Overview
Proper network configuration is critical for SOC effectiveness and security. This guide covers network topology, segmentation, firewall rules, and traffic mirroring configuration for the Enterprise SOC Architecture.Network Topology
Reference Architecture
The SOC architecture requires multiple network segments for security and operational efficiency:Network Segmentation Strategy
Network segmentation isolates SOC components, limits lateral movement, and protects sensitive security infrastructure.
| Segment | Purpose | Security Level | Components |
|---|---|---|---|
| Production Network | Normal business operations | Standard | Endpoints, servers, applications |
| IDS Monitoring | Passive traffic analysis | High (read-only) | Snort, Suricata sensors |
| SOC Management | Security platform core | Critical | Wazuh, Elasticsearch, TheHive, monitoring |
| SOC Admin/Analyst | Dashboard and case access | High | Analyst workstations, web interfaces |
| Honeypot Network (future) | Deception infrastructure | Isolated | Honeypot VMs, trap services |
VLAN Configuration
Recommended VLAN Design
VLAN 10: Production Network
VLAN 10: Production Network
Purpose: Monitored endpoints and production systems
- Subnet: 10.0.10.0/24 (example)
- Default Gateway: Firewall interface
- DHCP: Enabled for endpoints
- Access: Standard firewall rules
- Traffic Mirroring: Enabled to VLAN 20
This is your existing production network. The SOC monitors traffic from this segment but does not interfere with normal operations.
VLAN 20: IDS/IPS Monitoring
VLAN 20: IDS/IPS Monitoring
Purpose: Network intrusion detection sensors
- Subnet: 10.0.20.0/24 (example)
- Access Mode: Monitor/promiscuous mode
- Gateway: Management interface only
- Outbound: Allowed only to SOC Management VLAN
- Inbound: No direct access (mirrored traffic only)
- Configure switch port mirroring (SPAN) or network TAP
- IDS sensors receive copy of production traffic
- Sensors cannot send traffic back to production
VLAN 30: SOC Management
VLAN 30: SOC Management
Purpose: Core security platform components
- Subnet: 10.0.30.0/24 (example)
- Access: Highly restricted, firewall enforced
- Allowed Inbound:
- Log data from production endpoints (Wazuh agents: 1514/tcp, 1515/tcp)
- Alerts from IDS sensors (varies by configuration)
- Monitoring data from Zabbix/Prometheus agents
- Management access from SOC Admin VLAN only
- Allowed Outbound:
- Internet access for threat intelligence feeds (restricted)
- Communication between SOC components
VLAN 40: SOC Analyst/Admin
VLAN 40: SOC Analyst/Admin
Purpose: Security analyst workstations and dashboard access
- Subnet: 10.0.40.0/24 (example)
- Access: Authenticated users only (802.1X recommended)
- Allowed Outbound:
- HTTPS to Wazuh dashboards (443/tcp)
- HTTPS to TheHive interface (9000/tcp)
- SSH to management interfaces (22/tcp, restricted by IP)
- HTTPS to Zabbix/Prometheus dashboards
- Allowed Inbound: None (workstations initiate connections)
Consider implementing multi-factor authentication (MFA) for all access to this segment.
VLAN 50: Honeypot Network (Future)
VLAN 50: Honeypot Network (Future)
Purpose: Deception infrastructure for threat research
- Subnet: 192.168.50.0/24 (isolated range)
- Isolation: Completely isolated from production
- Routing: No direct route to production VLANs
- Monitoring: All traffic logged and forwarded to SOC
- Status: Long-term planning phase
Firewall Rules and Port Requirements
Inter-Component Communication Matrix
The following table defines required firewall rules between SOC components. Implement these as allowlist rules (deny all, permit specific).
| Source | Destination | Port/Protocol | Purpose |
|---|---|---|---|
| Production Endpoints | Wazuh Manager (VLAN 30) | 1514/tcp, 1515/tcp | Agent enrollment and event reporting |
| Production Endpoints | Logstash (VLAN 30) | 5044/tcp | Beats log forwarding |
| Production Servers | Zabbix Server (VLAN 30) | 10051/tcp | Monitoring data |
| Production Servers | Prometheus (VLAN 30) | Various | Metrics exporters |
| IDS Sensors (VLAN 20) | Logstash (VLAN 30) | 5044/tcp | Alert forwarding |
| IDS Sensors (VLAN 20) | Wazuh Manager (VLAN 30) | 1514/tcp | Alert integration |
| Logstash (VLAN 30) | Elasticsearch (VLAN 30) | 9200/tcp | Data indexing |
| Wazuh Manager (VLAN 30) | Elasticsearch (VLAN 30) | 9200/tcp | Event storage |
| TheHive (VLAN 30) | Elasticsearch (VLAN 30) | 9200/tcp | Case data storage |
| Cortex (VLAN 30) | TheHive (VLAN 30) | 9000/tcp | SOAR integration |
| Elasticsearch Nodes (VLAN 30) | Other Elasticsearch Nodes | 9300/tcp | Cluster communication |
| SOC Analysts (VLAN 40) | Wazuh Dashboard (VLAN 30) | 443/tcp | HTTPS web interface |
| SOC Analysts (VLAN 40) | TheHive (VLAN 30) | 9000/tcp | Case management UI |
| SOC Analysts (VLAN 40) | Zabbix Frontend (VLAN 30) | 443/tcp | Infrastructure monitoring |
| SOC Analysts (VLAN 40) | Prometheus/Grafana (VLAN 30) | 3000/tcp, 9090/tcp | Metrics dashboards |
| SOC Management (VLAN 30) | Internet | 443/tcp | Threat intel feeds, updates |
| SOC Admins (VLAN 40) | All SOC Components (VLAN 30) | 22/tcp | SSH management access |
Firewall Rule Templates
Port Reference by Component
Wazuh
Wazuh
- 1514/tcp: Agent event reporting (secure)
- 1515/tcp: Agent enrollment
- 443/tcp: Dashboard web interface (HTTPS)
- 55000/tcp: Wazuh API (restrict to authorized systems)
Elasticsearch
Elasticsearch
- 9200/tcp: HTTP API (REST interface)
- 9300/tcp: Transport protocol (cluster communication)
Logstash/Fluentd
Logstash/Fluentd
- 5044/tcp: Beats input (Filebeat, Metricbeat)
- 5140/tcp: Syslog input (optional)
- 9600/tcp: Monitoring API
TheHive + Cortex
TheHive + Cortex
- 9000/tcp: TheHive web interface
- 9001/tcp: Cortex API
- 9999/tcp: Cassandra (if used as backend)
Monitoring Systems
Monitoring Systems
- 10051/tcp: Zabbix trapper
- 10050/tcp: Zabbix agent (on monitored hosts)
- 9090/tcp: Prometheus server
- 3000/tcp: Grafana dashboard (often paired with Prometheus)
IDS/IPS
IDS/IPS
- No inbound ports (passive monitoring)
- Outbound: Varies based on log forwarding configuration
Traffic Mirroring Configuration
Overview
IDS/IPS systems require a copy of network traffic to analyze. This is achieved through port mirroring (SPAN) or physical network TAPs.
