Enterprise infrastructure project built in GNS3 for a fictional company, TechSolutions SARL. The environment simulates a multi-department network with segmented LANs, a routed backbone, centralized Internet access, and an IT-operated monitoring platform.
This was a 5-person university team project. Each member handled a major part of the infrastructure. I was responsible for the IT department and also contributed to the broader networking side of the platform.
The final system included:
- Department-based segmentation
- Backbone connectivity between departments
- Dynamic routing with OSPF
- Centralized NAT for Internet access
- Linux-based service deployment in GNS3
- Monitoring with Prometheus, Grafana, and Node Exporter
- Firewall restrictions limiting dashboard access to the IT department
- Built a segmented multi-department enterprise lab in GNS3
- Contributed to subnetting, routing, and backbone integration
- Deployed a Linux-based monitoring stack for infrastructure visibility
- Restricted access to operational dashboards through firewall policy
flowchart LR
Internet[Internet] --> NAT[Backbone Router<br/>NAT + OSPF]
NAT --> MKT[Marketing Department]
NAT --> IT[IT Department]
NAT --> DB[Database Department]
NAT --> COL[Collaboration Department]
IT --> MON[Monitoring Server<br/>Prometheus + Grafana + Node Exporter]
IT --> FW[Firewall Policy]
FW --> MON
I contributed to both the networking and monitoring parts of the project.
- Built the IT department segment as part of the overall enterprise topology
- Worked on subnetting, addressing, and department-level network setup
- Contributed to backbone integration and inter-department connectivity
- Deployed Linux virtual machines inside the GNS3 environment
- Installed and configured Prometheus, Grafana, and Node Exporter
- Applied firewall rules so only the IT department could access the monitoring dashboards
- Helped verify connectivity, routing behavior, monitoring visibility, and access control
- Multiple departments connected through a backbone topology
- Point-to-point links between routers
- OSPF for route propagation and convergence
- NAT for outbound Internet access
- Static addressing for critical servers
- Department-level segmentation to isolate services and clients
- Monitoring platform hosted by the IT department
- Prometheus for metrics collection
- Grafana for dashboards and visualization
- Node Exporter for host metrics
- Linux-based virtual machines integrated into the lab
- Separation between departmental LANs and the backbone
- Restricted access to sensitive operational services
- Firewall policies protecting Prometheus and Grafana
- Access to monitoring dashboards limited to the IT department
- Full report: systeme-et-reseau-report.pdf
GNS3, Linux, OSPF, DHCP, DNS, NAT, Prometheus, Grafana, Node Exporter, firewall configuration
- Network design and segmentation in a realistic enterprise-style environment
- Practical routing, Internet access control, and service exposure decisions
- Linux administration and monitoring stack deployment
- Coordination inside a team project while owning a full department-level scope






