This project showcases the design and deployment of a segmented network architecture using pfSense as the central firewall and routing solution. The setup includes two isolated LANs—LAN-11 and LAN-12 each configured with distinct IP ranges and gateway addresses, and a WAN interface for Internet access.
Using three virtual NICs, I emulated a real-world network environment:
LAN-11 (192.168.11.0/24) via Host-only Adapter 1
LAN-12 (192.168.12.0/24) via Host-only Adapter 2
WAN-1 via NAT Adapter 3 for external connectivity
The pfSense firewall was configured to manage traffic between these segments, enforce access control policies, and provide NAT services. This implementation demonstrates my ability to:
Architect secure multi-LAN environments
Configure firewall rules and routing policies
Simulate enterprise-grade network setups using virtualization
The project culminated in a functional, secure network topology ideal for testing, training, and small-scale enterprise use.
- Windows 10 (21H2)
- Virtual Box VM
- PF-Sense Router
Network Design:

IP Structure for the Network:

Creating Virtual Network for LAN-11 and LAN-12:

Creating a NAT Network for WAN-1:

Creating Virtual Ethernet Adapter for LAN-11 and LAN-12:

Setting up Virtual Network on VM:

Power on PF-Sense Router:

Default Router's Network Interface:

Reassigning the Interface on the Router:

Interface Reassign on the Router:

Interface Reassign on Router:

IP Address configured on Router:

Setup pfsense via LAN-11:

Login:

Login:

Login:

pfsense setup:

pfsense setup:

pfsense setup:

pfsense interface modification:

pfsense interface modification:
