Network & Security Simulation with ACLs, NAT, FTP, DNS and Red Team testing (Cisco Packet Tracer)
View the Project on GitHub nedelcubianca/network-security-project
This project simulates a secure network architecture using Cisco Packet Tracer, focusing on access control, NAT configuration, and Red Team attack simulation.
To design and implement a realistic network scenario where:
Cisco Packet Tracer
Cisco IOS commands (CLI)
GitHub Pages for documentation
This network simulates a segmented infrastructure with enforced access control and isolated services.
PC0: ‘192.168.1.10’ (Normal user)
PC1: ‘192.168.1.11’ (Simulated attacker)
Server0: ‘192.168.1.100’ (DNS & FTP Server)
Switch0
Router0
Static IP addresses were manually assigned, and NAT was configured to provide external access to the internal web server.
Device - Interface - IP Address - Subnet Mask - Default Gateway
PC0 - 192.168.1.10 - 255.255.255.0 - 192.168.1.1
PC1 - 192.168.1.11 - 255.255.255.0 - 192.168.1.1
Server0 - 192.168.1.100 - 255.255.255.0 - 192.168.1.1
Server1 - 172.16.0.100 - 255.255.255.0 - 172.16.0.1
Router0 - GigabitEthernet0/0 - 192.168.1.1 - 255.255.255.0
Router0 - GigabitEthernet0/1 - 10.0.0.1 - 255.255.255.252
Router1 - GigabitEthernet0/1 - 10.0.0.2 - 255.255.255.252
Router1 - GigabitEthernet0/0 - 172.16.0.1 - 255.255.255.0
Example for PC0:
IP Address: 192.168.1.10
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
interface Gig0/1
ip address 10.0.0.1 255.255.255.252
no shutdown
interface Gig0/1
ip address 10.0.0.2 255.255.255.252
no shutdown
Objective: We access Server1 (172.16.0.100) from LAN 192.168.1.0/24 using the “public” address 203.0.113.1
Router1(config)# interface Gig0/1
Router1(config-if)# ip address 172.16.0.1 255.255.255.0
Router1(config-if)# ip nat inside
Router1(config-if)# no shutdown
Router1(config)# interface Gig0/0
Router1(config-if)# ip address 10.0.0.2 255.255.255.252 //-> the interface to Router0
Router1(config-if)# ip nat outside
Router1(config-if)# no shutdown
Router1(config)# ip nat inside source static 172.16.0.100 203.0.113.1 //-> the interface to Server1
We set a static route from Lan 192.168.1.0/24 to the public address 203.0.113.1 of the Server1 from Lan 172.16.0.0/24. Router0(config)# ip route 203.0.113.0 255.255.255.0 10.0.0.2
Accesing ‘http://web1’ from PC0:
Also, we can successfully access ‘http://203.0.113.1’ and ‘https://203.0.113.1’.
Note: If we intend to configure an additional public IP address to be reachable by the 192.168.1.0/24 internal network, a separate and properly configured server is required. A single server cannot be assigned multiple distinct NAT public addresses for the same internal network segment.
Access Control Lists (ACLs) are used to restrict traffic from the attacker device (PC1) to the internal web server (Server1) using both HTTP (port 80) and HTTPS (port 443). All other traffic remains permitted.
Deny PC1 (192.168.1.11) from accessing Server1 (203.0.113.1) via ports 80 and 443
Allow all other traffic
Router0(config)# access-list 100 deny tcp 192.168.1.11 0.0.0.0 203.0.113.1 0.0.0.0 eq 80 log
Router0(config)# access-list 100 deny tcp host 192.168.1.11 host 203.0.113.1 eq 443
Router0(config)# access-list 100 permit ip any any
Router0(config)# interface GigabitEthernet0/0
Router0(config-if)# ip access-group 100 in
Router0(config-if)# exit
This scenario simulates an attacker attempting to connect to an exposed FTP server using weak credentials.
IP Address: ‘192.168.1.100’
Service: FTP
Status: ON
username1 : ‘admin’ password1 : ‘adminpass’ permissions1 : ‘read, write, delete, rename, list’
username2 : ‘guest’ password2 : ‘pass123’ permissions2 : ‘read’
Open Command Prompt on PC0 and run: ftp 192.168.1.100
Enter:
Username: admin
Password: adminpass
Testing the permissions in the image below:
Open Command Prompt on PC1 and run: ftp 192.168.1.100
Using weak credentials:
Username: guest
Password: pass123
This project shows how insecure services, weak credentials, and poor segmentation can expose networks to attack, even in simulated environments.
Network Design | Segmented LANs with routers, switches, PCs, and servers |
IP Addressing | Manual assignment of IPs across multiple subnets |
NAT Configuration | Allowed internal devices to access external services via translation |
Access Control | ACLs were applied to limit web access to certain devices |
Red Team Testing | Simulated brute-force attack on an FTP server with limited permissions |
FTP is inherently insecure
Using it without encryption or strong authentication poses major risks.
Weak credentials are dangerous
Even limited guest access can be exploited during recon and lateral movement.
ACLs provide essential control
Properly configured access control lists can block or allow specific traffic, enforcing policy boundaries.
Least Privilege Principle matters
Granting users only the permissions they need reduces the impact of potential breaches.
Simulation tools are valuable
Packet Tracer enables realistic testing of network behaviors and security controls in a controlled environment.
This project mimics real-world Red Team operations and provides a foundation for:
You can download and open the full network simulation in Cisco Packet Tracer:
Nedelcu Bianca-Nicoleta
Systems Engineering Student
Project: Network Design & Red Team Simulation – Cisco Packet Tracer
“To secure the future, you have to keep hacking your limits.”