Home Return

Simulation of ICT Network Configuration Based on Existing Network Configuration at the Network Operation Center of the Badung Regency Government

cv publish0x hive steemit uptrennd https://lbry.tv/$/invite/@0fajarpurnama0:e https://bittube.app/?ref?2JY4FE0CP youtube viewly twitch bitchute dlive dtube portal twitter facebook instagram lindked discord reddit vk pininterest socialeaglerockglobal minds medium blogger weebly wix joomla thumblr

source code

View My Stats

word number: 7391

Time: 2021-03-01 14:29:27 +0000


  • This is an english translation of my practical work report on the Fiber Optic Installation Project in the Central Government of Badung Regency, Bali from June-August 2012 where I highlight the computer network configuration using Cisco devices and the theme I raised in this report is the simulation of Cisco equipment using Cisco Packet Tracer.
  • This practical work report is an obligation for my bachelor’s in the Department of Electrical Engineering, Faculty of Engineering, Udayana University. However, this report has never been published anywhere and the copyright is fully mine and it has been 8 years since this report was written where conditions on the field have changed so it is less likely to reveal secrets that can be dangerous for the Badung Regency Government. Therefore, I declare that this report is open, may be copied, may be republished, and may be sold on condition to give attribution by mentioning my name as the original author and state that this report is open at this link (customized CC-BY-SA).


The Fiber Optic Installation Project in the Central Area of the Badung Regency Government is a path to switch the conventional government system to ICT-based (Information Communication Technology). Project implementation is carried out by conducting an environmental survey, preparing tools, materials, and labor, making fiber optic lines, planting optical fibers, connecting optical fibers to devices in each building, configuring the network and clean the area to be exactly as before. This report will discuss the network configuration part.

What needs to be understood in order to do this configuration is understanding device usage, understanding IP addresses, understanding VLAN (Virtual Local Area Network), understanding static routes and RIP (Routing Information Protocol), remote login, and NAT (Network Address Translation).

Configuration was carried out in Building 10, namely the Central Government of Badung Regency Transportation and Information Agency from September 4, 2012 to September 8, 2012. The tools needed to perform the configuration are a laptop, UTP cable, DB9M-USB converter cable, and Cisco console cable. The software needed for configuration is a serial terminal and a telnet client. The first configuration planning is the provision of VLAN (Virtual Local Area Network) allocations to each agency in each building. Second, the allocation of IP addresses on each VLAN. The third is the allocation of IP addresses for each device. The fourth is topology formation.

The first configuration is on the local network. The IP address for each switch is on VLAN 1. Each switch is assigned a VLAN ID based on the services contained in the building. The connection from the switch to the multilayer switch is given trunk mode so that all VLAN IDs can pass. In a multilayer switch port connected to the Internet network is given an IP address and a multilayer switch is given a routing configuration. Routing is also set up on other routers. Router 2900 is configured with NAT (Network Address Translation) to translate the local IP address from the inside into a Public IP address outward. All devices are debug enabled, logged, and Telnet login enabled.

In the IP address configuration there is a waste of IP addresses. It is recommended to reconfigure the subnet mask. It is recommended again to label more ports and VLAN IDs to make management easier.

Chapter 1 Introduction

1.1 Background

ICT (Information Communication Technology) is a term that covers information, communication, telecommunications, and computers. With the existence of ICT, it replaces the place of information that is real objects. Libraries can be replaced with web pages on the Internet network, documents in the form of paper and books can be replaced with servers containing electronic documents, correspondence by post mails can be replaced with email (electronic mail). Information on the Internet is also available in the form of pictures and videos. The advantage of this method compared to the classical method is the efficiency of energy, place and time. With ICT, all forms of information contained can be accessed anytime and anywhere quickly (without having to waste energy and time to go somewhere and are limited by time to access information).

Many Government Centers have switched to ICT-based, meaning that they have begun to utilize ICT technology for the benefit of the Government. One example of sending documents via post or sending documents by directly visiting the delivery destination is starting to be replaced with email. The place where the author carried out practical work, namely in the Badung District Government Center has switched to ICT-based.

Practical Work at the Central Government of Badung Regency is to carry out the Fiber Optic Installation Project in all Services in the Central Government of Badung Regency. The Project Owner is Dishubkominfo (Department of Transportation, Communication and Informatics) Badung Regency Government, the executor is PT. Skill Surabaya, and the supervisor is CV. Bali Info Data. The author is on the supervisory side.

Of all the stages of Fiber Optic Network Infrastructure Development in the Central Area of the Badung Regency Government, this Job Training Report is specifically at the ICT configuration stage. To make it easier to absorb, this computer network configuration will be simulated in the Cisco Packet Tracer network simulator program. The simulation was carried out because the author was on the supervisor’s side where the configuration stages could not be shown directly, because the ICT configuration in the Badung Regency Government was fixed, not allowed for reconfiguration. This program is used because the tools used are almost all Cisco products.

1.2 Objective

Report the computer network configuration on the Fiber Optic Network Infrastructure Development Project in the Central Area of the Badung Regency Government, and simulate it in Cisco Packet Tracer.

1.3 Benefit

  1. Have a computer network configuration documentation on this project.
  2. Understand more about the configuration of this computer network by linking existing theories.
  3. By simulating it in Cisco Packet Tracer, it can be faster and easier to understand.

1.4 Practical Work Execution

This Practical Work is the Infrastructure Development for Fiber Optic Networks carried out from June-September 2012 in the Central Area of the Badung Regency Government. In general, this project stages are

  • Area survey, purchasing tools and materials, and finding labor.
  • Digging holes at several points and drilling for passing Fiber Optic cables under the ground, as well as installing Fiber Optic lines in each basement of the building.
  • Optical Fiber Connections from the Communication and Information Technology Transportation Agency to each service, there are 12 buildings, and perform performance testing of Fiber Optic cables.
  • Installation of Switches and Routers at the Communication and Information Technology Agency and Switches in each building as a fiber optic link from the Communication and Information Technology Department of Transportation to each building.
  • Configure Switches and Routers, and perform performance testing.
  • Cleaning and tidying up.

1.5 Scope and Boundaries

  1. Configuration discussion is starting from Cisco Switch c3750e from all buildings to modems at the Department of Communications, Communications and Information.
  2. Discusses IP (Internet Protocol) Addresses, Virtual Local Area Networks, Static Routes, Router Information Protocols, Network Address Translation, Telnet Login, the types of cables used.
  3. Not discussing network security and bandwidth limitation, both on Cisco ASA and Mikrotik because network security and bandwidth limitation are still in the planning stage, will be implemented in the future.
  4. Using Cisco Packet Tracer as a simulator with the limitations of using UTP cable instead of Fiber Optic Switch 2960-24TT cable as a replacement for the c3750e Switch, Multilayer Switch 3560-24 PS as a replacement for the Multilayer Switch cat4500e, and Router 2811 as a replacement for Mikrotik, Modem, ASA Router, and Router 2900 is due to the absence of this module in Cisco Packet Tracer.

1.6 Writing System

  • Chapter 1 Introduction contains the background, objectives, benefits, implementation of practical work and the scope and limitations.
  • Chapter 2 Literature Review contains IP addresses, Switches and Routers, Virtual Local Area Networks, Static Routes, Router Information Protocols, Network Address Translation, Telnet Login, UTP Cables, and Cisco console cables.
  • Chapter 3 The Badung Regency Government ICT Network Configuration contains the time and place, tools and materials, network configuration plans, and configuration of each device.
  • Chapter 4 Discussion of network configuration leading from Multilayer Switch cat4500e to Modem, local network configuration, and connection test.
  • Chapter 5 Closing contains conclusions and suggestions.

Chapter 2 Literature Review

2.1 Introduction

To perform this configuration requires knowledge of when using a straight-through or crossover type RJ45 ethernet cable to connect between devices. In this ICT configuration, a switch is used as a link between many devices and a router as a link to the Internet. Addressing devices is used IPV4 (Internet Protocol Version 4). In-depth knowledge of IPV4 is required for a central level ICT configuration of Government. Knowledge of VLAN (Virtual Local Area Network) is required to facilitate local network management, and a little NAT (Network Address Translation) for connecting to the Internet. Telnet login is optional, for easy management. Then the theories that need to be known are described in this chapter.

2.2 RJ45 Ethernet Cable and DB9 - RJ45 Cable

The RJ45 Ethernet cable that connects the computer to the switch, switch to the router using a straight-through cable. Meanwhile, to connect between computers, between switches, between routers, and computers with a router using a crossover cable. The RJ45 ethernet cable consists of 8 pins, of which 4 are used as minus voltage transmitters, plus voltage transmitters, minus receivers, and plus receivers. There are straight-thru and crossover types because there are differences in the location of the transmitter and receiver (The Internet Center, 2013).

Gambar 2.1 Susunan kabel Ethernet RJ45.gif

Figure 2.1 RJ45 Ethernet cable arrangement (The Internet Center, 2013)

The Cisco console cable is used to configure Cisco devices. This cable is a female DB9 to RJ45 male.

