0% found this document useful (0 votes)
39 views38 pages

Lab Network Architecture

The lab focuses on creating reliable connectivity through High Availability (HA) solutions using Fortigate, Cisco, and Mikrotik devices. It employs methods such as Static Routing, Dynamic OSPF, and Link Aggregation to ensure continuous internet access despite device failures. Testing confirms that the network maintains connectivity even when individual ISPs or devices go down.

Uploaded by

raimol gensan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views38 pages

Lab Network Architecture

The lab focuses on creating reliable connectivity through High Availability (HA) solutions using Fortigate, Cisco, and Mikrotik devices. It employs methods such as Static Routing, Dynamic OSPF, and Link Aggregation to ensure continuous internet access despite device failures. Testing confirms that the network maintains connectivity even when individual ISPs or devices go down.

Uploaded by

raimol gensan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Lab Network Architecture

Lab ini bertujuan untuk menciptakan konektivitas yang handal dengan menerapkan solusi High
Availability (HA) pada jaringan yang terdiri dari perangkat Fortigate, Cisco, dan Mikrotik. Dalam lab ini,
dilakukan berbagai pengujian dan konfigurasi untuk memastikan bahwa koneksi internet tetap dapat
terjaga meskipun beberapa perangkat seperti Firewall, Switch, atau Router mengalami gangguan atau
mati.

Metode yang digunakan dalam lab ini :

· Routing Static: Digunakan untuk konfigurasi rute manual dan memastikan alur lalu lintas dapat
diarahkan secara jelas ke tujuan meskipun ada perangkat yang down.

· Routing Dynamic OSPF: Menggunakan protokol OSPF untuk mendeteksi dan beradaptasi
dengan perubahan topologi jaringan secara otomatis, memberikan redundansi dan pemulihan jalur
secara dinamis.

· Link Aggregation (Etherchannel): Menggabungkan beberapa link fisik menjadi satu channel logis
untuk meningkatkan bandwidth dan ketersediaan koneksi antar perangkat.

Dengan implementasi metode-metode tersebut, lab ini berhasil menunjukkan cara memastikan jaringan
tetap berjalan meskipun ada perangkat yang mengalami down, menjaga konektivitas pengguna ke
internet tanpa gangguan
Topology Network Architecture

Keterangan

No Nama Devices Manufacture

1 ISP-A MikroTik

2 ISP-B MikroTik

3 FW-Main FortiGate

4 FW-Backup FortiGate

5 Mik-1 MikroTik
6 Mik-2 MikroTik

7 SW-Core-1 Cisco

8 SW-Core-2 Cisco

9 C-1 Cisco

10 C-2 Cisco

Konfigruasi

ISP-A

/interface bridge
add name=bridge1-forti
/interface bridge port
add bridge=bridge1-forti interface=ether2
add bridge=bridge1-forti interface=ether3
add bridge=bridge1-forti interface=ether4
/ip address
add address=10.10.10.1/29 interface=bridge1-forti network=10.10.10.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
/system identity
set name=ISP-A

ISP-B

/interface bridge
add name=bridge1-forti
/interface bridge port
add bridge=bridge1-forti interface=ether2
add bridge=bridge1-forti interface=ether3
add bridge=bridge1-forti interface=ether4
/ip address
add address=10.10.20.1/29 interface=bridge1-forti network=10.10.20.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
/system identity
set name=ISB-B

Config Forti-main :

Interface
Zone Port
DNS

Routing to inet
NAT

Static routing

Config Forti-Backup
Interface
DNS

Routing to inet
NAT

Static Routing

SW-Core1 :

Switch>enable
Switch#configure terminal

Switch(config)#interface ethernet 0/0


Switch(config)#no switchport
Switch(config-if)#ip address 10.0.2.2 255.255.255.0
Switch(config-if)#no shutdown

Switch(config)#interface ethernet 0/1


Switch(config)#no switchport
Switch(config-if)#ip address 10.0.0.2 255.255.255.0
Switch(config-if)#no shutdown
Switch(config)#interface ethernet 0/2
Switch(config)#no switchport
Switch(config-if)#ip address 10.100.100.1 255.255.255.0
Switch(config-if)#no shutdown

Switch(config)#interface ethernet 0/3


Switch(config)#no switchport
Switch(config-if)#ip address 10.200.0.1 255.255.255.0
Switch(config-if)#no shutdown

