This project demonstrates a secure network design that implements layered security principles, DMZ (Demilitarized Zone) segmentation, VLANs, firewalls, and intrusion detection/prevention to protect critical systems from internal and external threats.
The network design includes:
-
Internet Gateway
- Connects the internal network to the public internet.
- Protected by an Edge Firewall (pfSense).
-
DMZ Zone
- Hosts public-facing services (Web Server, DNS Server, Mail Server).
- Segregated using VLANs and firewall rules to limit traffic to/from internal LAN.
- Monitored with Snort IDS/IPS.
-
Internal LAN
- Consists of employee workstations, internal file servers, and printers.
- Isolated from DMZ with strict ACLs.
-
Admin Network (VLAN 20)
- Only accessible by system/network admins.
- Used to manage servers, firewalls, switches.
-
WiFi Network (VLAN 30)
- Guest and employee WiFi access.
- Isolated from LAN using VLAN tagging and firewall rules.
-
Monitoring Server
- Runs SIEM tools (e.g., Wazuh or Security Onion).
- Collects logs from IDS, firewall, and servers.
| Feature | Purpose |
|---|---|
| π₯ pfSense Firewall | Controls traffic between zones (DMZ β LAN β WAN) |
| π§ Snort IDS/IPS | Detects/prevents suspicious activity in real time |
| π VLAN Segmentation | Isolates traffic between sensitive departments |
| π― ACLs and NAT Rules | Limits access to critical systems and masks internal IPs |
| π VPN for Admin Access | Secure remote access for administrators |
| π Centralized Logging | Monitors all network activity for forensics and compliance |
- VirtualBox (Lab Environment)
- pfSense (Firewall/Router)
- Snort 3 (IDS/IPS)
- Ubuntu Server (Web, Mail, DNS)
- SIEM Platform (e.g., Wazuh/Security Onion)
- The principle of network segmentation and least privilege.
- How to structure DMZs to protect internal resources.
- Configuring firewall rules and access control lists.
- The role of SIEM tools in monitoring modern networks.
- Importance of redundancy and failover in secure design.
(Save your 3β4 key screenshots under screenshots/ folder and name them meaningfully)
vm-layout.pngpfsense-firewall-rules.pngsnort-ids-alerts.pngnetwork-diagram.pngβ
All architecture and security features were diagrammed, explained, and documented.
