This repository documents the design and implementation of a segmented, security-focused home network using pfSense, VLANs, and managed switches. It demonstrates enterprise-level network architecture practices with detailed configuration and zone isolation to simulate secure real-world environments.
- Project Overview
- Technologies Used
- Objectives
- Key Achievements
- Skills Demonstrated
- Setup and Configuration Guide
- Repository Structure
- Recommendations for Future Enhancements
- License
This lab simulates a secure home network using pfSense to manage six isolated VLANs (Client, IoT, Server, DMZ, Admin, and HoneyNet), configured with strict firewall rules, service zoning, and access control. The project replicates core enterprise network principles for training, experimentation, and practical demonstration of security architecture.
- pfSense β Firewall, VLAN routing, OpenVPN, Captive Portal
- Kea DHCP β IP address management and host reservations
- Unmanaged/Managed Switch β VLAN tagging and traffic segmentation
- Ubuntu β OS for connected services, log processing, and lab operations
- OpenVPN β Secure remote access
- Wireshark β Network traffic analysis
- Design and document a secure, scalable home network topology
- Segment the network using VLANs and enforce inter-zone firewall policies
- Deploy core services including DHCP, DNS, VPN, and a captive portal
- Simulate a DMZ and HoneyNet for threat modeling and response testing
- Provide professional-grade documentation for review and reproducibility
-
Implemented a fully segmented VLAN-based network
Created six VLANs aligned with security roles and enforced routing rules via pfSense to isolate traffic and restrict access. -
Built modular service zones for lab and simulation use
Configured isolated zones including a Captive Portal (HoneyNet), OpenVPN-enabled Admin VLAN, and dedicated IoT VLAN. -
Developed comprehensive documentation and diagrams
Included logical/physical diagrams, detailed service breakdowns, and configuration notes for each network component. -
Secured internal traffic and access flows
Applied firewall rules and DHCP static mappings to prevent unauthorized lateral movement or service misuse. -
Established groundwork for logging and security automation
Designed the layout for centralized monitoring, allowing future Splunk or syslog integration.
[Insert Logical Topology Diagram or Firewall Rule Chart Here]
-
Secure Network Design
Built a robust, layered topology emphasizing defense-in-depth and role-based segmentation. -
Firewall Configuration and Policy Enforcement
Created strict allowlist-based rules between VLANs, simulating zero-trust principles. -
Service Deployment and Zoning
Deployed and documented OpenVPN, Captive Portal, DNS, and DHCP in isolated zones. -
Access Control and Remote Access
Enabled remote access via VPN while maintaining strict zone boundaries internally. -
Professional Documentation and Diagramming
Maintained readable configuration guides, service maps, and architectural diagrams.
-
Network Topology Design
- Designed physical and logical layouts with six VLANs
- Mapped VLANs to physical switch ports and pfSense interfaces
-
pfSense Configuration
- Created VLAN interfaces for each zone
- Configured DHCP (via Kea) for each subnet with static host mapping
- Defined firewall rules to control inter-zone traffic and outbound access
-
Service Deployment
- OpenVPN configured for secure Admin access
- Captive Portal assigned to HoneyNet for unauthorized device sinkhole
- DNS and DHCP integrated across zones
-
Device Assignment
- Defined static IPs for laptops, servers, and IoT devices
- Used MAC-based reservations for critical hosts
-
Testing and Validation
- Verified isolation between VLANs (e.g., IoT canβt reach Admin)
- Tested remote VPN access and captive portal behavior
## Repository Structure
SOC-Network-Topology/
βββ diagrams/
β βββ physical-topology.png
β βββ logical-topology.png
β βββ vlan-overview.png
βββ docs/
β βββ topology-overview.md
β βββ vlan-breakdown.md
β βββ firewall-rules.md
β βββ services-config.md
β βββ remote-access.md
β βββ recommendations.md
βββ configs/
β βββ pfSense/
β β βββ interfaces.conf.txt
β β βββ vlans.conf.txt
β β βββ dhcp-kea.conf.txt
β β βββ openvpn.conf.txt
β β βββ firewall-rules.conf.txt
β βββ switch/
β β βββ vlan-ports-config.txt
β βββ dns-dhcp/
β βββ host-reservations.yaml
βββ scripts/
β βββ pfSense-backup.sh
βββ README.md
βββ LICENSE
- Deploy a centralized syslog or SIEM solution (e.g., Splunk or Graylog)
- Integrate Snort or Suricata for IDS/IPS functionality
- Automate configuration backups and version control using Git
- Introduce IPv6 support and dual-stack compatibility
- Expand HoneyNet with honeypots and alerting mechanisms
- Implement high availability (HA) using pfSense CARP or VRRP
This project is licensed under the MIT License β see the LICENSE file for details.