Gambar 2.2a Susunan kabel DB9 female ke RJ45 male.jpg

Gambar 2.2b Susunan kabel DB9 female ke RJ45 male.png

Figure 2.2 Arrangement of DB9 female to RJ45 male cable (WTI, 2013)

2.3 Switch and Router

A switch is a device that can connect between computers, between local networks, and between computers and local networks. In OSI (Open Systems Interconnection) the reference model works at layer 2, namely datalink. Switches have multiple ports and work by forwarding incoming frames from a port to a destination port. The switch stores the hardware address and port location of the connected devices on a port.

Router is a device that connects between networks (currently between switches). In OSI (Open Systems Interconnection) the reference model works at layer 3, namely the network. Router works based on network address. The router determines the path to go to other networks (Gebali, 2008).

2.4 IP (Internet Protocol) Address

IP address or translated as IP address defines a host or a router to the Internet network, is a binary series of numbers. Computer networks and Internet networks today use IP addresses to indicate the identity of a device. This address is used as the identity of the data sender and receiver. Therefore IP addresses must be unique and universal. Currently there are 2 versions of IP, namely IP version 4 and IP version 6.IPV4 consists of 32 bits and is written in binary or decimal form, while IPV6 consists of 128 bits and is written in binary or hexadecimal form, currently used is IPV4, IPV6 for the future.

IPV4 is written with a subnet mask or prefix. Writing in decimal divided by byte or 8 bits (xxxxxxxx.xxxxxxx.xxxxxxx.xxxxxxx).

Example 2.1

An IP address (11000000.10101000.00000000.00000001) (11111111.1111111.1111111.00000000). Writing in the prefix is (x.x.x.x/n), the number 24 represents the number of bits 1 in the subnet mask. Therefore, the author of the subnet mask can only be divided into 2 poles, namely the left side of the number 1, and the right part of the number 0 (it cannot be random).

The subnet mask shows the number of hosts in a network, shows the network ID (identity), and the host ID. To find the network ID for an IP address, perform the AND operation on the given subnet mask.

Example 2.2

From example 2.1 (11000000.10101000.00000000.00000001) (11111111.1111111.1111111.00000000), 11000000.10101000.00000000.00000001 AND 11111111.1111111.1111111.00000000 result are 11000000.10101000.00000000.00000000 where is network ID, and host is

IP addresses can be class or classless. If it is a class, it is divided into 5 classes, namely A, B, C, D, and E. What is used in general is A - C, while D is for multicast and E experimentally, and is used for future needs (Sutanta, 2005). Here are 2 tables showing the class and a table regarding the prefix.

Table 2.1 IP address class (Sutanta, 2005)
Class Subnet Allocation
A –
B –
C –
D - –
E - –
Table 2.2 Prefix (Sutanta, 2005)
/n Subnet /n Subnet /n Subnet /n Subnet
/1 /9 /17 /25
/2 /10 /18 /26
/3 /11 /19 /27
/4 /12 /20 /28
/5 /13 /21 /29
/6 /14 /22 /30
/7 /15 /23 /31
/8 /16 /24 /32

If the subnet mask is deepened, the subnet mask can determine the number of IP addresses on a network. The number of IP addresses can be calculated from bit 1 on the right combined with all bits 0 in the subnet mask.

Example 2.3 (11111111.1111111.1111111.00000000), then the number of IP addresses = 10000000(2) is 256(10), (11111111.1111111.11111111.11100000), then the number of IP addresses = 100000(2) is 32(10).

Of all IP addresses in a network, the first IP address is used as a network ID, the last IP address is used as a broadcast ID, and if it is a WAN (Wide Area Network) network, one more IP address is needed as a gateway (to another network), usually an address after the network ID.

Example 2.4 (11000000.10101000.00000000.00000001) (11111111.1111111.1111111.00000000), then if 11000000.10101000.00000000.00000001 AND 11111111.1111111.1111111.00000000 result is 11000000.10101000.00000000.00000000 is is a network ID, with the host identity, with the subnet mask (11111111.1111111.1111111.00000000), then the total number of IP addresses is 10000000 (2) = 256 (10), the first address as the network ID and the last address is as the broadcast ID, and can be selected from - as the gateway, and the rest can be used for the host (Inixindo, 2005). For further exploration, please see the following table.

Table 2.3 Example of IP address management
IP address Subnet Mask Network ID Gateway Available Host ID Broadcast ID - - - - -

In conclusion, the fewer the number of bits 1 in the subnet mask, the greater the number of hosts and the less the number of network IDs, and vice versa.

2.5 VLAN (Virtual Local Area Network)

A VLAN is a group of devices on 1 or more LANs that are configured to communicate as if they are connected to the same cable, where in fact they are on different LAN segments. VLANs are based on logic rather than physics, because they are flexible.

