π‘οΈ Secure Multi-Site Connectivity: GRE-EIGRP VPN with Centralized Services and Inter-VLAN Routing
A comprehensive network simulation project demonstrating advanced routing, wide-area networking (WAN), quality-of-service, and network security across a Head Office (HO) and two Branch Offices (BR1, BR2).
- π Project Overview
- π― Project Objective
- π Network Topology
- π§ Device Interface Table
- π IP Addressing Table
- π§ Lab Steps
- π» Device Configuration
- β Verification Commands
- β‘ How to Run Lab
- π Folder Structure
- π§± Lab Limitations
- π Learning Outcomes
- π‘ Repository Info
This project simulates a corporate network connecting a Head Office (HO) and two Branch Offices (BR1, BR2) over a simulated WAN (Internet).
It integrates a centralized DHCP server, secure routing via GRE tunnels, and granular access control (ACLs).
- GRE Tunnels: Secure site-to-site VPN connections between HO and both branches.
- EIGRP (AS 10): Dynamic routing across all internal networks and GRE tunnels.
- Router-on-a-Stick (ROAS): Enables inter-VLAN routing at the HO.
- DHCP Relay (
ip helper-address): Centralized IP management from HO to branches. - Extended ACLs: Restrict traffic (e.g., Finance VLAN canβt access File Server).
- WPA2-PSK Wireless: Secured wireless access via AP-PT access points.
The main objective is to build a fully functional, secure, and scalable network supporting:
- Centralized IP Management: All clients receive IPs from the HO DHCP server.
- Full Connectivity: End-to-end reachability between all sites.
- Security Enforcement: Finance VLAN (20) restricted from File Server access.
- Wireless Integration: Secure SSID mapped into VLAN structure.
/topology/topology_overview_drawio.png
| Device | Interface | Connection | VLAN / Network | Notes |
|---|---|---|---|---|
| Route_HO | G0/0 | WAN to ISP | 203.0.113.0/30 | Main Internet Link |
| G0/1 | LAN Trunk to Switch_HO | Trunk | Router-on-a-Stick Port | |
| T1 | VPN to BR1 | 10.10.10.0/30 | GRE Tunnel Overlay | |
| T2 | VPN to BR2 | 10.10.20.0/30 | GRE Tunnel Overlay | |
| Route_BR1 | G0/0 | WAN to ISP | 203.0.113.4/30 | Public Link to HO |
| G0/1 | LAN to Switch_BR1 | 192.168.50.0/24 | DHCP Helper configured | |
| Route_BR2 | G0/0 | WAN to ISP | 203.0.113.8/30 | Public Link to HO |
| G0/1 | LAN to Switch_BR2 | 192.168.60.0/24 | DHCP Helper configured | |
| ISP_Router | G0/0 | Link to HO | 203.0.113.0/30 | Connects to HO (203.0.113.1) |
| G0/1 | Link to BR1 | 203.0.113.4/30 | Connects to BR1 (203.0.113.6) | |
| G0/2 | Link to BR2 | 203.0.113.8/30 | Connects to BR2 (203.0.113.10) | |
| Switch_HO | G0/1 | Trunk to Route_HO | All VLANs | Router Trunk |
| F0/1 | Access Point | VLAN 30 (IT_Wireless) | Wired to AP | |
| F0/4βF0/6 | Servers | VLAN 100 | Server Farm |
| Network Name | VLAN ID | Network Address | Gateway | DHCP Range |
|---|---|---|---|---|
| HO - HR | 10 | 192.168.10.0/24 | 192.168.10.1 | .11 β .254 |
| HO - Finance | 20 | 192.168.20.0/24 | 192.168.20.1 | .11 β .254 |
| HO - Wireless | 30 | 192.168.30.0/24 | 192.168.30.1 | .11 β .254 |
| HO - Servers | 100 | 192.168.100.0/24 | 192.168.100.1 | .13 β .254 |
| BR1 - LAN | 50 | 192.168.50.0/24 | 192.168.50.1 | .11 β .254 |
| BR2 - LAN | 60 | 192.168.60.0/24 | 192.168.60.1 | .11 β .254 |
| VPN Tunnel 1 | β | 10.10.10.0/30 | HO: .1, BR1: .2 | GRE Overlay |
| VPN Tunnel 2 | β | 10.10.20.0/30 | HO: .1, BR2: .2 | GRE Overlay |
- VLAN and Trunk Setup: Create VLANs on
Switch_HOand assign ports. - ROAS Configuration: Configure G0/1 sub-interfaces on
Route_HOfor VLANs 10, 20, 30, and 100. - DHCP Pools: Configure DHCP on
Route_HOfor all VLANs and branch LANs. - WAN Setup: Assign IPs on all routers (HO, BR1, BR2, ISP).
