These projects were done in the Advanced Network Security and Architectures course. The primary purpose was to study the principles and techniques for designing and managing secure network infrastructures in isolated environments using GNS3.
- Project 1: 18/20
- Project 2: 19/20
- Project 3: 20/20
- Network Attacks & Countermeasures
- Firewalls
- AAA
- IPSec & VPNs
- Networking of virtual containers
- Kubernetes & Docker Swarm
Report: Network Attacks & Mitigations
Pages: 1-41
Config File: Configurations inside the report in Annex
This report discusses some network vulnerabilities and countermeasures. It also explains the steps to reproduce such attacks, the steps to prevent them, and some theoretical concepts necessary for understanding them.
- CAM table overflow
- DHCP Spoofing
- ARP poisoning (MitM)
- Root Bridge spoofing (MitM)
- DNS spoofing
- RIP poisoning
- DNS spoofing using DHCP spoofing
Report: Firewalls
Pages: 41-68
Config File: Configurations inside the report in Annex
This project discusses Firewalls architectures and types. With further investigation regarding Firewalls in campus networks, ZBPF versus classical firewalls and their influence on DoS attacks.
- Classical firewalls versus Zone-Based Policy Firewalls
- Protecting a campus network using a ZBPF
- Defence against DoS attacks
Report: AAA
Pages: 68-82
Config File: Configurations inside the report in Annex
This project discusses AAA, which stands for Authentication, Authorization and Accounting (basically, it is a framework used to control who is permitted to use the network resources - authentication - what they are authorized to do - authorization - and capture the actions performed while accessing the network - accounting).
- AAA with TACACS+
- 802.1X Authentication
Report: IPSec & VPNs
Pages: 6-41
Config File: Configurations inside the report in Annex
This project discusses IPSec and VPNs, where it is analyzed different VPNs and their configurations.
- IPSec using ESP in tunnel mode
- IPSec with digital certificates and certificate authority
- IPSec with NAT traversal
- GRE over IPSec
- DMVPN Phase 3
- DMVPN over IPSec
Report: Networking of virtual containers
Pages: 41-56
Config File: Configurations inside the report in Annex
This project discusses the networking of virtual containers, covering Linux network namespaces, Docker, and Docker Swarm.
- Connecting network namespaces to external networks
- Macvlan networks with VLANs
- Linux VxLAN with multicast routing
- Docker Swarm without data encryption
- Docker Swarm with data encryption
Report: Kubernetes & Docker Swarm
Config File: Configurations inside the report in Annex
This project discusses Kubernetes and Kubernetes networking along with Docker technology, particularly comparing a service's deployment in swarm versus Kubernetes.
- Kubernetes Networking
- Kubernetes control plane
- Deploying a single pod
- Deploying a single pod through a YAML manifest
- Deploying a ReplicaSet
- Deploying a ClusterIP service
- Kubernetes DNS
- Deploying a NodePort service
- Docker Swarm
- Deploying a Service in Docker Swarm