Skip to content

A simplified coproate network with firewall that seperates the networks and a Demilitarized Zone for direct internet exposure, and seperate internal and external subnetworks.

License

Notifications You must be signed in to change notification settings

shadow-dragon-2002/Simple_Corporate_Nertwork

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

I started this project to learn more about network hardening techniques and improve my networking abilities. It functions as a simplified version of a safe corporate network, complete with subnetworks for internal and external use and a demilitarized area for hosting servers and services that need to be connected to the internet. These network parts are effectively segregated by a specialized firewall. Cisco Packet Tracer was used to develop the full setup, which includes real-world networking and network hardening techniques.

Network:

Corp_Network_With_DMZ

Contents:

The network contains the following:-

Internal Zone:

This zone contains the main working parts of the network with the internal architecture like the end users and internal network servers are located here. In the network I created the internal network contains the following elements :

  • Technician VLAN
  • End-User Workstations VLAN
  • Syslog Server
  • NTP Server
  • Internal FTP Server
  • DHCP Server
  • Internal Zone Switch

Demilitarized Zone:

This is an intermediary zone between the external network and the internal network to work as an intermediary to protect the internal network from the external facing network. The DMZ contains the following :

  • Email Server
  • HTTP Server
  • External FTP Server
  • DMZ Switch

External Zone:

This is the network that is exposed to the internet directly and contains some corporate infrastructure but not much confidential or important data. The External Zone contains the following :

  • External Technician VLAN
  • External End-User Workstations VLAN
  • External Zone Switch

Firewall:

This is the segregation factor, the firewall separates the internal network and DMZ from the external network.

Implemented Network Security Practices:

  • Switchport assignment hardening
  • DHCP Snooping
  • ARP Inspection
  • Secure Firewall Configuration
  • Access Control List's
  • Port Security and VLAN Segregation
  • Secure Switch Setup

About

A simplified coproate network with firewall that seperates the networks and a Demilitarized Zone for direct internet exposure, and seperate internal and external subnetworks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages