Skip to main content
This project is currently in the design phase. The network architecture described here is conceptual and should be adapted to your specific environment during implementation.

Overview

Proper network configuration is critical for SOC effectiveness and security. This guide covers network topology, segmentation, firewall rules, and traffic mirroring configuration for the Enterprise SOC Architecture.

Network Topology

Reference Architecture

The SOC architecture requires multiple network segments for security and operational efficiency:
┌─────────────────────────────────────────────────────────────┐
│                    Production Network                        │
│                   (Monitored Endpoints)                      │
└────────────────┬────────────────────────────────────────────┘

                 │ Traffic Mirroring (SPAN/TAP)

┌────────────────▼────────────────────────────────────────────┐
│              IDS/IPS Monitoring Segment                      │
│           (Snort/Suricata - Read-only)                      │
└────────────────┬────────────────────────────────────────────┘

                 │ Alert Forwarding

┌────────────────▼────────────────────────────────────────────┐
│               SOC Management Network                         │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐  ┌──────────┐   │
│  │ Wazuh    │  │ Elastic  │  │ Logstash │  │ TheHive  │   │
│  │ Manager  │  │ Search   │  │ Pipeline │  │ + Cortex │   │
│  └──────────┘  └──────────┘  └──────────┘  └──────────┘   │
│  ┌──────────┐  ┌──────────┐                                │
│  │ Zabbix   │  │Prometheus│                                │
│  └──────────┘  └──────────┘                                │
└────────────────┬────────────────────────────────────────────┘

                 │ Restricted Access

┌────────────────▼────────────────────────────────────────────┐
│            SOC Analyst Workstation Network                   │
│              (Dashboard Access Only)                         │
└─────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────┐
│          Future: Honeypot Deception Network                  │
│              (Isolated - Long-term Plan)                     │
└─────────────────────────────────────────────────────────────┘

Network Segmentation Strategy

Network segmentation isolates SOC components, limits lateral movement, and protects sensitive security infrastructure.
SegmentPurposeSecurity LevelComponents
Production NetworkNormal business operationsStandardEndpoints, servers, applications
IDS MonitoringPassive traffic analysisHigh (read-only)Snort, Suricata sensors
SOC ManagementSecurity platform coreCriticalWazuh, Elasticsearch, TheHive, monitoring
SOC Admin/AnalystDashboard and case accessHighAnalyst workstations, web interfaces
Honeypot Network (future)Deception infrastructureIsolatedHoneypot VMs, trap services

VLAN Configuration

Purpose: Monitored endpoints and production systems
  • Subnet: 10.0.10.0/24 (example)
  • Default Gateway: Firewall interface
  • DHCP: Enabled for endpoints
  • Access: Standard firewall rules
  • Traffic Mirroring: Enabled to VLAN 20
This is your existing production network. The SOC monitors traffic from this segment but does not interfere with normal operations.
Purpose: Network intrusion detection sensors
  • Subnet: 10.0.20.0/24 (example)
  • Access Mode: Monitor/promiscuous mode
  • Gateway: Management interface only
  • Outbound: Allowed only to SOC Management VLAN
  • Inbound: No direct access (mirrored traffic only)
Special Configuration:
  • Configure switch port mirroring (SPAN) or network TAP
  • IDS sensors receive copy of production traffic
  • Sensors cannot send traffic back to production
Purpose: Core security platform components
  • Subnet: 10.0.30.0/24 (example)
  • Access: Highly restricted, firewall enforced
  • Allowed Inbound:
    • Log data from production endpoints (Wazuh agents: 1514/tcp, 1515/tcp)
    • Alerts from IDS sensors (varies by configuration)
    • Monitoring data from Zabbix/Prometheus agents
    • Management access from SOC Admin VLAN only
  • Allowed Outbound:
    • Internet access for threat intelligence feeds (restricted)
    • Communication between SOC components
This VLAN contains the most critical security infrastructure. Implement strict access controls and audit all connections.
Purpose: Security analyst workstations and dashboard access
  • Subnet: 10.0.40.0/24 (example)
  • Access: Authenticated users only (802.1X recommended)
  • Allowed Outbound:
    • HTTPS to Wazuh dashboards (443/tcp)
    • HTTPS to TheHive interface (9000/tcp)
    • SSH to management interfaces (22/tcp, restricted by IP)
    • HTTPS to Zabbix/Prometheus dashboards
  • Allowed Inbound: None (workstations initiate connections)
Consider implementing multi-factor authentication (MFA) for all access to this segment.
Purpose: Deception infrastructure for threat research
  • Subnet: 192.168.50.0/24 (isolated range)
  • Isolation: Completely isolated from production
  • Routing: No direct route to production VLANs
  • Monitoring: All traffic logged and forwarded to SOC
  • Status: Long-term planning phase
Honeypot networks must be completely isolated from production. All traffic should be logged for analysis but never allowed to reach production systems.

