentiality and integrity of the information.
Additionally, it improves the traffic management performance and manageability.
1.Physical segmentation:
Where we deploy switches firewalls cables,access points to provide efficient and reliability.
It’s the simplest way and the most expensive.
2.Logical segmentation:
It applies the concept of the existing network infrastructure using VLANs or network
addressing scheme.It’s less pricey and more efficient.
VLAN’s types:
Port-based VLAN: Devices are grouped into VLANs based on the physical switch ports
they are connected to.
Protocol-based VLAN: Devices are assigned to VLANs based on the network pro-
tocol used, such as IP addresses or specific application requirements.
14
Chapter 2. State of the art of a secure LAN 2.4. Network segmentation
In our work , we are going TO assign each department itS own VLAN, improving the
performance by reducing the size of the broadcast domain and adding an additional layer
of security.
After understanding the virtual local network? we will proceed to the used protocols.
The figure 2.11 illustrates the VTP works where in this example the VTP server where
we create or modify the VLANs, the remain switch are the clients where every time there
is a change in the VTP server,it will be synchronized to the VTP clients.
As for the VTP pruning it is used to shutdown any unused VLAN traffic on trunks when
no one is using it so we reduce the bandwidth loss:[5]
15
Chapter 2. State of the art of a secure LAN 2.4. Network segmentation
Benefits of DHCP:
16
Chapter 2. State of the art of a secure LAN 2.5. Conclusion
across different locations on a wireless network. Finally, the DHCP relay agent transfers
initial DHCP messages, eliminating the need for each subnet to have its own server.
2.5 Conclusion
In this part, we have learned the fundamental concepts of safeguarding a LAN.The use of
VLANs was discussed as means of partitioning the network into smaller units, resulting
in improved security and administration. It is crucial that we stay alert to guarantee the
successful safeguarding of our information.The next chapter will take action on what we
previously explored.
17
Chapter 3
3.1 Introduction
In this chapter we will walk through our new topology from the devices configuration to
the firewalls deployments with a focus on ensuring security and high availability .
3.2.2 Wireshark
Wireshark is a widely used, open source network analyzer that captures and displays
real-time details of network traffic. It is particularly useful for troubleshooting network
issues, analyzing network protocols and ensuring network security.[7]
18
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
AC6005:
The AC6005 is a small-capacity fixed wireless access controller designed for small and
medium-sized organizations. It can manage up to 256 access points and has integrated
Ethernet switch functionality. The AC is highly scalable and can be used to build various
types of networks. There are two models available, one of which supports PoE and can
power eight gigabit-Ethernet ports.[8]
AC6605:
The AC6605 is designed for larger-scale deployments and can support more access points
and clients compared to the AC6005. It is suitable for medium to large enterprises, uni-
versities, stadiums, or large public venues. With its higher capacity and performance
capabilities, it can handle more traffic and provide higher throughput for environments
with heavier network usage and larger numbers of users.[9]
After examining the distinctive features of all the available ACs, we have made
the decision to go with the AC6605 as our primary working device for its qualities and
capabilities .
19
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
AC6605 features:
-Large-capacity as shown in the table 3.1 :
Items Descriptions
APs 1024
Users 10K
User group management 128 user groups
ssid 16K
address-Mac 16k
VLANs 4k
ARP entries 16K
Routing entries 10K
DHCP IP address pools 128 IP address pools
Wireless features:
Wireless protocols:
AC6605 supports multiple standards such as IEEE 802.11a, 802.11b, 802.11g, 802.11d,
WMM/802.11e, 802.11h, 802.11k, 802.11n, 802.11ac.
WLAN deployment:
-AP-AC CAPWAP (Control And Provisioning of Wireless Access Points) tunnel rep-
resents a protocol that permit to manage a group of APs where it holds two types of traffic:
.Data traffic It holds the actual data packet where the APs . The AP forwards
this data traffic to the AC for centralized processing to guarantee a secure and efficiently
process, making communication easier.
20
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
.Direct Forwarding Mode : It’s an efficient manner to control data traffic where
the AP directly sends packets from wireless users to the wired network without encapsu-
lation within a CAPWAP tunnel.
