Entnet Project
Entnet Project
Group Project
Group Members:
2
1.0 Introduction
This project aims to provide hands-on experience in network building with limited
resources by creating a private cloud protected by a firewall and incorporating a Linux server
with DHCP and email services. The project for a group of five students is to configure a Linux
server, set up a firewall using UFW in the Linux server for security, and build up a private cloud
using Open Stack (open-source cloud computing infrastructure software). To enable authorized
users to access cloud resources and services, the final network will be connected to the OpenWrt
Switch.
2.0 Objective
The primary objective of this project is to design and implement a secure and functional
private cloud network with the following components:
1. Private Cloud: Implemented using open-source cloud computing infrastructure
software, configured to allow authorized user access.
2. Firewall: Installed on a separate machine to protect the private cloud and enforce basic
filtering policies.
3. Linux Server: Configured to provide DHCP and Email services, installed either on a
dedicated machine or as a partition alongside another operating system.
3
3.0 Methodology
1. Openstack Prerequisites
a. A machine running Ubuntu (20.04 or later recommended).
b. Sudo privileges.
d. Initialize MicroStack with automatic configuration and set it as the control node:
sudo microstack init --auto --control
#This command initializes MicroStack with automatic configuration and sets up the current
machine as the control node.
4
g. List the available flavors in OpenStack:
microstack.openstack flavor list
#This command lists all available flavors in your OpenStack deployment.
i. Open a web browser and navigate to the Horizon dashboard URL provided in the
previous step. It typically looks like http://<your-machine-ip>/dashboard.
j. Use the admin username and password retrieved earlier to log in. The default
username is usually ‘admin’. Use the keystone password retrieved in h.
5
3. Openstack Installation Screenshots
6
Openstack Admin Dashboard
Openstack Configuration
7
4. Create new normal user
8
Openstack Project Dashboard
9
New Normal User Dashboard (10GB)
1. UFW Prerequisites
a. A machine running Ubuntu (20.04 or later recommended).
b. Sudo privileges.
2. Step-by-step UFW Installation
a. Update package lists to ensure we get the latest version of UFW and other packages
sudo apt update
#Update package lists
c. Enable UFW to start protecting your system. This will also make UFW start on boot.
sudo ufw enable
#Enable UFW
d. Allow SSH connections to ensure you don't lose remote access to your server.
sudo ufw allow 22/tcp
10
#Allow SSH connections
e. Allow HTTP traffic on port 80. This is for web servers serving unencrypted web pages.
sudo ufw allow 80/tcp
#Allow HTTP traffic
f. Allow HTTPS traffic on port 443. This is for web servers serving encrypted web
pages.
sudo ufw allow 443/tcp
#Allow HTTPS traffic
11
h. Check the status of UFW and list the rules to ensure everything is set up correctly.
sudo ufw status numbered
#List out the firewall rules
i. This step is typically not necessary right after setting the rules. Only after we
added/changed the rules.
sudo ufw reload
#Reload UFW (if necessary)
j. Analyze the packets using Wireshark to ensure the firewall runs correctly
sudo wireshark
#Capture packets using Wireshark
12
Firewall Rules Applied
13
After Firewall Rules Applied
14
3.3 Linux Server Installation
15
4. Configure the Server
a. Configure DHCP server:
i. During installation, choose "Internet Site" and set the system mail name
(e.g., example.com).
ii. Edit the Postfix configuration file:
sudo nano /etc/postfix/main.cf
iii. Ensure the following lines are configured (adjust domain as necessary):
myhostname = mail.example.com
mydomain = example.com
myorigin = /etc/mailname
inet_interfaces = all
16
3.4 Network Integration
a. Connect all components (private cloud, firewall, Linux server) into OpenWrt Switch.
b. Ensure seamless interaction and access for a normal user (fourth PC) to utilize the
network resources.
c. Test the network to confirm all components are functioning correctly and securely.
17
4.0 Results
The project resulted in a fully functional private cloud network with enhanced security measures
and essential services. Key outcomes include:
1. Successful Deployment of Private Cloud :
- Installed and configured open-source cloud computing software on a designated machine.
- Established network configurations to enable user access and resource management.
18
5.0 Appendices
Cloud Server
19
20
Firewall
21
Linux Integration
SERVER DNS
22
Cloud IP Address
23
24
25
26