Secure Global Restuarant Network System Design and Implementation


Scenario Description: Secure Hotel/Restuarant Network:

This network design represents the Lancaster Hotel Network system in which the company is comprised of the headquarters located in London and the other three branches located in Manchester, Portsmouth, and Cambridge. The London site is expected to have 6 departments that include Front Office and Service (100 employees), Restaurant (30 employees), Admin/Management/IT (30 employees), Sales and Marketing (30 employees), and finally, HR and Finance (15 employees) departments. In every branch site, there are two departments each and they include Sales and Marketing (15 employees), and Front Office and Service (15 employees). The employees in each department are expected to double in the future and therefore this should be taken into consideration during the design and implementation.

The ICT and other departments at the headquarters are expected to provide support for all the branches remotely and therefore SSH and site-to-site IPsec VPN should be used to realize secure communication between the HQ and the branches. The network is expected to be more secure, of high performance, and redundant to eliminate a single point of failure and for load-balancing.

Assessment Criteria:
  1. Creating a network topology using Cisco Packet Tracer.
  2. Hierarchical Network Design.
  3. Connecting Networking devices with Correct cabling.
  4. Configuring Basic device settings.
  5. Creating VLANs and assigning ports VLAN numbers.
  6. Creating both data and voice VLANs and assigning ports VLAN numbers.
  7. Subnetting and IP Addressing.
  8. Configuring Inter-VLAN Routing both on the Switches (SVI) and Routers (router-on-a-stick).
  9. Configuring Dedicated DHCP Server device for Data to provide dynamic IP allocation.
  10. Configuring Routers as DHCP server for Voice to provide IP Phones dynamic IP allocation.
  11. Configuring link aggregation or EtherChannel using LACP
  12. Configuring SSH for secure Remote access.
  13. Configuring OSPF as the routing protocol.
  14. Configuring Standard ACL for VTY interfaces to restrict remote Access using SSH.
  15. Configuring Port Address Translation or PAT for NAT.
  16. Configuring Standard ACL for PAT.
  17. Configuring VoIP or Telephony service configuration in all routers.
  18. Configuring site-to-site IPsec VPN on the gateway routers.
  19. Configuring Standard ACL for site-to-site IPsec VPN.
  20. Configuration of Cisco ASA firewall to filter inbound and outbound traffic.
  21. Configuring security levels and zones on a Cisco ASA firewall.
  22. Configuring default static route on a Cisco ASA firewall.
  23. Configuring network objects on a Cisco ASA firewall.
  24. Configuring inspection policy on a Cisco ASA firewall.
  25. Configuring ISP routers.
  26. Testing and verifying Network Communication.
Network Topology Created
The network topology below satisfy the user requirements above and everything is verified, tested and working fine.

Purchase the Project from PayPal

  1. Get File via PayPal Donation

    Access the file through a PayPal donation. After donating, you'll be redirected to our repository where all files are stored.

      The zipped file has the following;
    • Complete Cisco Packet Tracer File
    • Complete Documentation
    • IP Addressing Table
    • Case Study/Case work
    • Project Screenshot