Network Design · BCIT CISA — Year 1

Redundant Campus
Network Infrastructure

By Austin Webber — Co-authored with Zane Housil, Amir Ghabchi, Dustyn Badach & Wesley Kitane

Type Academic Project
Client (Simulated) Energy Connections Inc.
Presented May 25, 2023
Program BCIT CISA — Year 1
Cisco IOS VLANs RSTP VRRP EtherChannel (LACP) GRE over IPsec OSPF Active Directory GPO Windows Server 2022 Linux / CentOS RAID 5 Samba

Overview

This project was a Year 1 final deliverable for BCIT's CISA program, structured as a proposal response to a simulated client — Energy Connections Inc. (ECI). The brief required designing and implementing a fully redundant, secure, multi-site campus network with centralised identity management and backup server infrastructure.

ECI allocated four routers and four switches across two sites. The network had to be operational 24/7, with Linux servers providing backup services and a pre-configured Active Directory domain structure managing all users and computers.

End Goals

  • 1Full redundancy for all networking devices and end device uplinks.
  • 2Data drive redundancy via RAID 5 on Linux servers.
  • 3Full connectivity between local sites and the ISP via GRE/IPsec tunnels.
  • 4Active Directory domain structure managing users, computers, and GPO enforcement.
  • 5Security measures across Layer 2 and Layer 3 to mitigate unauthorised access.
Figure 1 — ECI Logical Topology Figure 1 — ECI Logical Topology

Networking

Redundancy — Routers (VRRP)

Virtual Router Redundancy Protocol (VRRP) is deployed across two Layer 3 routers sharing a single virtual IP address. If the active router fails, the standby assumes the virtual IP immediately with no manual intervention required. VRRP is an open standard, allowing interoperability between Cisco and non-Cisco devices.

Redundancy — Switches (EtherChannel + RSTP)

EtherChannel in LACP mode bundles multiple physical switch-to-switch links into single logical port-channels across all four Layer 2 switches. If one physical link fails, traffic redistributes across the remaining members without losing the channel. Rapid Spanning Tree Protocol (RSTP) runs alongside EtherChannel to block redundant ports and prevent broadcast loops, while converging significantly faster than legacy STP.

Site-to-Site Connectivity (GRE over IPsec)

Inter-site traffic is secured through GRE tunnels over IPsec, providing encrypted point-to-point communication between the Vancouver and Calgary sites through the ISP. OSPF neighbour adjacency is formed across the tunnels, allowing routes to propagate automatically between sites without static configuration.

IP Services

  • DHCPRouters assign IP addresses dynamically to all end devices by department VLAN. Linux DHCP server acts as hot-swap backup if the router DHCP service fails.
  • OSPFDynamic routing across all routers. Neighbour authentication prevents unauthorised routers from joining the routing domain.
  • NATConfigured on border routers to translate internal VLAN addresses for internet access.
  • SyslogAll routers and switches send log messages at Warning level and above to the centralised Linux TFTP/Syslog server.

Security

Security is implemented at both Layer 2 and Layer 3. Employee computers are segmented into department VLANs — a breach in one VLAN cannot directly reach another. Servers and the management workstation are isolated on a dedicated switch.

Layer 2 Hardening

MechanismPurpose
Dynamic ARP InspectionValidates IP-to-MAC bindings; blocks ARP spoofing/poisoning attacks.
DHCP SnoopingPermits only trusted DHCP servers to issue addresses; prevents rogue DHCP attacks.
Port SecurityLimits the number of MAC addresses per port; locks out unauthorised devices.
Root GuardPrevents unauthorised switches from winning the STP root election.
BPDU GuardDisables ports that receive unexpected BPDU frames (protects against rogue switches).
Shutdown Unused PortsAll unused switch ports placed in a Parking Lot VLAN and administratively shut down.

