This project demonstrates the design, implementation, security hardening, monitoring, and automation of an enterprise-style Linux network using local virtualization (VirtualBox).
The lab simulates a real-world internal network with controlled access, hardened hosts, centralized monitoring, and operational automation. It is designed to reflect the responsibilities of a Systems Engineer supporting secure infrastructure environments.
Internet
|
[ Host Machine ]
|
---------------------
| |
Bastion Host Internal Network (SSH Gateway) ----------------------- | | | Web Server Monitoring Future Services (Nginx) (Prom/Graf)
-
Bastion Host
- Single SSH entry point
- Hardened access
- Key-based authentication only
-
Web Server
- Internal-only access
- Nginx service
- Firewall-restricted
-
Monitoring Server
- Prometheus
- Grafana
- Node Exporter on all hosts
- VirtualBox
- Ubuntu Server LTS
- Bash
- UFW / iptables
- OpenSSH
- Nginx
- Prometheus
- Grafana
- Cron
- SSH hardening (no root login, key-only auth)
- Bastion-based access model
- Host-based firewall rules
- Least-privilege user management
- Logging and audit readiness
- Network segmentation
- Monitoring and alerting foundations
- 3 Ubuntu Server VMs
- 2 Network Adapters per VM:
- Adapter 1: NAT
- Adapter 2: Internal Network (
intnet)
| VM | Purpose | Example IP |
|---|---|---|
| bastion | SSH gateway | 192.168.56.10 |
| web | Web services | 192.168.56.20 |
| monitor | Monitoring | 192.168.56.30 |
- Create VMs in VirtualBox
- Assign static IPs
- Run base hardening scripts
- Configure firewall rules
- Deploy services
- Enable monitoring
- Validate access paths
All system configuration is automated using Bash scripts:
- Firewall deployment
- SSH hardening
- User provisioning
- Monitoring agent installation
- Backup and maintenance tasks
Scripts are idempotent and safe to re-run.
- SSH access allowed only through bastion
- Root login disabled
- Firewall denies unused ports
- Web server reachable internally
- Grafana dashboards display host metrics
- Logs generated and rotated
This project demonstrates:
- Enterprise Linux administration
- Secure network design
- Infrastructure hardening
- Monitoring and observability
- Operational automation
- Clear documentation
- Ansible playbooks
- Centralized logging (ELK)
- Cloud adaptation (AWS / Azure)
- Zero Trust segmentation
- MFA integration
Guerod McGirt
Systems Engineer | Linux | Networking | Security | Automation