This is a practical networking lab project built using Cisco Packet Tracer.
The network is segmented using VLANs, with routing enabled between VLANs, access control via ACLs, and dynamic IP assignment via DHCP.
- Goal: Create a secure and segmented network for two departments (Marketing & IT Support)
- Tools Used: Cisco Packet Tracer, CLI (Router & Switch config)
- Skills Applied:
- VLAN Configuration
- Router-on-a-Stick (Inter-VLAN Routing)
- Extended Access Control Lists (ACLs)
- DHCP Configuration on Router
- Network Troubleshooting
- VLAN 10: Marketing Department →
192.168.10.0/24 - VLAN 20: IT Support Department →
192.168.20.0/24
- VLAN 10: Ports for Marketing PCs
- VLAN 20: Ports for IT Support PCs
interface GigabitEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.10.1 255.255.255.0
interface GigabitEthernet0/1.20
encapsulation dot1Q 20
ip address 192.168.20.1 255.255.255.0ip access-list extended BLOCK_MARKETING
deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
permit ip any anyip dhcp pool VLAN10
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 8.8.8.8
ip dhcp pool VLAN20
network 192.168.20.0 255.255.255.0
default-router 192.168.20.1
dns-server 8.8.8.8
ip dhcp excluded-address 192.168.10.1
ip dhcp excluded-address 192.168.20.1- ✅ Devices in both VLANs receive dynamic IP addresses
- ✅ Inter-VLAN routing works correctly
- ✅ ACL blocks traffic from Marketing to IT, but not the other way around
- ✅ Ping tests confirm access control and connectivity
vlan networking project.pkt— Cisco Packet Tracer fileREADME.md— Project documentationtopology.png— Network diagram
Manar Hossam
LinkedIn