Project Scope
Segmentation Model
Dual Juniper vSRX topology split into sensor, server, actuator, and transit segments with explicit zone and interface boundaries.
Network Services
Configured DHCP local-server and relay behavior, static routes, source NAT, and DNSMasq-backed name resolution inside the virtual lab.
Routing Validation
Proved reachability and path handling with ping, traceroute, routing tables, and Wireshark across up to five interconnected subnets.
Operations Workflow
Validated encrypted SSH sessions, password-free client and router access, SCP-driven key transfer, PuTTY login handling, and repeatable configuration archival on Junos.
Project Overview
This project brings several Juniper networking labs into one page focused on services, segmentation, routing, and operations.
The project page shows how the same VMware-based environment was extended from basic inter-subnet routing into DHCP, DNS, NAT, zone policies, OSPF, and secure administration workflows.
The visuals on this page come from the original lab work, so the implementation steps stay visible without rebuilding the whole setup from scratch.
Lab Scope
The lab environment centered on virtual Juniper vSRX routers, Linux clients, and carefully mapped VMware virtual networks.
Different assignments expanded the same core skill set from basic routed connectivity into service integration, policy control, and day-two operational handling.
Routing and Topology
- Built dual-router and three-router VMware topologies with dedicated LAN segments and transit links.
- Mapped Junos interfaces to VMware virtual adapters and aligned each router port with a specific subnet role.
- Configured interface addressing, client gateways, and inter-subnet routing across multi-LAN layouts.
Service Plane
- Configured DHCP local-server and relay behavior for different subnets and verified address delivery from client machines.
- Added DNSMasq on a Linux VM to provide internal DNS records for service resolution inside the lab.
- Configured source NAT and validated internet-bound traffic using packet capture and terminal testing.
Security and Operations
- Separated interfaces into security zones and applied traffic rules between sensor, server, actuator, and transit networks.
- Tested OSPF convergence and rerouting between three routers after link changes.
- Used SSH, SCP, PuTTY, and commit-triggered archival workflows for password-based and key-based administration tasks across Linux hosts and Junos routers.
What I Implemented
- Built dual-vSRX topologies with up to five connected subnets and checked end-to-end inter-LAN reachability.
- Configured DHCP service and DHCP relay workflows and verified address assignment with client-side IPv4 settings and Wireshark DORA captures.
- Applied static routes, NAT behavior, and external reachability tests to move beyond isolated lab-only communication.
- Created and tested security zones and policy rules to control which hosts could ping or fetch web content across segments.
- Configured OSPF on a three-router topology and validated rerouting behavior after changing an active path.
- Set up DNSMasq on a Linux VM and connected router and client configuration to internal name-resolution testing.
- Worked through SSH, SCP, and Junos administration tasks to make router access and configuration handling more repeatable.
- Validated encrypted SSH packet flow in Wireshark, configured password-free login from Linux and PuTTY clients, and prepared commit-based config archival toward an SSH server.
Segmentation and Policy Control
The strongest part of the archive was not any single routing command, but the progression from flat connectivity into segmented policy thinking.
The security-zones lab split interfaces into named trust boundaries and then validated which hosts could communicate, which hosts were blocked, and where web access remained intentionally available.
That turns the project from a basic addressing exercise into a stronger networking story about traffic intention, enforcement, and observable verification.
Routing, Services, and Validation
- Validated inter-subnet routing with direct ping and traceroute tests between remote LANs connected through different vSRX interfaces.
- Captured DHCP traffic in Wireshark to show Discover, Offer, Request, and Acknowledge behavior while clients obtained leases.
- Reviewed router routing tables and interface states to confirm expected reachability after addressing and route changes.
- Used DNSMasq setup and packet observation to verify that internal DNS requests resolved toward the intended VM-hosted service.
- Checked NAT and internet-bound ICMP behavior to confirm that lab clients could move beyond private-only communication where required.
- Verified OSPF rerouting behavior after disconnecting an active path so the remaining route could carry traffic automatically.
Operations Workflow
The later labs moved beyond pure connectivity and into repeatable administration. SSH user handling, password-free access patterns, SCP transfer, packet inspection, PuTTY-based login from Windows, and config archival tasks made the environment feel more like infrastructure administration than classroom-only routing practice.
That matters because the operational layer is where a lot of networking work becomes real: not just building reachability once, but accessing devices safely, moving keys and files predictably, and keeping configurations manageable after changes.
For portfolio purposes, this gives the project a better balance between topology design, service delivery, validation, secure access, and day-two operations.
Secure Access and Configuration Handling
- Inspected SSHv2 traffic in Wireshark to confirm the negotiated session path and show that payload data remained encrypted in transit.
- Configured password-free login between Linux hosts and validated cross-platform access by using PuTTY with a converted private key from the Windows side.
- Created a dedicated Junos super-user with SSH public-key authentication so router access could move away from password-only administration.
- Used SCP to move key material and test files between hosts and routers as part of the administration workflow.
- Configured Junos transfer-on-commit archival to send active configurations to an SSH server, turning routine changes into a repeatable backup step.
Key Learnings
- A network project is stronger when it shows not only the topology, but also the checks that prove addressing, policies, and services behave as expected.
- VMware-based labs become much more useful when the interface-to-subnet mapping is documented cleanly; otherwise router configs are harder to reason about and troubleshoot.
- Zone-based policy work is a strong bridge between classic routing exercises and infrastructure security thinking.
- Networking skill is easier to trust when routing and service configuration are backed by secure-access and configuration-management workflows, not just ping success.
- Separate lab exercises become much stronger portfolio material when they are organised into one systems-level project.