Switch(config)#interface ethernet 1/0


Switch(config)#no switchport
Switch(config-if)#ip address 10.200.10.1 255.255.255.0
Switch(config-if)#no shutdown

Switch(config)#end
Switch#write memory

Switch(config)# ip routing

Switch(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.1


Switch(config)#ip route 0.0.0.0 0.0.0.0 10.0.2.1 100

Switch(config)#router ospf 1
Switch(config-router)#router-id 1.1.1.1

Switch(config-router)#network 10.100.100.0 0.0.0.3 area 0


Switch(config-router)#network 10.200.0.0 0.0.0.3 area 0
Switch(config-router)#network 10.200.10.0 0.0.0.3 area 0

Switch#write memory

SW-Core2 :

Switch>enable
Switch#configure terminal

Switch(config)#interface Ethernet0/0
Switch(config)#no switchport
Switch(config-if)#ip address 10.0.1.2 255.255.255.252
Switch(config-if)#no shutdown

Switch(config)#interface Ethernet0/1
Switch(config)#no switchport
Switch(config-if)#ip address 10.0.3.2 255.255.255.252
Switch(config-if)#no shutdown

Switch(config)#interface Ethernet0/2
Switch(config)#no switchport
Switch(config-if)#ip address 10.100.100.2 255.255.255.252
Switch(config-if)#no shutdown

Switch(config)#interface Ethernet0/3
Switch(config)#no switchport
Switch(config-if)#ip address 10.200.20.1 255.255.255.252
Switch(config-if)#no shutdown

Switch(config)#interface Ethernet1/0
Switch(config)#no switchport
Switch(config-if)#ip address 10.200.30.1 255.255.255.252
Switch(config-if)#no shutdown

Switch(config)# ip routing

Switch(config)#ip route 0.0.0.0 0.0.0.0 10.0.3.1


Switch(config)#ip route 0.0.0.0 0.0.0.0 10.0.1.1 100

Switch(config)#router ospf 1
Switch(config-router)#router-id 2.2.2.2

Switch(config-router)#network 10.100.100.0 0.0.0.3 area 0


Switch(config-router)#network 10.200.0.0 0.0.0.3 area 0
Switch(config-router)#network 10.200.10.0 0.0.0.3 area 0

Switch#write memory

MIK-1

/ip pool
add name=dhcp_pool0 ranges=192.168.1.2-192.168.1.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=ether3 name=dhcp1
/routing ospf instance
set [ find default=yes ] router-id=3.3.3.3
add disabled=yes name=ospf1 router-id=3.3.3.3
/ip address
add address=10.200.0.2/30 interface=ether1 network=10.200.0.0
add address=192.168.88.1/30 interface=ether2 network=192.168.88.0
add address=192.168.1.1/24 interface=ether3 network=192.168.1.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.1.0/24 gateway=192.168.1.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
add action=masquerade chain=srcnat out-interface=ether2
/routing ospf network
add area=backbone network=10.200.0.0/30
add area=backbone network=192.168.88.0/30
add area=backbone network=192.168.1.0/24
/system identity
set name=MIK-1

MIK-2

/ip pool
add name=dhcp_pool0 ranges=192.168.2.2-192.168.2.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=ether3 name=dhcp1
/routing ospf instance
set [ find default=yes ] router-id=4.4.4.4
/ip address
add address=10.200.20.2/30 interface=ether1 network=10.200.20.0
add address=192.168.88.2/30 interface=ether2 network=192.168.88.0
add address=192.168.2.1/24 interface=ether3 network=192.168.2.0
/ip dhcp-client
add disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.2.0/24 gateway=192.168.2.1
/ip dns
set allow-remote-requests=yes servers=8.8.8.8
/ip firewall nat
add action=masquerade chain=srcnat out-interface=ether1
add action=masquerade chain=srcnat out-interface=ether2
/routing ospf network
add area=backbone network=10.200.20.0/30
add area=backbone network=192.168.88.0/30
add area=backbone network=192.168.2.0/24
/system identity
set name=MIK-2

C1 :

Router>enable
Router#configure terminal
Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 10.200.10.2 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.99.1 255.255.255.252
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config)#interface FastEthernet1/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#exit

Router(config)# ip dhcp pool LAN


Router(dhcp-config)# network 192.168.3.0 255.255.255.0
Router(dhcp-config)# default-router 192.168.3.1
Router(dhcp-config)# dns-server 8.8.8.8
Router(dhcp-config)# exit