- GRE Tunnels: Create Tunnel1 (HO β BR1) and Tunnel2 (HO β BR2).
- EIGRP: Enable EIGRP (AS 10) on all networks and tunnel interfaces.
- DHCP Relay: Apply
ip helper-addresson BR1 and BR2 LAN interfaces. - ACL Configuration: Block
192.168.20.0/24(Finance VLAN) from accessing192.168.100.11(File Server). - Wireless Setup: Configure AP-PTs with WPA2-PSK under VLAN 30.
All configuration files are stored in the configs/ directory.
Contains ROAS, DHCP for all VLANs, EIGRP, GRE tunnels, and ACLs.
! DHCP Pools for all VLANs
ip dhcp pool VLAN_10_HR
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 192.168.100.10
!
π View Full Configuration File β
Includes GRE tunnel, EIGRP, and DHCP relay.
interface GigabitEthernet0/1
description BR1_VLAN_50_GW
ip address 192.168.50.1 255.255.255.0
ip helper-address 192.168.100.10 <-- DHCP Relay to HO Server
no shutdown
π View Full Configuration File β
Similar configuration as BR1.
interface Tunnel2
ip address 10.10.20.2 255.255.255.252
tunnel source GigabitEthernet0/0
tunnel destination 203.0.113.1
ip mtu 1400
tunnel mode gre ip
π View Full Configuration File β
Handles static routes between HO and Branch routers.
interface GigabitEthernet0/1
ip address 203.0.113.5 255.255.255.252
description Link_to_BR1
no shutdown
π View Full Configuration File β
Contains VLAN, trunk, and port configurations.
! G0/1: Link to Router (ROAS Trunk)
interface GigabitEthernet0/1
description TRUNK_TO_ROUTER_HO
switchport mode trunk
π View Full Configuration File β
! G0/1: Link to Router (Access Port)
interface GigabitEthernet0/1
description ACCESS_TO_ROUTER_BR1
switchport mode access
switchport access vlan 50
π View Full Configuration File β
! F0/1: Access Port for BR2 Wireless AP
interface FastEthernet0/1
description AP_BR2_WIRELESS
switchport mode access
switchport access vlan 60
π View Full Configuration File β
No specific configuration file is needed. The server's IP is set statically in Packet Tracer's GUI.
All end-user devices (PCs and Laptops) are set to DHCP via the static configuration in Packet Tracer's GUI.
π View Full Configuration File β
- This section verifies that the Head Office clients can reach all local resources and the DHCP service is centralized.
1.1. Verify HR to Server VLAN routing. PC_HR1 (VLAN 10) to DHCPSVR
ping 192.168.100.10
1.2. Verify Finance to Printer routing. PC_FN1 (VLAN 20) to PrintSVR
ping 192.168.100.12
1.3. Verify IT Wireless DHCP. IT Laptop (VLAN 30)
ipconfig
1.4. Verify Finance PC can resolve GW. PC_FN1 (VLAN 20) Router-HO G0/1.20
ping 192.168.20
- This verifies the remote branch offices can reach the central services via the secure GRE tunnels and EIGRP is working.
