INITIALIZING...
Routing & ISP

CISCO POP Switch & Router Configuration for ISP | MSAChowdhury

April 19, 2026 5 min read 3 Days View on GitHub

Routing & ISP

Project Overview

ClientInternet Service Provider (ISP) — Confidential
LocationMoghbazar, Dhaka, Bangladesh
DateSeptember 2021
RoleNetwork Engineer
Core DevicesCISCO Nexus 3000, CISCO Catalyst 2960

Project Summary

This project involved the full configuration of a CISCO switch and router stack at an ISP Point of Presence (POP) location in Moghbazar, Dhaka, Bangladesh. The objective was to provide stable, secure internet connectivity to the end users served by that POP.

The deployment covered Layer 2 switching (VLAN segmentation, Spanning Tree Protocol, trunking) on the CISCO Catalyst 2960 and Layer 3 routing (NAT, static/dynamic routing, port security) on the CISCO Nexus 3000, forming a complete access-to-distribution ISP stack.

Network Topology

Standard ISP POP architecture:

  • Upstream: ISP backbone/core router → CISCO Nexus 3000 (Distribution/Aggregation)
  • Downstream: CISCO Catalyst 2960 (Access Layer) → End-user CPE/ONU devices
  • VLAN segmentation per subscriber segment
  • Trunk link between Nexus 3000 and Catalyst 2960
  • NAT applied at Nexus 3000 for public IP translation

Scope of Work

  • VLAN creation and assignment on CISCO Catalyst 2960
  • STP (Spanning Tree Protocol) configuration for loop prevention
  • Trunk port configuration between switch and router
  • NAT (Network Address Translation) configuration on CISCO Nexus 3000
  • Static and dynamic routing setup
  • Port security to prevent unauthorized MAC address access
  • End-to-end connectivity testing and ISP handover

Configuration Details

1. CISCO Catalyst 2960 — VLAN Configuration

Create VLANs and assign access ports per subscriber segment:

! Create VLANs

Switch# configure terminal

Switch(config)# vlan 10

Switch(config-vlan)# name SUBSCRIBERS_SEGMENT_A

Switch(config-vlan)# exit

Switch(config)# vlan 20

Switch(config-vlan)# name SUBSCRIBERS_SEGMENT_B

Switch(config-vlan)# exit

Switch(config)# vlan 99

Switch(config-vlan)# name MANAGEMENT

Switch(config-vlan)# exit

! Assign access ports to VLANs

Switch(config)# interface range fa0/1 - 12

Switch(config-if-range)# switchport mode access

Switch(config-if-range)# switchport access vlan 10

Switch(config-if-range)# exit

Switch(config)# interface range fa0/13 - 24

Switch(config-if-range)# switchport mode access

Switch(config-if-range)# switchport access vlan 20

Switch(config-if-range)# exit

2. CISCO Catalyst 2960 — STP Configuration

Configure Spanning Tree Protocol to prevent broadcast loops:

! Set STP mode to Rapid PVST+ for faster convergence

Switch(config)# spanning-tree mode rapid-pvst

! Set switch as root bridge for VLANs

Switch(config)# spanning-tree vlan 10 priority 4096

Switch(config)# spanning-tree vlan 20 priority 4096

! Enable PortFast on access ports (subscriber-facing)

Switch(config)# interface range fa0/1 - 24

Switch(config-if-range)# spanning-tree portfast

Switch(config-if-range)# spanning-tree bpduguard enable

Switch(config-if-range)# exit

! Verify STP status

Switch# show spanning-tree vlan 10

Switch# show spanning-tree summary

3. CISCO Catalyst 2960 — Trunk Port to Nexus 3000

Configure trunk uplink carrying all VLANs to the distribution router:

! Configure uplink port as trunk (gi0/1 toward Nexus 3000)

Switch(config)# interface gigabitEthernet 0/1

Switch(config-if)# switchport mode trunk

Switch(config-if)# switchport trunk encapsulation dot1q

Switch(config-if)# switchport trunk allowed vlan 10,20,99

Switch(config-if)# switchport trunk native vlan 99

Switch(config-if)# no shutdown

Switch(config-if)# exit

! Verify trunk status

Switch# show interfaces trunk

Switch# show interfaces gi0/1 switchport

4. CISCO Nexus 3000 — NAT Configuration

Translate private subscriber IPs to ISP public IP pool:

! Define inside/outside interfaces

Router(config)# interface ethernet 1/1

Router(config-if)# description TO_ISP_BACKBONE

Router(config-if)# ip address <ISP_Public_IP> <Subnet_Mask>

Router(config-if)# ip nat outside

Router(config-if)# no shutdown

Router(config-if)# exit

Router(config)# interface ethernet 1/2

Router(config-if)# description TO_CATALYST_2960_TRUNK

Router(config-if)# ip nat inside

Router(config-if)# no shutdown

Router(config-if)# exit

! Define NAT pool (ISP public IPs)