Firewall Rules and Port Requirements

Inter-Component Communication Matrix

The following table defines required firewall rules between SOC components. Implement these as allowlist rules (deny all, permit specific).
SourceDestinationPort/ProtocolPurpose
Production EndpointsWazuh Manager (VLAN 30)1514/tcp, 1515/tcpAgent enrollment and event reporting
Production EndpointsLogstash (VLAN 30)5044/tcpBeats log forwarding
Production ServersZabbix Server (VLAN 30)10051/tcpMonitoring data
Production ServersPrometheus (VLAN 30)VariousMetrics exporters
IDS Sensors (VLAN 20)Logstash (VLAN 30)5044/tcpAlert forwarding
IDS Sensors (VLAN 20)Wazuh Manager (VLAN 30)1514/tcpAlert integration
Logstash (VLAN 30)Elasticsearch (VLAN 30)9200/tcpData indexing
Wazuh Manager (VLAN 30)Elasticsearch (VLAN 30)9200/tcpEvent storage
TheHive (VLAN 30)Elasticsearch (VLAN 30)9200/tcpCase data storage
Cortex (VLAN 30)TheHive (VLAN 30)9000/tcpSOAR integration
Elasticsearch Nodes (VLAN 30)Other Elasticsearch Nodes9300/tcpCluster communication
SOC Analysts (VLAN 40)Wazuh Dashboard (VLAN 30)443/tcpHTTPS web interface
SOC Analysts (VLAN 40)TheHive (VLAN 30)9000/tcpCase management UI
SOC Analysts (VLAN 40)Zabbix Frontend (VLAN 30)443/tcpInfrastructure monitoring
SOC Analysts (VLAN 40)Prometheus/Grafana (VLAN 30)3000/tcp, 9090/tcpMetrics dashboards
SOC Management (VLAN 30)Internet443/tcpThreat intel feeds, updates
SOC Admins (VLAN 40)All SOC Components (VLAN 30)22/tcpSSH management access

Firewall Rule Templates

# Allow Wazuh agent connections from production
iptables -A INPUT -s 10.0.10.0/24 -d 10.0.30.10 -p tcp --dport 1514 -j ACCEPT
iptables -A INPUT -s 10.0.10.0/24 -d 10.0.30.10 -p tcp --dport 1515 -j ACCEPT

# Allow IDS sensors to forward to Logstash
iptables -A FORWARD -s 10.0.20.0/24 -d 10.0.30.20 -p tcp --dport 5044 -j ACCEPT

# Allow SOC analysts to access Wazuh dashboard
iptables -A FORWARD -s 10.0.40.0/24 -d 10.0.30.10 -p tcp --dport 443 -j ACCEPT

# Allow Elasticsearch cluster communication
iptables -A INPUT -s 10.0.30.0/24 -d 10.0.30.0/24 -p tcp --dport 9300 -j ACCEPT

# Default deny
iptables -A INPUT -j DROP
iptables -A FORWARD -j DROP

Port Reference by Component

  • 1514/tcp: Agent event reporting (secure)
  • 1515/tcp: Agent enrollment
  • 443/tcp: Dashboard web interface (HTTPS)
  • 55000/tcp: Wazuh API (restrict to authorized systems)
  • 9200/tcp: HTTP API (REST interface)
  • 9300/tcp: Transport protocol (cluster communication)
Never expose Elasticsearch port 9200 directly to the internet. Use reverse proxy with authentication.
  • 5044/tcp: Beats input (Filebeat, Metricbeat)
  • 5140/tcp: Syslog input (optional)
  • 9600/tcp: Monitoring API
  • 9000/tcp: TheHive web interface
  • 9001/tcp: Cortex API
  • 9999/tcp: Cassandra (if used as backend)
  • 10051/tcp: Zabbix trapper
  • 10050/tcp: Zabbix agent (on monitored hosts)
  • 9090/tcp: Prometheus server
  • 3000/tcp: Grafana dashboard (often paired with Prometheus)
  • No inbound ports (passive monitoring)
  • Outbound: Varies based on log forwarding configuration

Traffic Mirroring Configuration

Overview

IDS/IPS systems require a copy of network traffic to analyze. This is achieved through port mirroring (SPAN) or physical network TAPs.

Port Mirroring (SPAN) Configuration

1

Identify Traffic to Monitor

Determine which network segments and switch ports should be monitored:
  • Uplink ports (internet gateway)
  • Critical server VLANs
  • Endpoint access layer switches
  • Inter-datacenter links (if applicable)
2

Configure Mirror Session

Create a SPAN/mirror session on your switch directing traffic to IDS sensor port.
3

Validate Traffic Flow

Verify the IDS sensor receives mirrored traffic without packet loss.
4

Optimize for Scale

For high-traffic environments, consider RSPAN (Remote SPAN) or ERSPAN (Encapsulated Remote SPAN).