2.1. Verify BR1 to HO Server access. PC_BR1 to FileSVR
ping 192.168.100.11
2.2. Verify BR2 to HO Server access. PC_BR2 to DHCPSVR
ping 192.168.100.10
2.3. Verify Branch-to-Branch routing. PC_BR1 to Any BR2 PC
ping 192.168.60.100
2.4. Verify EIGRP Route Table. Router HO
show ip route eigrp
2.5. Verify Tunnel Interface Status. Route_BR1
show interface tunnel 1
- This verifies that the Extended ACL applied to block Finance traffic to the File Server is enforced correctly.
3.1. Verify Finance restriction is enforced. PC_FN1 (VLAN 20) to FileSVR
ping 192.168.100.11
3.2. Verify HR access is allowed. PC_HR1 (VLAN 10) to FileSVR
ping 192.168.100.11
- This verifies that the specific IT Laptop can connect to the HO wireless network with the correct security.
4.1. Verify Wireless Security is applied.
4.2. Verify Wireless traffic flows. IT Laptop to HR Pcs
ping 192.168.10.100
-
Clone Repository:
git clone https://github.com/asmymhm/Secure-MultiSite-VPN.git
-
Open in Packet Tracer: Open secure_multisite_vpn.pkt.
-
Power On Devices: Wait 60 seconds for EIGRP and STP to converge.
-
Test: Run verification commands above.
Secure-MultiSite-VPN/ βββ configs/ β βββ router-config/ β β βββ router-ho.cfg β β βββ br1-ro.cfg β β βββ br2-ro.cfg β β βββ isp-r.cfg β β β βββ switch-config/ β β βββ switch-ho.cfg β β βββ switch-br1.cfg β β βββ switch-br2.cfg β βββ server-config/ β βββ server-config.txt β βββ drwaio/ β βββ secure_multisite_vpn.drawio/ β βββ lab-file/ β βββ secure_multisite_vpn.pkt β βββ topology/ β βββ banner.png β βββ topology_overview.png β βββ topology_overview_drawio.png β βββ screenshots/ β βββ L1_HR_to_DHCPSRV.png β βββ L2_FN_to_PrintSVR.png β βββ L3_IT_Wireless_IP.png β βββ L4_FN_to_GW.png β βββ S1_FN_ACL_Deny.png β βββ S2_HR_ACL_Permit.png β βββ WL1_IT_Wireless_Connect.png β βββ WL2_IT_to_HR_Ping.png β βββ W1_BR1_to_FileSVR.png β βββ W2_BR2_to_DHCPSRV.png β βββ W3_BR1_to_BR2.png β βββ W4_HO_EIGRP_Table.png β βββ W5_BR1_Tunnel_Status.png β βββ README.md βββ verification.md βββ .gitignore
This lab was built in Cisco Packet Tracer, which has the following limitations:
-
No File System Security: The requirement to restrict folder access (e.g., Finance users cannot access the File Server) had to be implemented at the Network Layer using an
Extended ACL (denying all traffic from
$192.168.20.0/24$ to$192.168.100.11$ ). Actual file/folder permissions (NTFS or equivalent) are not supported. - Access Point Limitations: The AP-PT device is a pure Layer 2 bridge and does not support assigning a static management IP address, limiting out-of-band management options.
-
Designed a hub-and-spoke GRE-EIGRP VPN topology
-
Implemented centralized DHCP and relay agents.
-
Applied access control policies using Extended ACLs.
-
Integrated wireless and VLAN networks securely.
-
Verified and troubleshot using Cisco CLI commands.
-
Author: Mohamed Asmy
-
Project Name: Secure Multi-Site Connectivity (GRE-EIGRP VPN)
-
Platform: Cisco Packet Tracer (Version 8.x)
-
License: MIT