Router>enable
Router#configure terminal

Router(config)#router ospf 1
Router(config-router)#router-id 5.5.5.5
Router(config-router)#log-adjacency-changes
Router(config-router)#network 10.200.10.0 0.0.0.3 area 0
Router(config-router)#network 192.168.3.0 0.0.0.255 area 0
Router(config-router)#network 192.168.99.0 0.0.0.3 area 0
Router(config-router)#exit

Router(config)#ip nat inside source route-map NAT1 interface FastEthernet0/0 overload


Router(config)#ip nat inside source route-map NAT2 interface FastEthernet0/1 overload

Router(config)#access-list 1 permit 192.168.3.0 0.0.0.255


Router(config)#route-map NAT1 permit 10
Router(config-route-map)#match ip address 1
Router(config-route-map)#match interface FastEthernet0/0
Router(config-route-map)#exit

Router(config)#route-map NAT2 permit 10


Router(config-route-map)#match ip address 1
Router(config-route-map)#match interface FastEthernet0/1
Router(config-route-map)#exit

Router(config)#exit

C2

Router>enable
Router#configure terminal

Router(config)#interface FastEthernet0/0
Router(config-if)#ip address 10.200.30.2 255.255.255.252
Router(config-if)#no shutdown

Router(config)#interface FastEthernet0/1
Router(config-if)#ip address 192.168.99.2 255.255.255.252
Router(config-if)#no shutdown

Router(config)#interface FastEthernet1/0
Router(config-if)#ip address 192.168.4.1 255.255.255.0
Router(config-if)#no shutdown

Router(config)#exit
Router#write memory

Router>enable
Router#configure terminal

Router(config)#ip dhcp pool LAN


Router(dhcp-config)#network 192.168.4.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.4.1
Router(dhcp-config)#dns-server 8.8.8.8

Router(config)#exit
Router#write memory

Router>enable
Router#configure terminal
Router(config)#router ospf 1
Router(config-router)#router-id 6.6.6.6
Router(config-router)#log-adjacency-changes
Router(config-router)#network 10.200.30.0 0.0.0.3 area 0
Router(config-router)#network 192.168.4.0 0.0.0.255 area 0
Router(config-router)#network 192.168.99.0 0.0.0.3 area 0

Router(config)#ip nat inside source route-map NAT1 interface FastEthernet0/0 overload


Router(config)#ip nat inside source route-map NAT2 interface FastEthernet0/1 overload

Router(config)#access-list 1 permit 192.168.4.0 0.0.0.255

Router(config)#route-map NAT2 permit 10


Router(config-route-map)#match ip address 1
Router(config-route-map)#match interface FastEthernet0/0

Router(config)#route-map NAT1 permit 10


Router(config-route-map)#match ip address 1
Router(config-route-map)#match interface FastEthernet0/1

Router(config)#ip http server


Router(config)#no ip http secure-server

Router(config)#exit
Router#write memory

=========================================================================

PENGUJIAN :

Normal ( semua ISP dalam keadaan hidup )


vpc-m1
trace 8.8.8.8 > mik-1 > sw-core-1 > forti-main > isp-A

vpc-m2
trace 8.8.8.8 > mik-2 > sw-core-2 > forti-backup > isp-B
vpc-c3
trace 8.8.8.8 > c-1 > sw-core-1 > forti-main > isp-A

vpc-c4
trace 8.8.8.8 > c-2 > sw-core-2 > forti-backup > isp-B

ISP-A Down
vpc-m1
trace 8.8.8.8 > mik-1 > sw-core-1 > forti-main > isp-B

vpc-m2
trace 8.8.8.8 > mik-2 > sw-core-2 > forti-backup > isp-B
(default route vpc-m2 melalui ISP-B. Jika ISP-A Down maka vpc-m2 tidak akan terpengaruh )

vpc-c3
trace 8.8.8.8 > c-1 > sw-core-1 > forti-main > isp-B

vpc-c4
trace 8.8.8.8 > c-2 > sw-core-2 > forti-backup > isp-B
(default route vpc-c4 melalui ISP-B. Jika ISP-A Down maka vpc-c4 tidak akan terpengaruh )

