Network Design
This page describes the logical and physical design of the VNTD network topology, focusing on how components are interconnected and how responsibilities are distributed across the infrastructure.
Topology Overview
The topology simulates a multi-zone enterprise network connected to external devices. It is built around a central Internet core and a segmented enterprise network protected by a router and a firewall.
The topology consists of:
- An Internet core router.
- Separate external networks (attacker and benign).
- An enterprise router.
- A central firewall.
- Multiple VLAN-based internal segments.
graph TD
subgraph External_Networks
Attacker[Attacker Network - Kali]
Benign[Benign Network - Alpine]
end
subgraph Internet_Infrastructure
Router_Internet[Router Internet]
Server_Internet[Internet Server]
end
subgraph Enterprise_Core
Router_Edge[Enterprise Edge Router]
Firewall[Central Firewall]
end
subgraph Internal_Segments
DMZ[VLAN 10 - DMZ Services]
Logwatch[VLAN 20 - Monitoring]
Admin[VLAN 30 - Management]
Services[VLAN 40 - Internal Services]
Users[VLAN 50/60 - User Floors]
end
Attacker --- Router_Internet
Benign --- Router_Internet
Router_Internet --- Server_Internet
Router_Internet --- Router_Edge
Router_Edge --- Firewall
Firewall --- DMZ
Firewall --- Logwatch
Firewall --- Admin
Firewall --- Services
Firewall --- Users
External Networks
Internet Core
The router (router_internet) located at the center of the topology represents the public Internet core. It serves as the interconnection point for:
- External benign traffic.
- External attacker traffic.
- Enterprise outbound and inbound traffic.
This router uses FRRouting (FRR) to provide realistic routing behavior.
Within the network, a server (internet_server) can be appreciated, simulating common internet services.
Attacker Network
The attacker network simulates a hostile external actor:
- A dedicated router (
router_attacker). - A Kali Linux-based attacker node.
This network is intentionally separated to allow controlled attack generation.
Warning
Attack simulations should only be executed inside this isolated environment.
Benign Network
The benign network simulates legitimate external users:
- A dedicated router (
router_benign). - A lightweight client node.
This allows differentiation between malicious and legitimate traffic.
Configuration Persistence
All configurations for routers and switches are decoupled from the images and mounted via bind in the topology definition file. Changes applied directly on the machines do not persist.
Enterprise Core
Enterprise Edge Router
The router_enterprise node connects the enterprise network to the Internet. Its responsibilities include:
- Routing between enterprise and external networks (
NAT). - Forwarding traffic toward the firewall.
- Acting as a clear limit between external and internal domains.
Firewall
The firewall is the central enforcement point of the enterprise:
- Enforces inter-VLAN policies.
- Controls inbound and outbound traffic.
- Mirrors traffic to the Logwatch.
- Hosts DHCP relay functionality.
- Acts as the default gateway for all VLANs.
VLAN Communication
All enterprise VLANs are isolated by default. Inter-VLAN communication is only possible through explicit firewall rules.
Layer 2 Segmentation
VLANs are implemented using the custom firewall images, but L2 package traffic is managed with Arista cEOS switches, providing realistic L2 behavior:
- Access ports for end devices.
- Trunk ports for multi-VLAN floors.
- Clear separation between zones.
Each VLAN maps to a dedicated VLAN gateway. This VLAN gateway represents the firewall. The firewall works both as a L3 switch and as a security device.
Monitoring Placement
Traffic monitoring is performed by a dedicated node located in the Monitoring VLAN (VLAN 20), reading all traffic outgoing and incoming the enterprise network, ensuring:
- Visibility into enterprise traffic.
- Isolation from services and users.
Traffic is mirrored by the firewall using the iptables TEE mechanism, combined with the node operating in promiscuous mode, allows the node to receive packets without interfering with the original flow.
Tip
This placement ensures maximum visibility with minimal configuration.
Monitoring node
It acts purely as an observer, ensuring the integrity of the simulated network traffic.
This node, called logwatch, acts as a centralized analysis system responsible for capturing, processing and visualizing network logs. Such is composed of four main components:
- Suricata — Intrusion Detection System (IDS), inspects mirrored packets and generates registers.
- Filebeat — Log shipper, collects Suricata logs and forwards them to Elasticsearch for processing.
- Elasticsearch — Log storage and indexing, stores and indexes log data for efficient processing and analysis.
- Kibana — Visualization interface, provides dashboards and visual analysis tools.
Unlike traditional IDS where components are separated, this project integrates the entire monitoring components within a single container. This design simplifies deployment and reduces the number of containers used.
Communication
This node cannot sends traffic back into the network, ensuring it does not interfere with normal network operation.