The Lab

The Lab is a testing ground for networking research and discussion, designed to enable experimentation of network concepts in a realistic working environment.

Lesson 3.5: Troubleshooting VPN Connections

Systematic VPN troubleshooting with diagnostic commands for IPsec, WireGuard, and L2TP. Solve six common problems: tunnel establishment failures, handshake issues, connectivity problems, random disconnects, client connection failures, and slow performance with decision trees.

Lesson 3.4: Remote User VPN (Road Warrior) [Preview]

Provide secure remote access with WireGuard (fast, requires client) or L2TP/IPsec (built-in OS support). Create IP pools, configure authentication, set up clients for Windows/Mac/iOS/Android, manage user access, and control network permissions with firewall rules.

Lesson 3.3: Site-to-Site VPN (WireGuard)

Modern alternative to IPsec using public/private key pairs. Create WireGuard interfaces, generate and exchange keys, configure peers with allowed addresses, and set up routing. Faster setup (5-8 min vs 15-20 for IPsec) with fewer settings and simpler troubleshooting.

Lesson 3.2: Site-to-Site VPN (IPsec)

Connect two offices with IPsec VPN. Step-by-step configuration covering two-phase negotiation, peer setup, pre-shared keys, proposals, and policies. Includes required firewall rules, NAT considerations, testing procedures, and troubleshooting decision trees for common issues.

Lesson 3.1: VPN Options Explained

Compare VPN protocols: WireGuard (modern, fast, simple), IPsec (industry standard, interoperable), L2TP/IPsec (built-in OS support), and why to avoid PPTP. Includes decision matrix for choosing the right protocol based on your scenario and performance needs.

Module 3: Connect It — VPNs & Remote Access

Set up VPNs that work: site-to-site and remote user access. Learn WireGuard, IPsec, and L2TP protocols in 77 minutes. Choose the right protocol, configure connections, troubleshoot systematically, and deploy working VPNs in 30 minutes with copy-paste templates.

Lesson 2.5: Quick Win — Audit Your Firewall

Perform a 28-point firewall security audit covering input/forward chains, NAT configuration, rule ordering, and services. Includes scoring system, testing procedures, and documentation templates. Your Quick Win ensures professional-grade network protection and identifies security gaps.

Lesson 2.4: Blocking Common Attacks

Protect against port scans, brute force attacks, SYN floods, ping floods, and DNS amplification. Use address lists for dynamic blocking, connection limits for attack detection, and learn hardened firewall rule ordering that stops real-world network threats.

Lesson 2.3: Building Your First Custom Firewall Rule

Build, edit, and reorder firewall rules with confidence. Learn the anatomy of rules (where, what, do), add custom protections step-by-step, and test safely with Safe Mode. Includes practical examples like blocking IPs, allowing SSH selectively, and logging traffic.

Lesson 2.2: Understanding Default Firewall Rules

Learn what default firewall rules do and why they exist. Understand proper rule structure for input and forward chains, identify common configuration mistakes, and use the good-enough firewall checklist to verify your router is properly secured against basic threats.