VLAN defines a broadcast domain at layer 2. Broadcast domain is a set of devices that will receive broadcast frames from any device. Layer 2 Switches create broadcast domains based on switch configurations. Switches are multiport bridges that can create multiple broadcast domains. One VLAN can be a broadcast domain. VLANs cannot communicate with each other because they are in different broadcast domains. To connect between VLANs it is necessary to use a router or layer 3 switch (Cisco, 2004).

Gambar 2.3 Contoh VLAN.png

Figure 2.3 Example VLAN (Cisco, 2004)

2.6 Static Route and RIP (Routing Information Protocol)

Static Route is a permanent routing mechanism. The path to a network on a router device is determined directly by the administrator. In the static route setting of a router, it is the next hop when it goes to a network.

RIP is a dynamic route, which is a routing mechanism that varies with time and is flexible. RIP adopts a distance-vector protocol where each router will provide information to neighboring routers about the path connected to the router. From this the router will estimate the distance of all the paths to reach other networks. After that the router will determine its own path based on the shortest distance according to router estimates from the results of exchanging information between neighboring routers (Stallings, 1998).

2.7 NAT (Network Address Translation)

IPV4 is running low, meaning that most of it is already in use around the world. Therefore IPV6 was developed. While waiting for IPV6 to be implemented there is a solution to save IP addresses in version 4, namely NAT. IPV4 addresses are classified into 2 types, namely private IP and global IP. Global IP is an IP address that is only owned by 1 device worldwide and is known in the Internet network. Meanwhile, private IP is an unknown IP address on the Internet network and is free to use by any device so that the owner can be more than 1. The private IP is 10.x.x.x, 172.16.x.x, and 192.168.x.x Whereas 127.x.x.x is used as the loopback. In addition, it is a global IP address (Inixindo, 2005).

NAT works by translating private IP to global IP and vice versa. For example a host array has private IP - and exits via router, gateway which can NAT with global IP, for example to Google DNS Then packets out of - will be translated to before sending to After that will reply with the destination IP address, after which the router converts to the destination IP address to 192.168.10.x, depending on the sender (Peterson, 2003).

2.8 Telnet

Telnet is an application that works at OSI layer 7, which is an application that can perform remote login, which is entering a device using another computer. Telnet is very useful for remote work, which should come to the location of the device to enter the system, with telnet entry to the system can be done remotely. Telnet transmits data without encryption and is opened on port number 23 (Burgess, 2004).

Chapter 3 Configuration of the Badung Regency Government ICT Network

3.1 Introduction

The ICT network configuration in this report is the ICT configuration in the Badung Regency Government. ICT network configuration includes IP address addressing, VLAN identity allocation, debugging, routing, remote login, and NAT. The port usage on the device is also determined. The physical form of the configured tools can be seen in section 3.3 Tools and Materials in Figure 3.1 and Figure 3.2. IP addressing, port used, and VLAN can be seen in section 3.4 Configuration Plan.

3.2 Place and time

The configuration was carried out in Building 10, namely the Central Government of Badung Regency Transportation and Information Agency from 4 September 2012 to 8 September 2012.

3.3 Tools and Materials

Table 3.1 Tool
Tool Description
Laptop Complete hardware along with female RJ45 PCI ethernet and USB female. Software required USB - RS232 driver, Telnet Client, TFTP Server, Serial Terminal, and Cisco Packet Tracer.
USB – RS232 converter If the laptop or computer is not equipped with RS232 male.
RS232 female – RJ45 male As a Cisco console cable for configuring the device.
Kabel UTP/ ethernet coaxial cable To perform configuration testing
Pin RJ45 The end of the UTP cable
Crimping Pliers To connect RJ45 pin to UTP cable
Fiber Optic Cables and their connectors Connection of all buildings to building 10
Table 3.2 Materials
Material Amount
Cisco Multilayer Switch cat4500e 1
Cisco Switch c3750e 12
Cisco ASA c2900 1
Mikrotik 1
Cisco Router 2900 series 1
Modem 1

Gambar 3.1 Multilayer Switch cat4500e, ASA, Mikrotik, Router 2900 dari bawah ke atas.jpg

Figure 3.1 Multilayer Switch cat4500e, ASA, Mikrotik, Router 2900 from bottom to top

