In order to configure a network in any organization, the user lays out certain specifications that need to be fulfilled. The prospective user defines the security and routing policies that need to be implemented without getting into any technical details. The objective of this work is to map the policies stated, to a set of technical parameters for a networking environment. In other words, a normal networking policy needs to be mapped to technical terms. This necessitates the need to identify which networking components to configure along with their respective routing and security protocols.