Network Security Homelab

A comprehensive enterprise-grade network security environment

Project Introduction

Initial planning for this network homelab project began in March 2024, with physical implementation starting in August 2024. The network has grown from an initial two planned devices to over seven, with plans for further expansion after graduating from Purdue University in May 2025. This project combines knowledge gained from independent study and undergraduate coursework at Purdue in Cybersecurity and Network Engineering Technology.

The lab incorporates enterprise-grade hardware including a Cisco Catalyst 3750-X switch, Cisco 1921 router, FortiNet FortiGate 40F Next Generation Firewall (NGFW), and an HP ProLiant DL360 Gen9 server with 256GB of RAM and 2TB of SSD storage. Additionally, two micro Dell OptiPlex servers (5060 and 5070) provide dedicated services with 16GB RAM each and combined 2TB storage. The network utilizes color-coded CAT6 cabling for different VLANs and implements comprehensive security practices including VLAN segmentation, RADIUS authentication, and Active Directory integration. An animated diagram of the network architecture can be viewed below.

Cisco FortiNet Active Directory ESXi RADIUS VLANs

Lab Environment Architecture

Internet FortiNet FG-40F Cisco 1921 Cisco 3750x Personal PC HP ProLiant DL360 Gen9 Dell OptiPlex 5070 Dell OptiPlex 5060 TP-Link AX1800 Wireless Client VLAN 10 VLAN 20 VLAN 30 VLAN 40

Project Details

Logical Architecture Mapping

Hostname Device Operating System Role IP Address VLAN Specifications
fgfw FortiNet FG-40F FortiOS NGFW / Edge Router 10.26.5.1/30 All NGFW with VPN, SSL Inspection
labrt Cisco 1921 IOS 15.7 Internal Router 10.26.5.2/30 10,20,40 OSPF, RADIUS Auth
labsw Cisco 3750-X IOS 15.2 Core Switch 10.26.10.2 All L2/L3 Switch, Port Security
wifi TP-Link AX1800 N/A Wireless Router 10.26.20.10 20 Wireless Access, Client Connectivity
adds Dell OptiPlex 5070 Windows Server 2022 Active Directory Server 10.26.10.100 10 16GB RAM, AD, DNS, RADIUS
dns Dell OptiPlex 5060 Ubuntu 24.04 DMZ DNS Server 10.26.30.100 30 16GB RAM, AdGuard DNS
esxi HP ProLiant DL360 Gen9 VMware ESXi 7.0.3 Virtualization Host 10.26.10.200 All 256GB RAM, 4TB SSD
pc Personal PC Windows 10 Pro Management Console 10.26.10.26 10 i9-9900k, 32GB RAM

Network Architecture & Segmentation

The network implements an enterprise-grade segmentation strategy using four primary VLANs, each with specific security policies and access controls applied. Open Shortest Path First is used as a dynamic routing protocol between the router and firewall within area 0. Network Address Translation is applied to all security zones off of the firewall for general internet connectivity. A breakdown of the VLANs as they relate to infrastructure within the network can be viewed below.

Management Infrastructure (VLAN 10)

  • Subnet: 10.26.10.0/24
  • Cable designation: Blue CAT6 UTP
  • Primary devices: Active Directory server (10.26.10.100), Management PC (10.26.10.26), HP ProLiant DL360 Gen9 ESXi Management Console (10.26.10.200)
  • RADIUS authentication integration for network devices
  • Primary DNS resolver for internal subnets and domain (tronsec.net)
  • Root Certificate Authority for the primary domain (10.26.10.100)
  • Link aggregation to HP ProLiant server using 4 x 1GbE CAT6 connections

Wireless Network (VLAN 20)

  • Subnet: 10.26.20.0/24
  • Cable designation: Red CAT6 UTP
  • Isolated DHCP services on Cisco 1921 router
  • External DNS resolution through Cisco OpenDNS (208.67.222.222)
  • No internal network access - internet gateway only
  • ACLs prevent all inter-VLAN communication
  • Managed through TP-Link AX1800 WiFi 6 Router