Gambar 3.2 Switch C3750e di masing-masing gedung.jpg

Figure 3.2 Switch C3750e in each building

3.4 Configuration Plan

Gambar 3.3a Peta topologi jaringan.jpg

Gambar 3.3b Peta topologi jaringan.jpg

Figure 3.3 Network topology map

Table 3.3 Local network configuration
Building IP Switch VLAN
DPRD Secretariat 10
The Regional Secretariat 11
Office of Highways and Irrigation 12
Copyright Office 13
The Transportation Department of Communication and Informatics 14
Industry and Trade SME Cooperative Office 15
Department of Agriculture, Plantation and Forestry 16
Department of Animal Husbandry, Fisheries and Marine 17
Social and Workers Agency 18
Public Health Office 19
Family Planning and Family Welfare Office 20
Regional Civil Service Agency and Education and Training 21
Regional Development Planning Agency and R&D 22
Inspectorate 23
National Political and Community Protection Agency 24
Office of Women's Empowerment 25
Civil Service Police Unit 26
Department of Sanitation and Gardening 27
Environmental Agency 28
Village Community Empowerment Agency and Pemdas 29
Department of Youth Education and Sports 30
Government Tourism Office 31
Department of Culture 32
Department of Population and Civil Registration 33
Department of Revenue / Pesedahan Agung 34
Table 3.4 VLAN configuration
INTERFACE IP ADDRESS 3750 (Trunk) 3750 (Access) PHYSICAL INTERFACE Catalysyt 4507R
VLAN 10 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/4 Gi 1/1
VLAN 11 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/4 Gi 1/2
VLAN 12 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/3
VLAN 13 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/3
VLAN 14 / 24 Gi 2/13, 2/14
VLAN 15 / 24 Gi 2/15, 2/16, 2/17, 2/18, 2/19, 2/20
VLAN 16 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/4
VLAN 17 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/4
VLAN 18 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/5
VLAN 19 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/5
VLAN 20 / 24 Gi1/1/1 Gi 1/0/5 - Gi 1/0/6 Gi 1/5
VLAN 21 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/6
VLAN 22 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/6
VLAN 23 / 24 Gi1/1/1 Gi 1/0/5 - Gi 1/0/6 Gi 1/6
VLAN 24 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/7
VLAN 25 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/7
VLAN 26 / 24 Gi1/1/1 Gi 1/0/5 - Gi 1/0/6 Gi 1/7
VLAN 27 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/8
VLAN 28 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/8
VLAN 29 / 24 Gi1/1/1 Gi 1/0/5 - Gi 1/0/6 Gi 1/8
VLAN 30 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/2 Gi 1/9
VLAN 31 / 24 Gi1/1/1 Gi 1/0/3 - Gi 1/0/4 Gi 1/9
VLAN 32 / 24 Gi1/1/1 Gi 1/0/5 - Gi 1/0/6 Gi 1/9
VLAN 33 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/4 Gi 1/10
VLAN 34 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/4 Gi 1/11
VLAN 35 / 24 Gi1/1/1 Gi 1/0/1 - Gi 1/0/4 Gi 1/12
Table 3.5 Internet Configuration
Device IP Address IP Type Interface
CiscoMultilayer Switch cat4500e OUT Local Gi 2/48
Connect To
Cisco ASA 2900IN Local Gi 0/0
Cisco ASA 2900OUT Local Gi 0/1
Connect To
Mikrotik IN Local e1
Mikrotik OUT Local e8
Connect To
Cisco Router2900 IN Local Gi 0/1
Cisco Router2900 OUT Public Gi 0/2
Connect To
Modem Public e1
Connect To

Chapter 4 Discussion

4.1 Introduction

In the discussion, a simulation of ICT modeling and configuration was carried out at the Office of Communications and Information Technology, Badung Regency Government with the Cisco Packet Tracer program. A simulation was conducted because the ICT configuration in the Badung Regency Government was fixed and not allowed to be reconfigured or further configured. Therefore, the configuration stage is simulated in the Cisco Packet Tracer program, this program is used because the tool used is Cisco. The ICT configuration in the simulation is exactly the same as the ICT configuration in the field. There are only differences in the model of the tool as described in Chapter 1 section 1.5 Scope and Boundaries, and differences in interfaces.

In Section 4.2 Modem Setup is a public IP modeling where only certain IP addresses can be connected. In Section 4.3 Network Configuration Towards the Internet is the ICT configuration stage from Cisco Multilayer Switches to Modems. In section 4.4 NAT configuration is a configuration for converting local IP addresses to public IP addresses. In Section 4.5, Local Network Configuration is the configuration of Cisco Multilayer Switches to Cisco Switches in each Building. Section 4.6 Connection Test is a connection test using the ping application.

4.2 Modem Setup

The discussion of network configuration will be explained at the same time in the Cisco Packet Tracer simulation. First make a network topology. Starting from the modem configured IP address on the modem (although the modem is not a Cisco device, but its configuration is made close to its original function). According to table 3.5, the IP address at the entrance to the modem is Routing used by all routers is RIP (Routing Information Protocol) version 2. The spanning-tree has been configured automatically, namely PVST.

