Skip to content

Hyujnn54/techsolutions-enterprise-network-lab

Repository files navigation

TechSolutions Enterprise Network and Monitoring Lab

Enterprise infrastructure project built in GNS3 for a fictional company, TechSolutions SARL. The environment simulates a multi-department network with segmented LANs, a routed backbone, centralized Internet access, and an IT-operated monitoring platform.

Overview

This was a 5-person university team project. Each member handled a major part of the infrastructure. I was responsible for the IT department and also contributed to the broader networking side of the platform.

The final system included:

  • Department-based segmentation
  • Backbone connectivity between departments
  • Dynamic routing with OSPF
  • Centralized NAT for Internet access
  • Linux-based service deployment in GNS3
  • Monitoring with Prometheus, Grafana, and Node Exporter
  • Firewall restrictions limiting dashboard access to the IT department

Key Outcomes

  • Built a segmented multi-department enterprise lab in GNS3
  • Contributed to subnetting, routing, and backbone integration
  • Deployed a Linux-based monitoring stack for infrastructure visibility
  • Restricted access to operational dashboards through firewall policy

Architecture Diagram

flowchart LR
	Internet[Internet] --> NAT[Backbone Router<br/>NAT + OSPF]
	NAT --> MKT[Marketing Department]
	NAT --> IT[IT Department]
	NAT --> DB[Database Department]
	NAT --> COL[Collaboration Department]

	IT --> MON[Monitoring Server<br/>Prometheus + Grafana + Node Exporter]
	IT --> FW[Firewall Policy]
	FW --> MON
Loading

My Contribution

I contributed to both the networking and monitoring parts of the project.

  • Built the IT department segment as part of the overall enterprise topology
  • Worked on subnetting, addressing, and department-level network setup
  • Contributed to backbone integration and inter-department connectivity
  • Deployed Linux virtual machines inside the GNS3 environment
  • Installed and configured Prometheus, Grafana, and Node Exporter
  • Applied firewall rules so only the IT department could access the monitoring dashboards
  • Helped verify connectivity, routing behavior, monitoring visibility, and access control

Technical Scope

Network Architecture

  • Multiple departments connected through a backbone topology
  • Point-to-point links between routers
  • OSPF for route propagation and convergence
  • NAT for outbound Internet access
  • Static addressing for critical servers
  • Department-level segmentation to isolate services and clients

Services and Operations

  • Monitoring platform hosted by the IT department
  • Prometheus for metrics collection
  • Grafana for dashboards and visualization
  • Node Exporter for host metrics
  • Linux-based virtual machines integrated into the lab

Security Controls

  • Separation between departmental LANs and the backbone
  • Restricted access to sensitive operational services
  • Firewall policies protecting Prometheus and Grafana
  • Access to monitoring dashboards limited to the IT department

Documentation

Technologies Used

GNS3, Linux, OSPF, DHCP, DNS, NAT, Prometheus, Grafana, Node Exporter, firewall configuration

Screenshots

Backbone Topology

Backbone topology

IT Department Topology

IT department topology

OSPF Routing Evidence

OSPF neighbors

OSPF routes

Monitoring Platform

Grafana dashboard

Prometheus connection proof

Firewall and Access Control

IT department firewall

What This Project Demonstrates

  • Network design and segmentation in a realistic enterprise-style environment
  • Practical routing, Internet access control, and service exposure decisions
  • Linux administration and monitoring stack deployment
  • Coordination inside a team project while owning a full department-level scope

About

Enterprise network and monitoring lab in GNS3 with OSPF, NAT, Linux services, Prometheus, and Grafana.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors