This lab explores network security implementations in various locations, including a Data Center, ISP, Coffee Shop, and Home Network using Cisco Packet Tracer Physical Mode (PTPM). It focuses on IoT security, VPN configuration, WLAN security, and MAC filtering.
✅ Investigate different locations:
- Data Center: Network infrastructure, access control lists (ACLs), and IoT security.
- ISP: Connectivity between networks.
- Coffee Shop: Public Wi-Fi security and VPN setup.
- Home Network: WLAN configurations, MAC filtering, and guest network isolation.
✅ Enhance security through configurations:
- IoT Smoke Detector Configuration in the Data Center.
- VPN Setup on a Laptop to securely access remote services.
- Wireless Security Configuration: WPA2, MAC Filtering, and guest network restrictions.
- Cisco Packet Tracer (Latest Version)
- Packet Tracer Lab File (
3.11.1-packet-tracer---network-security-exploration---physical-mode.pkt) - Basic networking knowledge
- Open Cisco Packet Tracer.
- Click File > Open.
- Select
3.11.1-packet-tracer---network-security-exploration---physical-mode.pkt. - Start exploring and implementing security configurations.
- Configured an IoT Smoke Detector with WPA2-PSK encryption.
- Integrated IoT with an authentication server for remote management.
- Configured VPN on Coffee Shop Laptop to encrypt internet traffic.
- Verified VPN connection using:
show crypto isakmp sa
- Secured FTP file transfer over VPN.
- Configured WPA2-PSK for authentication.
- Enabled MAC Filtering: Only authorized devices can connect.
- Created a separate guest network (GuestNet) that restricts access to local resources.
- Implemented Access Control Lists (ACLs) to filter network traffic.
- Configured security settings to block unauthorized access.
📂 Network-Security-Exploration/
├── 📁 Documentation/
│ ├── 3.11.1-packet-tracer---network-security-exploration---physical-mode.pdf
│ ├── Lab_Report.docx
│ ├── Network_Topology.png
│
├── 📁 PacketTracer_Files/
│ ├── 3.11.1-packet-tracer---network-security-exploration---physical-mode.pkt
│
├── 📁 Commands/
│ ├── Commands-that-will-help.docx
│
├── README.md
-
Test Network Connectivity
ping 192.168.0.254 # Check Home Router connectivity ping 10.0.0.2 # Check VPN Server connectivity ping 8.8.8.8 # Verify external internet access
-
Check Active VPN Sessions
show crypto isakmp sa
-
Verify ACL Rules
show access-lists
-
Test FTP Transfer Over VPN
ftp 172.19.0.3 get PTsecurity.txt
✔ Ensure correct VPN credentials:
GroupName: REMOTE
Group Key: CISCO
Host IP: 10.0.0.2
Username: VPN
Password: ciscorocks
✔ Check if VPN tunnel is active:
show crypto isakmp sa
✔ Verify MAC Filtering settings on the router. ✔ Ensure SSID is correctly entered in the wireless configuration.
✔ Verify GuestNet MAC Filtering settings. ✔ Check DHCP lease assignment from the Home Router.
- Implement Multi-Factor Authentication (MFA) for VPN Access.
- Deploy Next-Generation Firewalls (NGFW) for better security.
- Enable Network Intrusion Prevention System (IPS) for advanced threat detection.
- Use Biometric Authentication in Data Center for added security.
🚀 Successfully implemented network security configurations in Cisco Packet Tracer!
- Applied IoT, VPN, ACLs, WLAN, and MAC Filtering security measures.
- Configured secure network segmentation.
- Validated VPN access & FTP transfer security.