Gambar 4.1 Topologi Jaringan.jpg

Figure 4.1 Network Topology

Gambar 4.2 Mengkonfigurasi Modem.png

Figure 4.2 Configuring the Modem

  • To enter the router you need the “enable” command.
  • Begin configuring the IP address on the interface by entering “configure terminal”.
  • Command “hostname Modem” to give a name.
  • The command “access-list 1 permit” plus “access-list 1 deny any” so that it resembles the state of the field is configured so that only IP addresses can enter.
  • To configure an interface, first enter the interface with the command “interface fastEthernet 0/0” (interface fastEthernet 0/0 is the interface connected to the Internet router in this simulation).
  • Give an IP address with the command “ip address”, the command “ip access-group 1” to enforce access-list 1.
  • To start the interface with the command “no shutdown”.
  • Finally, the command “end” to exit the configuration and command “write” to save the configuration.

4.3 Network Configuration Towards the Internet

Next, configure the Internet router. According to table 3.5, the Internet interface to the modem with the IP address is (in the fastethernet interface simulation 0/1), while the interface from the Internet to Mikrotik has an IP address of (in the fastethernet interface simulation 0/0). The configuration method is the same as giving an IP address to the modem, but does not do an “access-list”.

Gambar 4.3 Mengkonfigurasi Router Internet.png

Figure 4.3 Configuring an Internet Router

  • In addition to this configuration, the “no service password-encryption” command removes password encryption. The commands “service timestamps debug datetime msec” and “service timestamps log datetime msec” to record every time a configuration change occurs.
  • The “enable cisco password” and “enable cisco secret” commands give the “cisco” and “cisco” secret “passwords where required for telnet login. The command “line vty 0 4” followed by “cisco password” and “login” to activate the telnet server with the password “cisco”.
  • “Exit” to exit a configuration. For routing, RIP version 2 is used where version 2 supports classless routing (not limited to classes A, B, or C) while version 1 can only route class, for example the network reads immediately even though what you want is 26 or other. “Redistribute static” means passing a static route when a static route is configured. “No auto-summary” to not activate auto-summary, which functions as class routing, which reads the IP address, whether it belongs to class A, B, or C, auto-summary can only be turned off in RIP version 2, and cannot be in version 1. Command “network” to add neighboring network information. According to Stallings regarding RIP in Chapter 2, each router will exchange information with neighboring routers in order to choose a path. The order is an order to introduce the neighbor. RIPv2 is not done on the network because it is assumed to be a modem.
  • Therefore, a static route is added to the Internet with the command “ip route”.
  • Each interface adds an “ip virtual-reassembly” to prevent attacks that take up the time and memory needed to compile packets of data.
  • Overall, this router configuration is similar to the Cisco Router 2900 configuration. The configuration method is the configuration in Figure 4.2 plus the configuration of Figure 4.3 based on table data 3.5.

This report does not discuss the proxy configuration, therefore in this simulation how to configure a router called Mikrotik is the same as a router configuration called Internet. According to table 3.5 the interface to the Internet (fastEthernet 0/1) is assigned the IP address In a connection, for example, between the Internet and Mikrotik interfaces must be on the same network ID. (from Mikrotik) and (from the Internet), according to Sutanta in theory, the IP address in Chapter 2 is on the same network ID, namely The interface to ASA has the IP address RIPv2 is “network” and “network”.

Cisco ASA is a device for firewalls. This report does not discuss data security, therefore in this simulation the Cisco ASA configuration method is the same as the Internet Router configuration. According to table 3.5 the interface to Mikrotik has an IP address of, according to Sutanta and are on the same network, namely The interface to the NOC (Cisco multilayer switch cat4500e in the field) has an IP address of RIPv2 is “network” and “network”. “Network” is used because according to table 3.4 NOC will have IP networks of, -, and Therefore RIPv2 “Network” will deal with IP addresses -

How to configure Internet routers in Multilayer Switch NOC (Cisco Multilayer Switch cat4500e in the field). There is a slight difference. By default, all NOC interfaces on the NOC function as switches.

  • To give the IP address of the interface to ASA (gigabitethernet 0/1), that is, the switch mode is turned off with the command “no switchport”. Then proceed with giving the IP address according to table 3.5 with the command “ip address” and the command “no shutdown” to turn on.
  • RIPv2 is “network”, only - are connected according to table 3.4.
  • Assuming it can go to the Internet network as in the field, a static route is given with the command “ip route”, meaning that it goes to all IP addresses of with all subnet masks through, namely the IP address interface in ASA is connected to the NOC.
  • In this simulation, the command “ip routing” is required to enable routing.