21
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
-Mapping between SSID ,or service set identifier represents the name given to the wifi
network that helps users identifies the APs, and the VLANs.
-Radio management:
AP zone-based configuration and management:
It’s the method for setting up SSIDs, encryption, VLANs and controlling APs by par-
titioning them into logical groups known as zones improving network segmentation and
performance.
22
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
After understanding the access controller features and deployments,we will pass to
study the switches functionalities.
3.3.2 Switches :
Huawei’s switches the S5700 and S3700 are widely recognized in the market. The selection
between the two is based on their unique characteristics:
The S3700 designed for the small business with a limited performance and scalability
and a lower bandwidth requirements.
The S5700 series Ethernet switches are energy-saving GE switches that offer high-
bandwidth access and Ethernet multi-service aggregation. With a large switching capac-
ity and high reliability, they can accommodate 10 Gbit/s upstream transmissions.These
switches also support Energy Efficient Ethernet (EEE) and Intelligent Stack (iStack:permits
different stacking-capable switches to act as a single logical switch),that allows multiple
stacking-capable switches to function as a single logical switch, making them suitable for
various enterprise network scenarios.[10]
The huawei S5700 switch solution offers high performance and a reliability net-
work for enterprise networks.
23
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
Switching basics
Switching is a process in which data transmits from source to destination where we can
defines three types:
Switch Core:
The switch core is like the backbone of the network,where it mainly operates at layer 2
switching , enables high-speed data transfer and forwards traffic between different com-
ponents of the network, providing the necessary support and connectivity for all network
activities. With its high-speed capabilities and efficient routing mechanisms.
Switch Access:
The switch Access exists at the edge of the network connecting end-devices within a LAN
allowing users to interact with devices,mainly runs at layer 3 switching,it serves as a valu-
able tool that bridges the gap between client with physical limitations and the digital
world. Its implementation can significantly enhance the accessibility devices for individ-
uals .
In the figure below, we notice the existing of two architecture ,the one without the
core layer seems,unorganized used for a small network with a lower traffic flow ,it’s less
secured.The second architecture with the core layer seems more organized, used for large
networks with a better securing by isolating different network elements from each other.
After distinguishing between the different models of switchers , the next device would
be the access point.
24
Chapter 3. Design and implementation of the LAN architecture
3.3. Implementation devices
AP 2050 is an older Huawei access point that supports Wi-Fi 802.11a/b/g/n stan-
dards. With a maximum throughput of 600 Mbps and a maximum capacity of 128 con-
nected clients,it provides a basic solution for Wi-Fi network management. While it re-
mains a valid solution for certain deployment designs,it will sometimes seem that the AP
2050 model is limited compared to newer models in terms of performance and functionality.
AP 3030 on the other hand, represents a major evolution. This Huawei access
point model supports WI-FI standards up to and including 802.11ac to deliver impressive
11ac Gbps performance.With a maximum capacity of 256 connected clients and enhanced
Wi-Fi management features,the AP 3030 offers a better user experience while support-
ing multi-channel techniques and smart antennas,providing better Wi-Fi coverage in the
ENSP environment.
25
Chapter 3. Design and implementation of the LAN
3.4.
architecture
Showcasing the new architecture
-Two firewalls connected to a cloud to enhance security,defend the network of any in-
coming and outgoing threatens such as viruses,hackers... and to control the data flow by
allowing or blocking traffic.The second firewall represent a backup plan in case of a failure
of the first one.
-The two firewalls are related to two switch core which helps increasing the bandwidth,redundancy.
-Those ones are connected from one hand to the access controller that offers the wireless
connectivity with a level of protection and compliance increasing.
In the other hand each core is related to an access switch where it represent a specific
department.Each one is connected to a sub-departments displayed by the access points.
26
Chapter 3. Design and implementation of the LAN architecture
3.5. The Topology configuration
After identifying the specific devices to be used , now we will pass to the configuration
strps.
DHCP configuration
The figure 3.13 shows the address pool configuration for each VLAN.