Switch Configuration Examples

! Local SPAN configuration
! Mirror traffic from VLAN 10 to monitoring port

monitor session 1 source vlan 10
monitor session 1 destination interface GigabitEthernet0/24

! Verify configuration
show monitor session 1

Network TAP Alternative

Physical Network TAPs provide advantages over SPAN:
  • No packet loss (dedicated hardware)
  • No impact on switch performance
  • Guaranteed full-duplex traffic capture
  • Better for high-throughput networks (>1 Gbps)
Considerations:
  • Requires physical installation in network path
  • Additional hardware cost
  • Recommended for critical monitoring points

Traffic Filtering and Optimization

In high-traffic environments, consider filtering mirrored traffic to reduce load on IDS:
  • Filter by VLAN (only monitor specific segments)
  • Filter by direction (ingress vs egress)
  • Use hardware ACLs to exclude non-essential traffic (e.g., legitimate internal backups)
  • Deploy multiple IDS sensors for load distribution

Network Performance Considerations

Bandwidth Planning

ScenarioRecommended Action
Network throughput < 1 GbpsSingle IDS instance with SPAN
Network throughput 1-5 GbpsMultiple IDS instances or high-performance sensor
Network throughput > 5 GbpsDedicated IDS appliances, load balancing, or selective filtering
Multi-site deploymentRSPAN/ERSPAN or distributed sensors with centralized management

Latency Sensitivity

SOC components tolerance for network latency:
  • High tolerance (greater than 100ms OK): Log aggregation, long-term storage
  • Medium tolerance (10-100ms): Real-time dashboards, agent reporting
  • Low tolerance (less than 10ms): Elasticsearch cluster communication, high-frequency metrics
Place latency-sensitive components on the same network segment or use high-speed interconnects.

Security Best Practices

1

Implement Zero Trust

  • Default deny all traffic between VLANs
  • Explicitly allow only required connections
  • Use firewall rules for all inter-segment communication
2

Encrypt Management Traffic

  • Use TLS/SSL for all web interfaces
  • Implement SSH for command-line access (disable Telnet)
  • Consider VPN for remote SOC analyst access
3

Separate Management Interfaces

  • Use dedicated NICs for management on critical systems
  • Place management interfaces on separate VLAN (out-of-band management)
  • Restrict management access by source IP
4

Monitor the Monitors

  • Enable logging on firewall rules protecting SOC infrastructure
  • Alert on unauthorized access attempts to SOC Management VLAN
  • Implement integrity monitoring on SOC systems themselves
5

Plan for Incident Response

  • Document network isolation procedures
  • Prepare firewall rules for emergency containment
  • Establish out-of-band communication for security team

Future Network Enhancements

Long-Term Planning Components

Status: Long-term planBenefits:
  • Centralized firewall management for all SOC VLANs
  • Advanced traffic shaping and QoS
  • Integrated IDS/IPS (Suricata) at firewall level
  • Web filtering and application control
Network Impact:
  • Deploy as gateway between major network segments
  • Route all inter-VLAN traffic through OPNsense
  • Implement high availability (HA) pair for redundancy
Status: Long-term planUse Case:
  • Secure remote access for SOC analysts
  • Mesh VPN for distributed SOC components
  • Zero-trust network access (ZTNA)
Network Configuration:
  • Deploy Tailscale subnet router in SOC Admin VLAN
  • Advertise SOC Management subnet (10.0.30.0/24) to mesh
  • Implement ACLs in Tailscale admin console
  • MFA required for all VPN connections
Status: Long-term planArchitecture:
  • Completely isolated VLAN (no routing to production)
  • One-way traffic flow: honeypot → SOC logging only
  • Virtualized on Proxmox with network isolation enforced at hypervisor
  • External IP addresses or NAT to appear as separate infrastructure
Honeypots attract attacks by design. Isolation is critical to prevent attackers from pivoting to production systems.

Network Topology Validation

Before proceeding with deployment:
  • VLANs created and configured on all switches
  • Firewall rules documented and tested
  • Port mirroring/SPAN verified and traffic confirmed at IDS sensor
  • Inter-component connectivity tested (can each component reach required destinations?)
  • Management access restricted and tested
  • Network bandwidth sufficient for anticipated log volume
  • Network diagrams documented and approved
  • Emergency isolation procedures documented

Next Steps

With network infrastructure configured:
  1. Proceed to Component Installation
  2. Review Configuration requirements for network-related settings
  3. Test connectivity between components before deploying to production
Network configuration is foundational to SOC operations. Take time to thoroughly test and document before proceeding with component deployment.

Build docs developers (and LLMs) love