Skip to content

Network Design

This page describes the logical and physical design of the VNTD network topology, focusing on how components are interconnected and how responsibilities are distributed across the infrastructure.


Topology Overview

The topology simulates a multi-zone enterprise network connected to external devices. It is built around a central Internet core and a segmented enterprise network protected by a router and a firewall.

The topology consists of:

  • An Internet core router.
  • Separate external networks (attacker and benign).
  • An enterprise router.
  • A central firewall.
  • Multiple VLAN-based internal segments.
Network Design
Provided topology
graph TD
    subgraph External_Networks
        Attacker[Attacker Network - Kali]
        Benign[Benign Network - Alpine]
    end

    subgraph Internet_Infrastructure
        Router_Internet[Router Internet]
        Server_Internet[Internet Server]
    end

    subgraph Enterprise_Core
        Router_Edge[Enterprise Edge Router]
        Firewall[Central Firewall]
    end

    subgraph Internal_Segments
        DMZ[VLAN 10 - DMZ Services]
        Logwatch[VLAN 20 - Monitoring]
        Admin[VLAN 30 - Management]
        Services[VLAN 40 - Internal Services]
        Users[VLAN 50/60 - User Floors]
    end

    Attacker --- Router_Internet
    Benign --- Router_Internet
    Router_Internet --- Server_Internet
    Router_Internet --- Router_Edge
    Router_Edge --- Firewall
    Firewall --- DMZ
    Firewall --- Logwatch
    Firewall --- Admin
    Firewall --- Services
    Firewall --- Users

External Networks

Internet Core

The router (router_internet) located at the center of the topology represents the public Internet core. It serves as the interconnection point for:

  • External benign traffic.
  • External attacker traffic.
  • Enterprise outbound and inbound traffic.

This router uses FRRouting (FRR) to provide realistic routing behavior.

Within the network, a server (internet_server) can be appreciated, simulating common internet services.


Attacker Network

The attacker network simulates a hostile external actor:

  • A dedicated router (router_attacker).
  • A Kali Linux-based attacker node.

This network is intentionally separated to allow controlled attack generation.

Warning

Attack simulations should only be executed inside this isolated environment.


Benign Network

The benign network simulates legitimate external users:

  • A dedicated router (router_benign).
  • A lightweight client node.

This allows differentiation between malicious and legitimate traffic.


Configuration Persistence

All configurations for routers and switches are decoupled from the images and mounted via bind in the topology definition file. Changes applied directly on the machines do not persist.


Enterprise Core

Enterprise Edge Router

The router_enterprise node connects the enterprise network to the Internet. Its responsibilities include:

  • Routing between enterprise and external networks (NAT).
  • Forwarding traffic toward the firewall.
  • Acting as a clear limit between external and internal domains.

Firewall

The firewall is the central enforcement point of the enterprise:

  • Enforces inter-VLAN policies.
  • Controls inbound and outbound traffic.
  • Mirrors traffic to the Logwatch.
  • Hosts DHCP relay functionality.
  • Acts as the default gateway for all VLANs.

VLAN Communication

All enterprise VLANs are isolated by default. Inter-VLAN communication is only possible through explicit firewall rules.


Layer 2 Segmentation

VLANs are implemented using the custom firewall images, but L2 package traffic is managed with Arista cEOS switches, providing realistic L2 behavior:

  • Access ports for end devices.
  • Trunk ports for multi-VLAN floors.
  • Clear separation between zones.

Each VLAN maps to a dedicated VLAN gateway. This VLAN gateway represents the firewall. The firewall works both as a L3 switch and as a security device.


Monitoring Placement

Traffic monitoring is performed by a dedicated node located in the Monitoring VLAN (VLAN 20), reading all traffic outgoing and incoming the enterprise network, ensuring:

  • Visibility into enterprise traffic.
  • Isolation from services and users.

Traffic is mirrored by the firewall using the iptables TEE mechanism, combined with the node operating in promiscuous mode, allows the node to receive packets without interfering with the original flow.

Tip

This placement ensures maximum visibility with minimal configuration.

Monitoring node

It acts purely as an observer, ensuring the integrity of the simulated network traffic.

This node, called logwatch, acts as a centralized analysis system responsible for capturing, processing and visualizing network logs. Such is composed of four main components:

  • Suricata — Intrusion Detection System (IDS), inspects mirrored packets and generates registers.
  • Filebeat — Log shipper, collects Suricata logs and forwards them to Elasticsearch for processing.
  • Elasticsearch — Log storage and indexing, stores and indexes log data for efficient processing and analysis.
  • Kibana — Visualization interface, provides dashboards and visual analysis tools.

Unlike traditional IDS where components are separated, this project integrates the entire monitoring components within a single container. This design simplifies deployment and reduces the number of containers used.

Communication

This node cannot sends traffic back into the network, ensuring it does not interfere with normal network operation.