DMZ Services (VLAN 30)

  • Subnet: 10.26.30.0/24
  • Cable designation: Green CAT6 UTP
  • Hosts DMZ DNS server (10.26.30.100)
  • Relays internal DNS from Active Directory server
  • Direct internet access through FortiGate firewall
  • Selective access from VLAN 10 only
  • DNS forwarding to Cloudflare (1.1.1.1)
  • Services NTP for domain and log synchronization on networking devices

Server Infrastructure (VLAN 40)

  • Subnet: 10.26.40.0/24
  • Cable designation: Yellow CAT6 UTP
  • LibreNMS monitoring system (10.26.40.20)
  • SecurityOnion IDS/IPS platform (10.26.40.30)
  • Management Access restricted to VLAN 10 only

Physical Infrastructure

  • Cisco Catalyst 3750-X core switch with full VLAN support
  • Color-coded CAT6 cabling for easy VLAN identification
  • Link aggregation for server connectivity (4 x 1GbE)
  • FortiGate FG-40F NGFW for edge security and routing
  • Cisco 1921 router for internal routing and VLAN segmentation
  • TP-Link Wireless Router for mobile client connectivity

Network Connectivity & Routing

The network displays sophisticated routing and connectivity solutions including:

  • OSPF implementation between the Cisco 1921 router and FortiGate firewall for dynamic internal routing
  • Link Aggregation (LAG) for ESXi server connections, providing enhanced bandwidth and redundancy
  • Access Control Lists (ACLs) on both layer 2 and layer 3 devices for granular traffic control
  • RADIUS authentication integration for secure device access and user authentication

The network displays a simple routing and connectivity solution that prioritizes reliability and security. OSPF routing is implemented between the Cisco 1921 router and FortiGate firewall to enable dynamic internal routing within area 0. The default route to the internet is injected at the edge of the network, the FortiGate Firewall, where dynamic routing to the DMZ occurs. The network features Link Aggregation (LAG) between the Cisco 3750-X switch and the ESXi server, utilizing four 1GbE connections bundled together to provide enhanced bandwidth and redundancy for server operations. Access Control Lists (ACLs) are strategically implemented on both layer 2 and layer 3 devices to enforce granular traffic control between VLANs and network segments. Traffic management is further enhanced through RADIUS authentication integration, which enables secure device access and user authentication through centralized Active Directory services. This comprehensive approach ensures efficient traffic flow while maintaining strict security controls across all network segments.

Active Directory & Authentication

A comprehensive authentication infrastructure built on Windows Server 2022:

  • Centralized Active Directory services for user and device management
  • RADIUS server integration for network device authentication
  • Certificate Authority services for internal PKI infrastructure
  • Group Policy implementation for security and access control
  • Integration with FortiGate NGFW for user-based access policies

Active Directory Domain Establishment

The Active Directory domain environment was established using Windows Server 2022 with a root domain of tronsec.net. Initial configuration of the domain included setting up domain and DNS services to manage wired clients through Active Directory objects, with DNS relaying configured to the DMZ DNS server at 10.26.30.100. Additionally, security measures like a DSRM password were configured for administrative protection and control of the domain. A comprehensive administrator group was created for service and device management access, with user accounts established for other network administrators and test users, each assigned to the operator group. The domain infrastructure serves as the central authentication and management hub, hosting RADIUS authentication services to enable network device access using AD credentials. The server was configured as a root Certificate Authority (CA) to handle certificate signing and validation across the network infrastructure, particularly supporting SSL inspection on the FortiGate firewall and HTTPS services for internal websites. Time synchronization was implemented through NTP, with the AD server acting as a relay between the DMZ NTP server and all wired hosts on the network, ensuring consistent time settings across domain-joined systems.

RADIUS Authentication

Remote Authentication Dial-In User Service (RADIUS) authentication was implemented to provide centralized network access control for all network devices. The Active Directory server at 10.26.10.100 was configured as the primary RADIUS server for authenticating network device access. This setup enabled integration between Active Directory user credentials and network device logins, allowing for unified authentication across the infrastructure. All Cisco network devices including the 3750-X switch and 1921 router were configured to use RADIUS as their primary authentication method with a local admin account configured as fallback. RADIUS shared secrets and UDP ports 1812/1813 were configured for authentication and accounting respectively.

This implementation ensured that all device access is authenticated against Active Directory, providing centralized user management and detailed accounting of network device access. Network policy server was configured on the Active Directory server to enforce specific authentication policies, including the use of Protected EAP (PEAP) with MS-CHAPv2 for enhanced security. RADIUS groups were created to manage access levels, with RadiusUsers being assigned basic access and RadiusAdmins receiving elevated privileges. Establishment of this setup provided a robust, scalable authentication system that leveraged existing Active Directory infrastructure while maintaining security through centralized access control of networked devices.

Security Implementation

Multi-layered security approach incorporating:

  • FortiGate Next-Generation Firewall for advanced threat protection
  • Network segmentation with strict VLAN isolation
  • Layer 2 security including DHCP snooping and Dynamic ARP inspection
  • 802.1X port-based authentication for wired connections
  • Comprehensive logging and monitoring through SecurityOnion and LibreNMS

RADIUS Client Authentication

The RADIUS client authentication was configured on both the Cisco 1921 router and Cisco Catalyst 3750-X switch to provide centralized AAA services through the Active Directory server at 10.26.10.100. Authentication methods were configured to use RADIUS as the primary authentication source with local authentication as fallback. Pre-authentication ACLs were implemented to restrict access during the authentication process for known client access ports including the Personal PC, allowing only essential pre-authentication traffic like HTTP, HTTPS, DHCP and DNS. The switches and routers were configured with RADIUS shared secrets and used ports 1812/1813 for authentication and accounting respectively. Both devices had RADIUS dead-criteria configured with a 5-second timeout and 3 retries before marking a RADIUS server as unresponsive, with a deadtime of 3 minutes for client authentication through console and SSH. The authentication setup leverages Protected EAP (PEAP) with MS-CHAPv2 for enhanced security. Access control was managed through two primary groups - RadiusUsers for basic access and RadiusAdmins for elevated privileges. This implementation provided robust, scalable authentication while maintaining security through centralized access control and accounting of network device access. Emergency local admin accounts with privilege level 15 were maintained as a fallback option, using type 9 scrypt secrets on the labsw switch and type 7 secrets on the labrt router, with passwords encrypted using AES.

Layer 2 Security Technologies

Layer 2 security measures were extensively implemented on the Cisco Catalyst 3750-X switch to protect against common network attacks and unauthorized access. Dynamic Trunking Protocol (DTP) was disabled on all trunk interfaces to prevent unauthorized VLAN hopping attempts. For endpoint protection, all access interfaces had PortFast and BPDUGuard enabled to prevent spanning tree manipulation attacks while ensuring quick port initialization. Port security was implemented on all access interfaces connecting to endpoints, with a maximum of one MAC address allowed per port and a violation policy of restrict to prevent MAC address spoofing attacks. Dynamic ARP Inspection (DAI) was enabled on the trunk interface connected to the router for VLAN 10 to prevent ARP poisoning attacks. Access control for DAI was controlled via an ARP ACL locally on the switch, as a DHCP Snooping table did not exist for the wired network. On trunked interfaces to the server infrastructure, LAG was enabled on the four interfaces connecting to the HP ProLiant DL360 Gen9 server, creating an etherchannel port-group for both enhanced bandwidth and security. Unused switch ports were placed into a shutdown state to prevent unauthorized access attempts. These layered security controls worked together to create a robust defense against layer 2 attacks while maintaining high-speed network functionality with a small network of users.

