Published

- 4 min read

Network Simulation Project – VLANs, Firewalls, NAT & VPN

img of Network Simulation Project – VLANs, Firewalls, NAT & VPN

🧩 Enterprise Network Simulation — VLANs, Firewalls, NAT & VPN

Summary: A comprehensive enterprise network simulation project designed and deployed in GNS3 (running on my Proxmox HomeLab). It demonstrates end-to-end connectivity, segmentation, and security implementation between a Head Office and a Branch Office, integrating VLANs, OSPF, Palo Alto firewalls, NAT, and IPSec VPN.


🎯 Project Overview

This project replicates the IT infrastructure of a mid-size enterprise with one Head Office and one Branch Office located in different geographic regions.
It combines multiple networking technologies to achieve secure, reliable, and segmented communication between sites.

All configurations were implemented and tested in GNS3, hosted within my Proxmox-based HomeLab, to ensure full isolation, persistence, and realistic behavior of enterprise equipment.


🧠 Objectives

  1. Build a hub-and-spoke network topology connecting two offices through an IPSec site-to-site VPN.

  2. Implement VLAN segmentation for departmental separation and inter-VLAN routing through firewalls.

  3. Configure OSPF for dynamic routing across internal and ISP networks.

  4. Design and enforce firewall security zones and policies for traffic control.

  5. Apply NAT for outbound internet access and public web server exposure.

  6. Validate the full network with functional and security testing.


🏗️ Topology Design

The network consists of the following major components:

SiteDeviceRoleVirtualization Image
Head OfficeRouter (ISP)Internet gatewayCisco 3725
Head OfficeFirewallSecurity boundary, NAT, VPNPalo Alto v11.0
Head OfficeSwitchVLAN and IRB routingJuniper vQFX-20.2R1
Branch OfficeRouter (ISP)Internet gatewayCisco 3725
Branch OfficeFirewallSecurity boundary, VPNPalo Alto v11.0
Branch OfficeSwitchVLAN segmentationJuniper vQFX-20.2R1

Network Architecture Diagram:

The Internet layer was simulated using two ISP routers with OSPF in area 0 to provide a realistic WAN environment.


🧩 VLAN Design & Implementation

Each office was segmented into logical VLANs to emulate real departments and control broadcast domains.

HQ VLANs:

DepartmentVLAN IDSubnetIRB Interface
Finance10172.22.76.0/27irb.10
HR20172.22.76.32/27irb.20
Operations30172.22.76.64/27irb.30
Customer Service40172.22.76.96/27irb.40
Routing100172.22.76.224/30irb.100
DMZ (Web Server)172.24.76.0/24

Branch VLANs:

DepartmentVLAN IDSubnetIRB Interface
Development10172.23.36.0/27irb.10
Test20172.23.36.32/27irb.20
Management30172.23.36.64/27irb.30
Routing100172.23.36.224/30irb.100

Each VLAN was assigned to a firewall zone to ensure granular control at Layer 3.


🔥 Firewall Configuration

The Palo Alto firewalls served as the security boundary for both sites.
Configuration highlights include:

🔹 Zone & Interface Setup

  • Defined zones: LAN, VPN, DMZ, Untrust, and Management

  • Assigned corresponding interfaces (e.g., ethernet1/1 → LAN, ethernet1/2 → Untrust)

  • Enabled management profiles for SSH and HTTPS control-plane access

Firewall Security Policy:

Firewall Interfaces Configuration Figre:

🔹 Security Policies

Source ZoneDestination ZoneActionDescription
LAN → UntrustAllowInternet access for all internal departments
DMZ → UntrustAllowOutbound access for web server updates
VPN → LANAllowInter-site communication
Any → ManagementDenyRestrict administrative access
Untrust → DMZAllow (port 80/443)Permit inbound web traffic to HQ server
Untrust → LANDenyPrevent unsolicited inbound connections

🔹 Virtual Router

  • Configured static routes for local subnets

  • Redistributed connected networks into OSPF where appropriate

  • Excluded internet-facing zones from OSPF advertisement to prevent leakage

Virtual Router Configuration:

🔹 Firewall Testing

  • Verified NAT and VPN traffic using the Monitor tab

  • Used advanced ping:

    ping source <source IP> host <destination IP>

    to confirm reachability through specific firewall interfaces


🌍 OSPF and ISP Network

The Internet layer was built with two simulated ISP routers using OSPF area 0.
Each router only advertised its directly connected networks to maintain routing isolation between internal and external domains.

Within each site:

  • The firewall’s Virtual Router participated in OSPF to exchange routes with the switch.

  • OSPF adjacency was verified through neighbor tables and database outputs.

Verification Command Example (Firewall):

show routing route virtual-router <vr-name> | match O

This ensured proper reachability between HQ and Branch networks over the VPN tunnel.

OSPF Packet Figure:


🔄 NAT Configuration

Dynamic Source NAT:

  • Enabled for internal and DMZ networks to access the internet via the firewall’s public IP.

Destination NAT:

  • Configured on the HQ firewall to expose the internal web server (172.24.76.10) to external users through HTTPS on the untrust interface.

Testing:

  • Verified correct address translation in Session Browser and via packet capture.

  • External hosts successfully accessed the internal web server via public IP.

Destination NAT Testing Figure1:

Destination NAT Testing Figure2:


🔐 VPN Configuration

Implemented a site-to-site IPSec VPN between HQ and Branch offices:

IKE Configuration:

ParameterHQBranch
Local IP172.31.76.1172.31.76.9
Peer IP172.31.76.9172.31.76.1
Pre-shared Key**********
IKE Cryptoaes256-sha1, DH Group 14Same
IPSec Cryptoaes256-sha1, PFS enabledSame

IKE Gateway Configuration Figure:

IPSec Tunnel Configuration Figure:

Tunnel Configuration:

  • Tunnel interfaces assigned to the VPN zone

  • Static routes added for remote internal subnets

  • Security policy allowing VPN zone-to-zone traffic

Verification:

  • VPN tunnel established successfully (green status)

  • ICMP and application traffic confirmed across both sites

  • Used monitor traffic to validate encrypted flows


🧠 Reflection

This project replicated a full enterprise-grade design, integrating segmentation, routing, NAT, and secure tunneling within a unified simulation.
Key takeaways:

  • OSPF should only advertise directly connected networks to prevent conflicts.

  • VPN connectivity must be verified at both control and data plane levels.

  • NAT and firewall policies require careful ordering to ensure security and reachability.

  • The modular topology allows incremental testing — VLANs first, then NAT, then VPN.

Overall, this simulation mirrors the workflow of a real network deployment project, emphasizing design planning, implementation discipline, and verification methodology.


🧰 Tools & Environment

  • GNS3 running on Proxmox VE (Dell PowerEdge T320 HomeLab)

  • Palo Alto v11.0, Juniper vEX, Cisco 3725

  • Wireshark for packet inspection

  • Windows Server VM for web hosting and client simulation

GNS3 Platform:


🏁 Outcome

✅ End-to-end connectivity between HQ and Branch
✅ Isolated departmental VLANs and secure inter-zone routing
✅ Dynamic OSPF routing and reachability verification
✅ Functional NAT and public web access via DMZ
✅ Encrypted site-to-site VPN connectivity

This project showcases not just configuration skill but network architecture thinking — the ability to translate business requirements into secure, scalable designs.