FR
Academic Project - R&T Degree

IS Security & Monitoring

HA Firewall Cluster & Wazuh SIEM

Design of a partitioned architecture (6 zones), secured by a redundant firewall cluster (PfSense/OPNsense) and proactively monitored (Splunk, Wazuh, SNMP).

πŸ›‘οΈ Defense Strategy (Risk Analysis)

Risk analysis led to a Zero Trust architecture. Every flow is inspected, and critical assets are isolated by watertight security zones.

Threat Lateral Movement
Response Strict Segmentation
Detection SIEM + EDR

Technologies

PfSense OPNsense Wazuh SNMP v3

High Security Architecture (6 Zones)

VLAN Segmentation

Topology centered around a filtering network core, isolating public services (DMZ) from sensitive data (LAN) and management (SIEM).

Network Architecture Schema PNETLab
HA Core (VLAN 10) PfSense + OPNsense Cluster
DMZ (VLAN 30) Web, Mail, DNS
Monitoring (VLAN 60) Splunk, Wazuh, SNMP
LAN (VLAN 50/70) Users & AD

πŸ”₯ Firewall Cluster Configuration

Implementation of High Availability (HA) between PfSense and OPNsense to ensure service continuity.

βš™οΈ
Interfaces & VLANs
Configuration of LAN, WAN interfaces, and a dedicated SYNC interface (10.0.0.x) for replication traffic.
πŸ”„
CARP Protocol & VIP
Creation of Virtual IPs (VIP) for the gateway. Automatic Master/Backup failover without connectivity loss.
πŸ’Ύ
Pfsync & Opnsync
Real-time synchronization of configuration (rules, aliases) and state tables (TCP sessions) between nodes.
🌐
Manual Outbound NAT
Forcing outbound IP on the WAN VIP to ensure cluster transparency towards the Internet.

Active Monitoring

Multi-level approach for total visibility.

πŸ“Š
Splunk SIEM Log Centralization Syslog Analysis (UDP 514)
πŸ•΅οΈ
Zabbix SNMP Server Infrastructure Monitoring Metrics & Alerting
πŸ“‘
SNMP Server Network Monitoring Arista Switches Status

πŸ’₯ Attack Scenarios & Detection

Validation of robustness via intrusion tests (Red Teaming) from the "Sandbox".

  • πŸ”΄ Reconnaissance: Nmap scan detected by firewall IDS rules and escalated to Wazuh.
  • πŸ”΄ DDoS (Syn Flood): Saturation attempt absorbed by the cluster and alerted via Splunk.
  • πŸ”΄ Intrusion: Attack on the Honeypot blocked and traced for analysis.
😈 Attacker (Kali)
Nmap -sS -p- 192.168.30.10
⬇️
πŸ›‘οΈ Firewall Cluster
Log Block + Capture Payload
⬇️
🚨 SOC (Splunk/Wazuh)
CRITICAL ALERT: Scan detected
πŸ€–
Nolann AI Online