Gambar 4.4 Mengkonfigurasi NOC.png

Figure 4.4 Configuring NOC

4.4 Configure NAT (Network Address Translation) on the Cisco Router 2900

Gambar 4.5 Pengujian koneksi menggunakan PING dari NOC.png

Figure 4.5 Testing connection using PING from NOC

Based on all the above configurations it is not enough to connect from NOC to Modem. NOC to ASA, Mikrotik, and the Internet can be connected but not to the Modem. In fact, only the IP address can be entered in the field.

Gambar 4.6 Router Internet dapat terkoneksi dengan Modem.png

Figure 4.6 Internet router can be connected to a modem

According to table 3.5 there are 2 public IPs, namely on the Internet and Modem. In order to connect to the modem, the incoming IP address must be converted to

Gambar 4.7 Konfigurasi NAT pada Router Internet.png

Figure 4.7 Configuring NAT on an Internet Router

  • First you have to create an access list that allows everyone to enter with the command “access-list 2 permit any”, the name of the access here is access-list 2.
  • The command “ip nat inside source list 2 interface fastEthernet 0/1 overload” is a command to perform NAT (Network Address Translation). Ip nat inside converts the incoming IP address from the Internet router, based on access-list 2 (source list 2) is converted to exit via the fastethernet 0/1 interface, that is converted to the IP address assigned to the interface (, overload command so that all types of incoming IP addresses are converted to 1 IP address.
  • After that, it needs to be installed from the data packet entry interface (fastEthernet 0/0) “ip nat inside”, and on the data packet exit interface (fastEthernet 0/1) “ip nat outside”. The configuration to go to the Internet network (exit the modem) has been completed.

Gambar 4.8 Pengujian koneksi dengan PING dari NOC ke Modem.png

Figure 4.8 Testing connection with PING from NOC to Modem

4.5 Local Network Configuration

The last configuration is on the LAN (Local Area Network), which is the configuration connecting all Cisco c3700e switches in all buildings to the Multilayer Switch cat4500e in building 10 (NOC). Providing VLAN identity per building and per service based on table 3.3. In this configuration, the interface of each VLAN in the NOC is made with an IP address based on table 3.4 and the table provides information on VLAN installation on several interfaces on the switch of each building. For how to configure the switches for each building is the same. So at this writing the local NOC configuration will be displayed and only 2 switch configurations from 2 buildings.

Gambar 4.9 Topologi jaringan lokal.png

Figure 4.9 Local Network Topology

Gambar 4.10 Konfigurasi lokal pada NOC 1.png

Figure 4.10 Local configuration on NOC 1

Depending on the device, the “VLAN database” command can be configured before the configure terminal or at the configure terminal, this command will enter VLAN settings. After that, enter the command “vlan 10” to add VLAN 10. Adding VLANs is done according to table 3.3 and table 3.4, adding VLAN 10 - VLAN 35.

Gambar 4.11 Konfigurasi lokal pada NOC 2.png

Figure 4.11 Local configuration on NOC 2

Gambar 4.12 Konfigurasi lokal pada NOC 3.png

Figure 4.12 Local configuration on NOC 3

Assigning an IP address to the VLAN 1 interface is a way to assign an IP address to a device. According to table 3.3 the IP address on the NOC is The command “interface range fastEthernet 0/1 - 12” is a way to enter fastethernet 0/1 - fastethernet 0/12 at once. It was planned on this interface (connected to the switch of each building) so that all VLAN IDs can pass. So the command is “switchport mode trunk”, there is a switch that must be given the command “switchport trunk encapsulation dot1Q”, which is an IEEE (Intitute Electrical Electronic Engineer) 802.1Q standard, for VLAN standards. According to table 3.4 VLAN interfaces 10-35 are assigned an IP address.

Gambar 4.13 Konfigurasi lokal pada switch Gedung 7.png

Figure 4.13 Local configuration of Building 7 switches

The initial line is a general configuration performed on all devices, namely, service timestamps, service password-encryption, line vty 0 4 (telnet login), secret installation (MD5 password), installation on the VLAN interface 1. Gigabitethernet 1/1 interface is the interface that connected to the NOC. So that all VLANs can enter, then with the command “switchport mode trunk”. Based on table 3.4, the fastethernet 0 / 1-4 interface is given the entry of only VLAN 10 with the commands “interface range fastethernet 0/1 - 4”, “switchport mode access”, and “switchport access vlan 10”. In this simulation, so that VLAN 1 in each building is connected, each switch is given a default-gateway with the command “ip default-gateway”, which is the default route to VLAN 1 NOC.

Gambar 4.14 Pemberian default-gateway pada switch Gedung 7.png

Figure 4.14 Providing default-gateway on Building 7 switches

Next is configuration on the Switch Building 12. The method is the same as Building 7, according to tables 3.3 and 3.4 VLAN 18-20 is installed. For other switch configurations, the method is the same. Then the configuration is complete, to see the configuration results you can type the command “show running-config”.

Gambar 4.15 Konfigurasi lokal pada switch Gedung 12 1.png

Figure 4.15 Local configuration on Building 12 switch 1

Gambar 4.16 Konfigurasi lokal pada switch Gedung 12 2.png

Figure 4.16 Local configuration of Building 12 switch 2

4.6 Testing Connection

At this writing only a few tests were written. First, the computer is installed on the Building 7 switch on the fastethernet0/1 interface. After that configured and ping the interface VLAN 10 and Modem. After that, telnet to the NOC and switch Building 12.

Gambar 4.17 Konfigurasi IP PC0.png

Figure 4.17 IP PC0 Configuration

Gambar 4.18 PING dari PC0 ke VLAN 10 dan Modem.png

Figure 4.18 PING from PC0 to VLAN 10 and Modem

Gambar 4.19 Telnet dari PC0 ke NOC dan switch Gedung 12.png

Figure 4.19 Telnet from PC0 to NOC and Building 12 switches

Gambar 4.20 Konfigurasi IP Laptop0.png

Figure 4.20 Laptop IP Configuration0

Gambar 4.21 PING dari Laptop0 ke NOC dan Modem.png

Figure 4.21 PING from Laptop0 to NOC and Modem

Gambar 4.22 Telnet dari Laptop0 ke switch Gedung 7 dan NOC.png

Figure 4.22 Telnet from Laptop0 to Building 7 switch and NOC

Chapter 5 Closing

5.1 Conclusion

The topology on this network is a tree. The local network consists of 12 switches and 1 multilayer switch. All buildings are connected to building 10. Each office is on 1 VLAN ID. The total VLAN used is 25 of VLAN 10 - Vlan 35, with a network ID of Installation of a VLAN ID is carried out in 1 multilayer switch in 10 buildings and 12 switches in all buildings. The port that is connected from 12 switches to a multilayer switch is a trunk mode where all VLAN IDs can enter. Each switch and multilayer switch is assigned an IP address on VLAN 1 as if it were assigned an IP address on the device.

From the multilayer switch to the Internet network must pass through ASA, Mikrotik, Router, and Modem. The multilayer switch port to the Internet network functions as a router so that the switchport mode is turned off and assigned an IP address. After that the routing mode is activated, static routing is used for the Internet network, while for the internal use RIPv2 dynamic routing. Likewise in ASA, Mikrotik, and Router. The router is given 1 public IP. Everything that goes to the router goes to the modem, then to the Internet network, the private IP address is converted into a public IP with NAT.

For the purpose of processing all devices enabled log and debug for notification of changes in the device. Secret and password are activated for telnet purposes. Telnet server is activated so that you can remote login.

5.2 Suggestions

The suggestion that can be given is to improve the quality of the network configuration.

  • The first suggestion is to install a point-to-point IP address such as from a multilayer switch to ASA. Network ID where there is waste of IP addresses. The IP address used with the subnet mask ( is 254 IP addresses while 2 IP addresses are required. So it is better if is the subnet mask It is recommended for other settings to save IP addresses with a subnet mask.
  • The second suggestion is to label each port for a clear description of the port’s function.
  • The final suggestion is on VLANs. It is easier if the multilayer switch is used as a VTP server, while the other is a VTP client so that the VLAN configuration is sufficient on the multilayer switch. It is better if each VLAN ID is named so that there is information on the device about which VLAN is using.


  • Burgess, M. 2004. Principles of Network and System Administration. John Wiley & Sons, Ltd. : Chicester
  • Cisco. 2004. Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide. Cisco Systems, Inc : San Jose.
  • Gebali, F. 2008. Analysis of Computer and Communication Networks. Springer Science + Business Media : New York
  • Inixindo, S. 2005. Workshop Basic Internetworking. Graha Pena : Surabaya
  • Peterson, L. Davie, B. 2003. Computer Networks Third Edition. Morgan Kaufmann : San Fancisco
  • Stallings, W. 1998. High-Speed Networks TCP/IP and ATM Design Principles. Prentice-Hall, Inc. : New Jersey.
  • Sutanta, E. 2005. Komunikasi Data & Jaringan Komputer. Graha Ilmu : Yogyakarta.
  • The Internet Center. 2013. http://www.incentre.net/ethernet-wiring-diag.html. Diakses 24 Juli 2013.
  • Western Telematic Inc. 2013. http://www.wti.com/p-236-72-3383-01-cisco-rollover-console-cable-blue-db9-to-rj45-6.aspx. Diakses 24 Juli 2013.