27
Chapter 3. Design and implementation of the LAN architecture
3.5. The Topology configuration
28
Chapter 3. Design and implementation of the LAN architecture
3.5. The Topology configuration
Each department got a sub-department with a specific Vlan.The table 3.5 explains the
first department details.
Where the PVID refers to ’Port VLAN ID’ used to handle the untagged traffic that
represents the unassigned data packets(don’t have a VLAN header), the PVID offer to
them a default VLAN.
29
Chapter 3. Design and implementation of the LAN architecture
3.5. The Topology configuration
30
Chapter 3. Design and implementation of the LAN architecture 3.6. AC configuration
3.6 AC configuration
In this section we are going to create a WLAN to provide mobility to the workspace.
DHCP
The figure 3.20 represents the DHCP configuration.
31
Chapter 3. Design and implementation of the LAN architecture 3.6. AC configuration
32
Chapter 3. Design and implementation of the LAN architecture 3.6. AC configuration
After adding the AP authentication mode , we are going to assign each AP with a
uniqueID , mac-address as well as a name as displays the figure 3.24.
From the AC basics configuration to it security settings to help creating a secure and a
performing network .
33
Chapter 3. Design and implementation of the LAN architecture 3.6. AC configuration
A security policy
We created three security profiles and we gived each one a password.
The figure 3.25 depicts an example of a security profile of a groups.
Then we sets for each group an SSID and a VAP profile as represented in the figure
3.26 and figure 3.27.
34
Chapter 3. Design and implementation of the LAN architecture 3.6. AC configuration
Finally,we bonded the VAP profiles to the AP groups and applied it configurations to
radio 0 and radio 1 of the APs in the AP groups as proven in the figure below.
35
Chapter 3. Design and implementation of the LAN architecture 3.7. Tests:
Following the deployment of the devices ,our work will expressed by the tests section.
3.7 Tests:
To check the connectivity ,locate network malfunction and host reachability we will use
the Ping command .
The source sends an ICMP(Internet Control Message Protocol) Echo Request message.
The quality of the link used to reach the destination is then evaluated by the source based
on the number of ICMP Echo Request messages sent and ICMP Echo Response messages
received, as well as the round-trip time (RTT) of ping packets.
The figure 3.30 describe the ping output in one switch core .
The figure 3.31 describes the availability of the switch access where the SA2 represent the
system department:
The figure 3.32 shows the connectivity of the AP of the sub-department ’RH’ .
The 0.00 % loss of packets indicates that the related department and the core of the
switch are working perfectly.
36
Chapter 3. Design and implementation of the LAN architecture 3.7. Tests:
To track the gateways through which packets pass from the source host to the desti-
nation host , the Tracert command will be displayed.
The figure 3.34 shows the output where it’s noticed that the destination was reached
in one hop (a device that sends data packets along a network path) the round trip time
is 1 ms for each packet.
The figure 3.34 and 3.35 demonstrates the wireless connectivity between a PC and an AP
which indicates the presence of availability as well as security where the host can’t access
without a password .
37
Chapter 3. Design and implementation of the LAN architecture 3.7. Tests:
The Wireshark open source a powerful tool that analyzes and monitor the traffic.
We are going to capture data between two pcs engaged in two different calls
38
Chapter 3. Design and implementation of the LAN architecture 3.7. Tests:
The figure 3.36 displays the Wireshark interface.We can see the packet number,the
time where it been captured, the source and the destination, the protocols and lengths.
The figure 3.37 shows the I/O graph (input/output graph) :the number of packets over
time as well the periods of higher and lower network activity.
The huwaei devices uses mac-address where each got a specific one. based on that mac
we can monitor the data traffic , we can see the way from source to destination:
39
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
Our final step in devices configuration would be for the first line defence the Firewall.
40
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
3.8.2 Features
The table 3.8 highlights the Firewall’s features.