ISP-B Down
vpc-m1
trace 8.8.8.8 > mik-1 > sw-coer-1 > forti-main > isp-A
(default route vpc-m1 melalui ISP-1, Jika ISP-B down maka vpc-m1 tidak akan terpengaruh )

vpc-m2
trace 8.8.8.8 > mik-2 > sw-core-2 > forti-backup > isp-A
vpc-c3
trace 8.8.8.8 > c-1 >sw-core-1 > forti-main > isp-A
(default route vpc-c3 melalui ISP-1. Jika ISP-B Down maka VPC-C3 tidak akan terpengaruh )

vpc-c4
trace 8.8.8.8 > c-2 > sw-core-2 > forti-backup > isp-A

Forti-Main Down (link sw-core1 ke arah forti-main down)


vpc-m1
trace 8.8.8.8 > mik-1 > sw-core-1 > sw-core-2 > isp-B

vpc-m2
trace 8.8.8.8 > mik-1 > sw-core-2 > forti-backup > isp-B
( akan tetap lewat ISP-2 krn default lewat ISP-2)

vpc-c3
trace 8.8.8.8 > c-1 > sw-core-1 > forti-backup > isp-B

vpc-c4
trace 8.8.8.8 > c-2 > sw-core2 > forti-backup > isp-B
( akan tetap lewat ISP-2 krn default lewat ISP-2)

Forti-Backup Down (link sw-core2 ke arah forti-backup down)


vpc-m1
trace 8.8.8.8 > sw-core1 > forti-main > isp-A

vpc-m2
trace 8.8.8.8 > sw-core2 > forti-main > isp-A
vpc-c3
trace 8.8.8.8 > C-1 > C-2 > sw-core-2 > forti-main > isp-A

vpc-c4
trace 8.8.8.8 > C-2 > sw-core-2 > forti-main > isp-A

sw-core-1 down (link mik-1 ke arah sw-core1 down)


vpc-m1
trace 8.8.8.8 > mik-1 > mik-2 > sw-core-2 > forti-backup > isp-B

vpc-m2
trace 8.8.8.8 > mik-2 > sw-core-2 > forti-backup > isp-B
vpc-c3
trace 8.8.8.8 > C-1 > C-2 > sw-core-2> forti-backup > isp-B

vpc-c4
trace 8.8.8.8 > C-2 > sw-core-2 > forti-backup > isp-B

sw-core-2 down
vpc-m1
trace 8.8.8.8 > mik-1 > sw-core-1 > forti-main > isp-A

vpc-m2
trace 8.8.8.8 > mik-2 > mik-1 > sw-core-1 > forit-main > isp-A
vpc-c3
trace 8.8.8.8 > C-1 > sw-core-1 > forti-main > isp-A

vpc-4
trace 8.8.8.8 > C-2 > C-1> sw-core-2 > forti-main > isp-A

sw-core-1 | forti-main | isp-b down


vpc-m1
trace 8.8.8.8 > Mik-1 > Mik-2 > sw-core-2 > forti-backup > isp-A

vpc-m2
trace 8.8.8.8 > mik-2 > sw-core-2 > forti-backup > isp-A
vpc-c3
trace 8.8.8.8 > c-1 > c-2 > sw-core-2 > forit-backup> isp-A

vpc-c4
trace 8.8.8.8 > c-2 > sw-core-2 > forti-backup > isp-A

sw-core-2 | forti-backup | isp-a down


vpc-m1
trace 8.8.8.8 > mik-1 > sw-core-1 > forti-main > isp-B

vpc-m2
trace 8.8.8.8 > mik-2 > mik-1 >sw-core-1 > forti-main > isp-B
vpc-c3
trace 8.8.8.8 > c-1 > sw-core-1 > forti-main > isp-B

vpc-c4
trace 8.8.8.8 > c-2 > c-1 > sw-core-1 > forti-main > isp-B

Dari hasil konfigurasi dan pengujian yang telah dilakukan, dapat disimpulkan bahwa tujuan High
Availability pada jaringan yang telah dikonfigurasi telah tercapai dengan baik. Konfigurasi yang
diterapkan diharapkan mampu meminimalkan downtime pada jaringan, sehingga memastikan
ketersediaan koneksi yang stabil dan handal meskipun terjadi gangguan pada perangkat jaringan.

Author : Abi Adrian

Linkedin : https://www.linkedin.com/in/abi-adrian-663513190/

You might also like