Layer 3 Hardening

MechanismPurpose
SSHAll device management traffic encrypted; Telnet disabled.
Access Control ListsFilters inter-VLAN and WAN traffic to enforce least-privilege access between departments.
Routing AuthenticationOSPF neighbour authentication prevents unauthorised routers from participating in the routing process.
GRE over IPsecEncrypts all inter-site traffic traversing the ISP.
VLAN Segmentation
Departments are isolated into separate VLANs (IT, HR, Marketing, Sales) per site. A breach in one department's VLAN cannot laterally reach another without crossing an ACL-enforced Layer 3 boundary. Servers and the management computer are on their own isolated switch segment.

Windows Server & Active Directory

Two Windows Server 2022 Domain Controllers (ECIDC1, ECIDC2) provide centralised identity management across all sites under the domain eci.com. All client machines (Windows 11) are domain-joined and receive their configuration through Group Policy.

AD DS Structure

  • OUsOrganisational Units defined by site (Calgary, Montreal, Toronto, Vancouver) and by department (IT, HR, Marketing, Sales).
  • Users80+ domain accounts created, assigned to department groups, and mapped to site OUs.
  • GroupsSecurity groups per site (ECI_Calgary, ECI_Vancouver, etc.) and per function (IT, HR, Sales, Marketing) for granular permission management.
  • NTPDomain Controller acts as Stratum 2 NTP source; all client PCs synchronise time from DC.
  • SambaInteroperability between Windows and Linux hosts — Windows clients can access shared directories on Linux servers.

Group Policy (Key Policies)

PolicySetting
Password History10 passwords remembered
Maximum Password Age60 days
Minimum Password Length12 characters
Account Lockout Threshold10 failed attempts
Account Lockout Duration30 minutes
Audit Logon EventsSuccess and Failure
Guest AccountDisabled
Control Panel Access (Non-Admins)Prohibited
Command Prompt (Non-Admins)Disabled
PowerShell (Non-Admins)Disallowed via Software Restriction Policy
Interactive Logon Message"Only authorized ECI Domain users are permitted…"
LAN Manager HashNot stored on password change
Anonymous SAM EnumerationBlocked
Least Privilege
All non-admin users are restricted from Control Panel, Command Prompt, and PowerShell. Each user's network drive mappings and file share access are scoped to their department OU via GPO — they can only access resources required for their role.

Linux Services

CentOS Linux servers provide redundant infrastructure services alongside Windows — a backup layer that remains operational if Windows services fail or become unavailable.

Services Deployed

  • DHCPHot-swap backup DHCP server. If the router-based DHCP service ceases, the Linux DHCP server activates and continues issuing addresses to end devices.
  • TFTPTrivial File Transfer Protocol server — stores router and switch configuration backups, and supports firmware updates and network booting.
  • SyslogCentralised log collection from all network devices (routers, switches). Configured to capture Warning level and above for incident monitoring.
  • ApacheWeb server hosting an internal site accessible to domain users; supports URL rewriting, logging, and access control.
  • RAID 5Multiple physical disks combined into a single logical volume with distributed parity — provides data redundancy and read performance gains. A single disk failure does not result in data loss.
  • SambaFile sharing bridge between Linux and Windows — Windows clients mount Linux-hosted shares as network drives through the domain.
Figure 2 — Linux Service Architecture Figure 2 — Linux Service Architecture

Outcome & Challenges

Delivered
A fully operational, redundant, two-site campus network with 24/7 uptime design, domain-managed identity across 80+ users, and a Linux backup layer covering DHCP, file storage, web serving, and centralised logging.

Challenges & Solutions

  • Networking DHCP was assigning addresses to statically-configured routers. Fix: no service config on the router, save, and reload.
  • Networking LAN devices could not ping the ISP. Fix: Confirmed gateway of last resort was correctly pointed toward the ISP interface.
  • Networking Site-to-site LAN communication failed across the GRE tunnel. Fix: OSPF neighbour adjacency was misconfigured — correcting the network statements on both tunnel endpoints resolved the issue.
  • Windows Blending virtualisation with physical hardware caused unexpected IP conflicts. Fix: Static IP assigned to the host machine on its dedicated VLAN; domain-joined VMs obtained addresses via DHCP.
  • Linux No standardised procedure for CentOS services — distribution differences required extensive testing. Fix: Iterated configurations in a virtualised environment using snapshots as rollback points.