Features Descriptions
High reliability Design highly reliable hardware design,hot standby,link backup , hot back
User authentication and control MAC ,portal and 802.1x authentication
Security and defense ACLs and isolation based on VAPs and user groups
aaa Local and radius authentication/local accounts
The USG6000 use the VRP operating system as its core component where the VRP
is an operating system dedicated platform for data communication. It got a flexible zone
management and dynamic security policy control
41
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
3.8.4 Configuration
Web interface : To open the web interface of each firewall we need to connect them
to a cloud as shown below.
42
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
Then comes the configuration of the device management IP address where the IP
address is used to access the firewall web interface as appears in figure 3.42 and figure
3.43
43
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
44
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
The trust zone : represents the most reliable and the safest zone and usually con-
tains the internal workstations section
The untrust zone: represents the less trust-worthy section,and usually contains the
devices that related to the internet where the traffic flow is well monitored
The demilitarized Zone: represents the in-between zone,and usually contains pub-
licly accessible servers like DNS and web servers
The High Availability zone: represents a zone added manually where it refers to
the ongoing service and the quick fail-over in case of a dysfunction .
45
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
It specifies the source and destination, the type of traffic such as the service , the port
and the actions permit or deny the traffic flow as shown in the figure 3.48.
46
Chapter 3. Design and implementation of the LAN architecture 3.8. Firewall huawei
High availability :
HA Port settings for the first firewall as proven in the figure below.
47
Chapter 3. Design and implementation of the LAN architecture 3.9. Conclusion
The first firewall is an active one as we used the active/standby model and its shown in
figure 3.52.
The second firewall was a standby firewall ,final configuration are shown in the figure 3.53.
3.9 Conclusion
This chapter dives into configuring our new network topology, from devices all the way
to firewall deployments. Security and high availability WERE our top priorities.
The next chapter will focus to monitoring, ensuring a high-performing network.
48
Chapter 4
Network monitoring
4.1 Introduction
Since the IT system become indispensable for societies , any failure in any part of those
systems could have a major consequence .It is vital, therefore, to set up a network moni-
toring system .
In this chapter ,we will focus on network monitoring from the concept , through the
required tools to the installation and configuration.
4.2 Monitoring
4.2.1 Definition
Network monitoring is a powerful IT procedure that detects, maps, and monitors com-
puter networks.with components such as routers, switches, servers, and firewalls.It allows
network administrators to monitor network performance and connection in real time.
Monitoring importance
In case of a network breakdown , all valuable business can become not just vulnerable
but also can cause a significant loss of customers , productivity and money .
Therefore infrastructure monitoring is a valuable tool for detecting network issues and
resolving them promptly to prevent downtime. It allows for pinpointing the exact lo-
cation of a problem so that it can be addressed promptly, reducing response times and
improving customer satisfaction. By identifying and fixing the root cause of a problem
early on, significant cost savings can be achieved, and the company’s reputation can be
49
Chapter 4. Network monitoring 4.2. Monitoring
protected.
The figure 4.2 highlights the multiple benefits of network supervision.
Concept
Network monitoring system can detect any irregularities or breakdown of any network
devices or resources whether the network resources are situated on-premises, in a data
center, hosted by a cloud services provider, or are part of a hybrid ecosystem.It can also
collect data to analyze traffic flow and performance .One approach to monitoring for per-
formance issues involves the configuration of thresholds. This enables the instantaneous
receipt of alerts in the event of a threshold violation.
Traffic monitoring is designed to analyze the data flow across the network, enabling
administrators to gain a better understanding of how the network is being utilized and
for what specific purposes. Additionally, this software provides bandwidth monitoring ca-
pabilities, which involve the measurement of data transmission rates and overall volume
to ensure optimal network performance and to prevent potential bottlenecks.
50
Chapter 4. Network monitoring 4.2. Monitoring
Flow-based tools are utilized for monitoring traffic flow to provide statistics re-
garding protocols and users. These tools also examine packet sequences to identify any
performance issues between two IP addresses. The data pertaining to the traffic flow
is captured by these flow tools and subsequently transmitted to a central collector for
processing and storage.[12]
Active network monitoring solutions employ packet injection into the network to
evaluate end-to-end reach-ability, round-trip time, bandwidth, packet loss, link utiliza-
tion, and other relevant metrics. In this manner, these solutions enable the prompt and
dependable detection of outages and performance degradation by conducting and assess-
ing real-time transactions from a user’s perspective.[13]
The table beneath shows a comparative study between different supervision tools :
51
Chapter 4. Network monitoring 4.2. Monitoring
Our work would be using the zabbix server and the SNMP as protocol to connects the
firewalls with our server.
