Secure Multi-Site AD Environment with GPOs and Replication
This project simulates a real-world enterprise environment using virtual machines, Active Directory, and pfSense routing.
It demonstrates my ability to configure multi-site domain controllers, enforce Group Policy.
Technologies used: VMware Workstation Pro, Windows Server 2022, pfSense (firewall/router), Windows 11 Pro (domain-joined client).
Network structure using pfSense for routing and traffic analysis.Configured pfSense interfaces to segment LAN-HQ and LAN-BR using VMware LAN segments. WAN interface connected via NAT to provide internet routing to both networks.Configured pfSense GUI for traffic monitoring and management.Enabled DHCP on the BR subnet to dynamically assign IPs to clients on the branch network.Configured a static IP (192.168.10.10) on DC-HQ and installed the DNS Server role. Forward lookup zones for _msdcs.loyacono.local and loyacono.local were automatically created during AD installation, enabling name resolution for domain-joined devices.Configured a static IP (192.168.10.10) on DC-HQ and installed the DNS Server role. Forward lookup zones for _msdcs.loyacono.local and loyacono.local were automatically created during AD installation, enabling name resolution for domain-joined devices.Verified DC-BR as an additional domain controller under loyacono.local. Presence confirmed via Active Directory Sites and Services and Server Manager. Replication tested using repadmin, confirming successful directory synchronization with DC-HQ.Promoted DC-BR to replicate from DC-HQ, completing the multi-site domain controller setup with replication over pfSense.Created organizational units and joined a Windows 11 client to the domain. Verified replication and object visibility from both DCs.Created Group Policy Objects (GPOs) to enforce security settings and software installation on domain-joined clients.Tested workstation logon for domain-joined clients, verifying GPO application and user authentication.Successfully joined Windows 11 client to the loyacono.local domain via DC-BR. Verified user logon with GPO applied.