This project demonstrates the design, configuration, and security implementation of a small multi-department network using Access Control Lists (ACLs).
It focuses on managing communication between departments, ensuring authorized access, and preventing internal data breaches through proper network segmentation and access control.
To design and secure a structured multi-department network by:
- Implementing ACLs on routers to control traffic flow.
- Allowing authorized access between departments while restricting unauthorized communication.
- Enhancing data privacy, network performance, and security posture through traffic filtering and segmentation.
The network consists of three main departments:
- Admin — hosts the central web server for resource sharing.
- Sales — allowed to communicate with Admin and access shared web resources.
- HR — restricted to internet-only access for security purposes.
All departments are connected via a central router, with ACLs configured to enforce communication rules between subnets.
- Access Control Lists (ACLs) effectively manage inter-departmental access.
- Traffic filtering ensures only authorized communication occurs.
- Segmentation reduces risk of internal data leaks.
- Proper ACL configuration improves both network security and efficiency.
- Real-world understanding of how ACLs contribute to organizational data protection and network governance.
| Category | Tools |
|---|---|
| Network Simulation | Cisco Packet Tracer |
| Security Configuration | Extended Access Control Lists (ACLs) |
| Operating Systems | Cisco IOS (Router CLI) |
| Testing & Verification | Ping Tests, HTTP Access Tests, ACL & Interface Verification Commands |
📂 View Full Project Report (Network Security.pdf)
This project highlights how ACLs can strengthen network security by limiting unnecessary communication and safeguarding sensitive information.
Through proper configuration and testing, each department’s access was aligned with its operational needs — achieving a secure, efficient, and well-managed network infrastructure.
“Every secure network starts with clear boundaries and controlled access.”
— Oluwamuyiwa Aikomo