Layer 3 Security Technologies

Layer 3 security measures were implemented through a comprehensive set of access control lists (ACLs) across multiple network segments. On the wireless VLAN (VLAN 20), traffic was strictly controlled with permits for essential services like ICMP echo, DHCP (bootpc/bootps), and domain services, while explicitly denying any cross-VLAN communication. Server connectivity (VLAN 40) ACLs were established to permit specific service traffic, including HTTP/HTTPS communication between monitoring servers and the DMZ, with DNS resolution and SNMP monitoring capabilities configured as needed. For the DMZ segment (VLAN 30), a firewall connectivity ACL was implemented with careful controls on both ingress and egress traffic, permitting only necessary protocols like OSPF, TCP to management interfaces, and essential monitoring services to the router itself (10.26.5.2). All ACLs were configured with explicit deny statements and logging capabilities to track potential security violations.

The management VLAN (VLAN 10) was granted controlled access to other segments through carefully crafted ACL entries, allowing for secure administration. It was configured to allow strategic access to the router-firewall link (10.26.5.0/30) and server infrastructure from the management PC (10.26.10.26), while maintaining strict control over broader network access. Additionally, OSPF routing between the Cisco router and FortiGate firewall was secured through neighbor authentication and route filtering to prevent unauthorized route advertisements.

Virtualization Infrastructure

ESXi-based virtualization platform hosting critical services:

  • HP ProLiant DL360 Gen9 server with 256GB RAM and 4TB SSD storage
  • Network monitoring and security analysis virtual machines
  • Development and testing environments
  • Link aggregation for enhanced network performance
  • Integration with Active Directory for access control

Based on the documentation provided, I'll write a comprehensive paragraph about the Virtualization Infrastructure section. Here's my suggested content: The virtualization infrastructure is built around an HP ProLiant DL360 Gen9 server running VMware ESXi 7.0.3 as a Type 1 hypervisor. The server hardware features robust specifications including 256GB of DDR4 RAM and 4TB of SSD storage in 2.5" drive bays, providing ample resources for running multiple virtual machines. Network connectivity is established through a link aggregation of four 1GbE connections to the core Cisco 3750-X switch, for enhanced bandwidth and redundancy. The ESXi host is integrated into the Active Directory domain for centralized authentication and resides in VLAN 10 for management access with the address 10.26.10.200. Multiple virtual machines are hosted on the platform including LibreNMS for network monitoring (10.26.40.20), SecurityOnion IDS/IPS (10.26.40.30), and additional VMs for development and testing. The server's management interface (iLO) is accessible at 10.26.10.201 and provides out-of-band management capabilities. This virtualization platform serves as a critical component of the infrastructure, enabling flexible deployment of monitoring, security, and development environments while maintaining proper network segmentation through VLAN tagging and access controls.

Infrastructure Hardening

Comprehensive security hardening measures:

  • Secure device configuration baselines across all network equipment
  • Implementation of port security and unused port shutdown
  • Strong password policies and encryption standards
  • Regular security updates and patch management
  • Automated monitoring and alerting for security events

Cisco IOS Device Hardening & Baselines

Comprehensive infrastructure security hardening was implemented across both Cisco network devices through multiple configuration baselines. RADIUS client authentication was enabled on both the router and switch for administrative access, with the devices configured to use the Active Directory server at 10.26.10.100 as the primary authentication source. Emergency administrative accounts were established with privilege level 15 access, using type 9 scrypt secrets on the switch and type 7 secrets on the router for local authentication fallback. The service password-encryption command was applied using AES as the encryption algorithm to secure stored credentials. Executive timeout values were reduced to 10 minutes on both devices, and lockout policies were implemented to restrict access after 3 failed login attempts.

For logging and accountability, both devices were configured to record all login attempts, userinfo changes, and enable access events, with logs being forwarded to the SecurityOnion server at 10.26.40.30. The switch was further hardened through port security measures, implementing MAC address restrictions and violation policies on access ports. These port security measures included shutting down unused ports to prevent unauthorized access, and securing all logon methods such as shutting down the unused aux port, and adding an executive timeout to the VTY lines. From these securities implemented, secure configuration baselines were established for future expandability. These baselines established a solid security foundation while maintaining necessary management access through the secured management VLAN.