Designing Enterprise Network Solution

Objectives


This project focused on designing enterprise networks separating the network into WAN, DMZ, and LAN to enhance the security of the corporate network and manage the network more effectively. The implementation was done virtually using VMware vSphere.

Design Diagram

image
Logical Diagram

pfSense was deployed in the center of three different zones: Remote, HQ, and DMZ. Remote and HQ are two different internal zones and DMZ zone was created to act as a access vestibule between external and internal network.

Windows Services


To efficiently manage enterprise users with windows desktops, Windows Actie Directory service was deployed. Internal DNS server was deployed to increase reliability and create locacl zones.

DMZ DNS Server


Another DNS Server was deployed in the DMZ zone to provide external and internet DNS services to corporate users. BIND DNS server was deployed on a linux machine.

With the deployment of a DMZ DNS server, the internal DNS server configured on internal Windows Servers was configured to forward DNS request to the DMZ DNS Server.

Mail Server

DMZ

In order to accept emails from the public network, a PostFix mail relay server was deployed. In addition to that, SpammAssassin SPAM filter was also placed in the DMZ zone to filter out SPAM Emails.

Internal

In the internal network, Microsoft Exchange Server was deployed to function as an internal mail server.

Web Server

Apache

Two instances of apache web server were deployed. The reason for deploying two identical instances of the web server is to allow load-balancing web server traffic.

F5 Big-IP LTM

F5 Big-IP LTM was deployed to function as a load balancer.