Project page

Secure Enterprise Campus Infrastructure

Cisco Packet Tracer · VLANs · ACLs · ASA Firewall · DMZ · Layer 2 Security

Project snapshot

This project models a secure small enterprise campus in Cisco Packet Tracer. I built a switched network with user, server, guest, printer, DMZ, and management segments, then applied access controls and hardening measures designed to reduce lateral movement and make support issues easier to isolate.

Campus network segmentation and support illustration

IT Support Impact Summary

Designed a segmented campus network that improves day-to-day troubleshooting by isolating user, server, guest, printer, and management traffic. The design limits the impact of misconfigured or compromised devices and makes it easier to identify, contain, and resolve connectivity issues without disrupting other users.

This project models a secure small enterprise campus in Cisco Packet Tracer. I built a switched network with user, server, guest, printer, DMZ, and management segments, then applied access controls and hardening measures designed to reduce lateral movement and make support issues easier to isolate.

My role

Designed the VLAN structure, defined ACL logic, configured Layer 2 hardening, and documented how the network should behave when issues occur.

IT support relevance

Shows that I understand why clean segmentation matters when devices fail, users lose access, or support teams need to narrow down where a problem actually lives.

Network segmentation plan

VLANNamePurposeDefault gatewaySubnet
10USERSInternal staff PCs10.10.10.110.10.10.0/24
20SERVERSCritical infrastructure10.10.20.110.10.20.0/24
30PRINTERSNetwork print services10.10.30.110.10.30.0/24
40GUEST_WIFIInternet-only guest access10.10.40.110.10.40.0/24
50DMZPublic web services10.10.50.110.10.50.0/24
99MGMTInfrastructure administration10.10.99.110.10.99.0/24

Hands-on proof

ip access-list extended GUEST_ISO_ACL
 permit udp 10.10.40.0 0.0.0.255 any eq 53
 permit udp any any eq 67
 deny ip 10.10.40.0 0.0.0.255 10.10.0.0 0.0.255.255
 permit ip any any

interface vlan 40
 ip access-group GUEST_ISO_ACL in

This ACL is a small example of how I limited guest access while preserving needed services like DNS and DHCP.

Risk and mitigation matrix

ThreatRiskMitigationImplementation
Unauthorized hardwareHighPort securitySticky MAC + shutdown violations
Lateral movementHighSegmentationACLs on Layer 3 SVIs
VLAN hoppingMediumTrunk hardeningDedicated native VLAN 99
DHCP spoofingMediumDHCP snoopingUntrusted edge ports
External breachCriticalDMZ isolationASA policy filtering

What this proves

I think this project shows that I can build networks in a way that supports both security and support operations. The segmentation and policy choices are there to reduce blast radius, shorten troubleshooting time, and make escalation cleaner when something breaks.