SNMP functions
SNMP consists ON several components:
- An SNMP agent, which runs on a managed device to receive requests from the NMS
and send responses back to it.
52
Chapter 4. Network monitoring 4.2. Monitoring
- Managed devices, which represent a part of the network requiring some form of anal-
ysis and management, such as routers, switches, servers, workstations, printers, UPS as
Reveals the figure 4.5.
4.2.4 Zabbix
Zabbix is a software package that monitors a wide range of network parameters as well
as the health and integrity of servers. Zabbix uses a flexible notification mechanism that
allows users to configure an e-mail alert base for virtually any event.[14]
53
Chapter 4. Network monitoring 4.3. Settings
Features Description
Scalability Licenses for 1, 8, or 32 access points
Network Flexible network connections (Layer 2 or 3)
Services Mapping services between VLANs and SSIDs
Transfer Deployment in various network topologies
Radio Management Automatic radio parameter optimization
Access Control Secure access with ACLs and user/role controls
User Rights Management User access control based on ACLs, VLANs, and bandwidth limits
4.3 Settings
This section is based on three steps:
The VMware workstation:a virtual machine software that is used to run multiple
operating systems over a single physical host compute.
The figure shows the Zabbix appliance interface on the VMwarework station:
54
Chapter 4. Network monitoring 4.3. Settings
-Web server: Controls the web demands ans supplies contents to the web browsers.
55
Chapter 4. Network monitoring 4.3. Settings
After the installation and the upgrading of the packages, we will access to the zabbix
web-interface as proven in figure 4.14 and 4.15.
56
Chapter 4. Network monitoring 4.3. Settings
57
Chapter 4. Network monitoring 4.3. Settings
After that , we click on Configuration then , Hosts , where the figure below shows host
setups.
The figures below shows the SNMPv3 as a discovery rule for the host0
58
Chapter 4. Network monitoring 4.3. Settings
The ping output prove the server is operating correctly as shown in figure 4.22:
59
Chapter 4. Network monitoring 4.3. Settings
After adding a template for the firewalls,we will prepare the reporting section by:
60
Chapter 4. Network monitoring 4.3. Settings
61
Chapter 4. Network monitoring 4.3. Settings
-Adding the address server to the file Zabbix-Web-Service.conf as shown in figure 4.26.
Finally, Zabbix can display equipment problems as demonstrated by the example in the
figure 4.28.
62
Chapter 4. Network monitoring 4.4. Conclusion
4.4 Conclusion
This chapter defined the network monitoring term with a focus on the supervision im-
portance role,features and variety.After a comparative study between the various tools,we
have chosen ’Zabbix’ for it comprehensive and compatible system where the installation
and the configuration of the chosen tool has been explored.
63
General Conclusion
It seems that the organizations still face the availability and security problems which leads
to decreased productivity,money loss and data vulnerability.
Our project goal was creating a LAN architecture where it holds the essential fea-
tures from connectivity availability to security and monitoring .Throughout the deploy-
ment, we paid particular attention to configuring and optimizing Huawei equipments to
ensure a reliable, high-performance as well as an effective traffic management and data
flow controlling with a stable and secure connectivity for workstations, regardless of their
location.
The network monitoring upgraded the safeguard of our systems,Now we are one step
ahead of any potential security breaches,attacks.It helps the organizations determine the
outcoming traffic as well where it’s possible to supervise the employees productivity .
In terms of prospects, despite that every step has been implemented, we proposed
,for the future,to improve the work by using a Cloud-based Management for its scalability
and manageability and implementing a network Operations Center (NOC) for maintaining
Network Security.
64
Webography
65