Port Mirroring (SPAN) Configuration
Identify Traffic to Monitor
Determine which network segments and switch ports should be monitored:
- Uplink ports (internet gateway)
- Critical server VLANs
- Endpoint access layer switches
- Inter-datacenter links (if applicable)
Configure Mirror Session
Create a SPAN/mirror session on your switch directing traffic to IDS sensor port.
Switch Configuration Examples
Network TAP Alternative
Physical Network TAPs provide advantages over SPAN:
- No packet loss (dedicated hardware)
- No impact on switch performance
- Guaranteed full-duplex traffic capture
- Better for high-throughput networks (>1 Gbps)
- Requires physical installation in network path
- Additional hardware cost
- Recommended for critical monitoring points
Traffic Filtering and Optimization
Network Performance Considerations
Bandwidth Planning
| Scenario | Recommended Action |
|---|---|
| Network throughput < 1 Gbps | Single IDS instance with SPAN |
| Network throughput 1-5 Gbps | Multiple IDS instances or high-performance sensor |
| Network throughput > 5 Gbps | Dedicated IDS appliances, load balancing, or selective filtering |
| Multi-site deployment | RSPAN/ERSPAN or distributed sensors with centralized management |
Latency Sensitivity
SOC components tolerance for network latency:
- High tolerance (greater than 100ms OK): Log aggregation, long-term storage
- Medium tolerance (10-100ms): Real-time dashboards, agent reporting
- Low tolerance (less than 10ms): Elasticsearch cluster communication, high-frequency metrics
Security Best Practices
Implement Zero Trust
- Default deny all traffic between VLANs
- Explicitly allow only required connections
- Use firewall rules for all inter-segment communication
Encrypt Management Traffic
- Use TLS/SSL for all web interfaces
- Implement SSH for command-line access (disable Telnet)
- Consider VPN for remote SOC analyst access
Separate Management Interfaces
- Use dedicated NICs for management on critical systems
- Place management interfaces on separate VLAN (out-of-band management)
- Restrict management access by source IP
Monitor the Monitors
- Enable logging on firewall rules protecting SOC infrastructure
- Alert on unauthorized access attempts to SOC Management VLAN
- Implement integrity monitoring on SOC systems themselves
Future Network Enhancements
Long-Term Planning Components
OPNsense Firewall Integration
OPNsense Firewall Integration
Status: Long-term planBenefits:
- Centralized firewall management for all SOC VLANs
- Advanced traffic shaping and QoS
- Integrated IDS/IPS (Suricata) at firewall level
- Web filtering and application control
- Deploy as gateway between major network segments
- Route all inter-VLAN traffic through OPNsense
- Implement high availability (HA) pair for redundancy
Tailscale VPN for Remote Access
Tailscale VPN for Remote Access
Status: Long-term planUse Case:
- Secure remote access for SOC analysts
- Mesh VPN for distributed SOC components
- Zero-trust network access (ZTNA)
- Deploy Tailscale subnet router in SOC Admin VLAN
- Advertise SOC Management subnet (10.0.30.0/24) to mesh
- Implement ACLs in Tailscale admin console
- MFA required for all VPN connections
Honeypot Network Isolation
Honeypot Network Isolation
Status: Long-term planArchitecture:
- Completely isolated VLAN (no routing to production)
- One-way traffic flow: honeypot → SOC logging only
- Virtualized on Proxmox with network isolation enforced at hypervisor
- External IP addresses or NAT to appear as separate infrastructure
Network Topology Validation
Before proceeding with deployment:- VLANs created and configured on all switches
- Firewall rules documented and tested
- Port mirroring/SPAN verified and traffic confirmed at IDS sensor
- Inter-component connectivity tested (can each component reach required destinations?)
- Management access restricted and tested
- Network bandwidth sufficient for anticipated log volume
- Network diagrams documented and approved
- Emergency isolation procedures documented
Next Steps
With network infrastructure configured:- Proceed to Component Installation
- Review Configuration requirements for network-related settings
- Test connectivity between components before deploying to production
Network configuration is foundational to SOC operations. Take time to thoroughly test and document before proceeding with component deployment.