Router(config)# ip nat pool ISP_POOL <First_Public_IP> <Last_Public_IP>

              netmask <Subnet_Mask>

! ACL to identify inside traffic

Router(config)# ip access-list standard SUBSCRIBER_ACL

Router(config-acl)# permit 192.168.10.0 0.0.0.255

Router(config-acl)# permit 192.168.20.0 0.0.0.255

Router(config-acl)# exit

! Bind NAT pool to ACL

Router(config)# ip nat inside source list SUBSCRIBER_ACL

              pool ISP_POOL overload

! Verify NAT translations

Router# show ip nat translations

Router# show ip nat statistics

5. CISCO Nexus 3000 — Routing Configuration

Configure default route toward ISP backbone and inter-VLAN routing:

! Default route to ISP upstream

Router(config)# ip route 0.0.0.0 0.0.0.0 <ISP_Gateway_IP>

! Sub-interfaces for inter-VLAN routing (Router-on-a-Stick)

Router(config)# interface ethernet 1/2.10

Router(config-if)# encapsulation dot1q 10

Router(config-if)# ip address 192.168.10.1 255.255.255.0

Router(config-if)# ip nat inside

Router(config-if)# exit

Router(config)# interface ethernet 1/2.20

Router(config-if)# encapsulation dot1q 20

Router(config-if)# ip address 192.168.20.1 255.255.255.0

Router(config-if)# ip nat inside

Router(config-if)# exit

! Verify routing table

Router# show ip route

Router# show ip interface brief

6. CISCO Catalyst 2960 — Port Security

Restrict unauthorized MAC addresses on subscriber-facing ports:

! Enable port security on access ports

Switch(config)# interface range fa0/1 - 24

Switch(config-if-range)# switchport port-security

Switch(config-if-range)# switchport port-security maximum 2

Switch(config-if-range)# switchport port-security violation restrict

Switch(config-if-range)# switchport port-security mac-address sticky

Switch(config-if-range)# exit

! Verify port security

Switch# show port-security

Switch# show port-security interface fa0/1

Switch# show port-security address

Testing & Verification

Layer 2 Verification

! Check VLANs

Switch# show vlan brief

! Check trunk status

Switch# show interfaces trunk

! Check STP topology

Switch# show spanning-tree vlan 10

Switch# show spanning-tree vlan 20

! Check MAC address table

Switch# show mac address-table

Layer 3 Verification

! Check interface status

Router# show ip interface brief

! Check routing table

Router# show ip route

! Check NAT translations (after user traffic)

Router# show ip nat translations

Router# show ip nat statistics

! Ping test — subscriber gateway

Router# ping 192.168.10.1

Router# ping 192.168.20.1

! Ping test — ISP upstream

Router# ping <ISP_Gateway_IP>

! Traceroute to verify path

Router# traceroute 8.8.8.8

Challenges & Solutions

ChallengeSolution
Broadcast storms during initial setupEnabled STP Rapid PVST+ with PortFast and BPDUGuard on access ports
VLAN traffic not crossing trunkFixed native VLAN mismatch; set native VLAN 99 on both ends of trunk
NAT not translating subscriber trafficConfirmed ip nat inside/outside assignment on correct sub-interfaces
Unauthorized devices connecting to POP portsEnabled sticky MAC port-security with violation restrict mode
Intermittent uplink drops to ISP backboneRenegotiated duplex/speed to forced 1Gbps full-duplex on uplink

Outcome & Impact

  • Successfully configured full CISCO POP stack for live ISP deployment
  • VLAN segmentation ensured traffic isolation across subscriber groups
  • STP eliminated loop-related outages at the POP site
  • NAT enabled public internet access for all subscriber VLANs
  • Port security hardened the switch against unauthorized device connections
  • Project completed within 3-day timeline with zero post-deployment issues
  • Handed over to ISP NOC team with full configuration documentation

Need a Secure Network Architecture
for Your Business?

Network Security Design · Firewall Engineering · Multi-Site WAN · VPN & Tunneling

I design and deploy enterprise-grade network security solutions — from ISP POP builds and CISCO switching stacks to firewall policy hardening, route optimization, and multi-branch WAN tunneling. Whether you’re building an ISP POP or securing a 50-branch enterprise — I’ve got the blueprint.

Firewall Design & Policy Hardening (Sophos, Fortinet, pfSense)
Site-to-Site VPN & GRE Tunnel Deployment
WAN Redundancy & Failover Architecture
Network Segmentation & VLAN Design
Security Audit & Traffic Analysis (Wireshark, tcpdump)
Network Documentation & Handover

Have a project in mind? Reach out and let’s discuss your network security needs.

Tags: catalyst cisco isp nat nexus pop port-security routing stp