AutoCon4 • Network Automation Lab

MODULAR NETWORK AUTOMATION LAB

Live GNS3 topologies running multi-tier architectures with reusable automation for enterprise, ISP, cloud, IoT, and industrial networks. WireGuard VPN provides secure remote access to the lab, and all traffic routes through a Caddy reverse proxy with automatic TLS termination.

Built by Graham Paasch – network automation engineer. This AutoCon4 out-of-band lab uses Infrahub as source-of-truth to drive GNS3, Ansible, Nornir, and Terraform end-to-end. It exists to prove he can take a messy real-world network, model it cleanly, and automate it with production-grade tooling.

What this lab proves about me

This is my end-to-end automation lab: I designed the topology, built the GNS3 fabric, modeled the network in Infrahub, and wired Ansible, Nornir, and Terraform around that data. It exists to prove I can take a messy real-world environment, define a source-of-truth, and ship production-ready automation and documentation.

Network Access

How to Connect

Access the lab through WireGuard VPN on UDP port 51820. Once connected, you'll be on the 10.66.6.0/24 network with direct access to Infrahub VM at 10.66.6.10. All public services route through Caddy reverse proxy with automatic Let's Encrypt certificates.

Lab Topology

What's Running

  • 41 network nodes across 4 zones (INT, WAN, FLOOR01, DATACENTER)
  • Distribution layer: Arista vEOS switches with redundant pairs
  • Access layer: Cisco IOSv switches and FortiGate firewalls
  • OOB network: Dedicated management switches per zone
  • Services: DHCP/DNS, jump hosts, VPN endpoints

Infrastructure

Backend Services

  • GNS3: v2.2.54 server on port 3080
  • Guacamole: Browser-based RDP/SSH access on port 8080
  • Infrahub: Network source-of-truth running in libvirt VM
  • Caddy: Reverse proxy with automatic HTTPS
  • WireGuard: VPN server for secure remote access

For AutoCon4, the lab runs an Enterprise Campus/DC profile; the same automation patterns extend to ISP, cloud, IoT, and industrial topologies.

What is MAESTRO?

MAESTRO is the out-of-band automation host for this lab. It runs Ansible, Nornir, and Terraform against the Infrahub source-of-truth and the GNS3 fabric, giving you a single place to drive configuration, validation, and live demos.

Interactive Device Explorer

Select a device to load the exact config served from Infrahub/Ansible. Perfect for walkthroughs or self-study.

Loading CAMPUS-CORE-01…

MAESTRO Automation Stack: Ansible • Nornir • Terraform

Every toggle on this page can be reproduced as code from MAESTRO, using the same Ansible, Nornir, and Terraform you see in the Git repository. The lab is designed so that any topology profile can be driven by the same automation patterns.

Deploy

Ansible

  • Push Jinja2 templates from `DEVICE_CONFIGS`
  • Target campus, DC, WAN, and firewall nodes
  • Integrates with Infrahub exports

Validate

Nornir

  • Scrapli-based OSPF & BGP checks
  • Inventory mirrors the Infrahub dataset
  • Maps directly to `VALIDATION_TESTS.md`

Model

Terraform

  • Turns Infrahub inventory into JSON manifests
  • Feeds the GNS3 builder API
  • Ready for future NetBox/cloud targets

🚀 Quick Start Guide

  1. Connect to VPN: Import the provided WireGuard configuration file
  2. Access GNS3: Click "Launch Lab Topology" to open the web interface
  3. Console access: Use "Jump into MAESTRO" for device management via Guacamole
  4. View configs: Open Infrahub to browse network inventory and auto-generated device configurations
  5. Topology overview: current Enterprise Campus/DC profile with redundant distribution pairs and multi-zone access layers — one of several topologies MAESTRO can drive.
  6. Pro tip: Use Ctrl+Click to open links in new tabs

Breadcrumb Trail

Follow Along With Every Deliverable

Just want the story? Start with the GNS3 build guide and demo storylines — they walk through what this lab does and why it matters.

Think Hansel and Gretel, but instead of breadcrumbs we drop deeply documented artifacts you can study in order. Each stop links directly to the files powering this lab so newcomers can build CCNA, JNCIA, NSE4, and DevNet Associate-level intuition just by reading and replicating.

Every design doc, Infrahub schema, config library, build guide, and validation script in this section was authored and implemented by Graham as part of this lab.

Step 01

Network Blueprint

Read the CCIE-level architecture, protocol choices, and redundancy logic that drive the live demo.

Open TOPOLOGY_DESIGN.md
  • CCNP ENCOR
  • Design Mindset

Step 02

IP Addressing & IPAM

Follow the addressing math, DHCP scopes, and NAT pools used across campus, DC, WAN, SD-WAN, and DMZ zones.

Open IP_ADDRESSING_PLAN.csv
  • CCNA
  • JNCIA-Junos

Step 03

Inventory & Roles

Map every hostname, vendor, ASN, and tag to see how Infrahub keeps the source-of-truth tidy.

Open devices.csv
  • NetOps
  • Automation

Step 04

Configuration Library

Jump into the templated configs and rendered examples for Arista, Cisco, Fortinet, Juniper, and SD-WAN nodes.

Browse DEVICE_CONFIGS
  • DevNet Associate
  • NSE4

Step 05

Infrahub Schema

Study the object model (devices, interfaces, VLANs, policies) that renders configs and detects drift.

Open INFRAHUB_SCHEMA.yaml
  • Data Modeling
  • GraphQL

Step 06

GNS3 Build Guide

Recreate the visual topology, node placement, and resource sizing in your own lab instance.

Open GNS3_BUILD_GUIDE.md
  • Hands-on Lab
  • Platform Ops

Step 07

Validation & Testing

Execute the command cookbook for OSPF, BGP, VXLAN, SD-WAN, QoS, and firewall verification.

Open VALIDATION_TESTS.md
  • Troubleshooting
  • CCIE Prep

Step 08

Demo Storylines

Share the live stories—SD-WAN brownouts, VXLAN automation, PBR security drills—during customer briefings.

Open DEMO_SCENARIOS.md
  • Storytelling
  • SE Enablement
Lab Infrastructure Flow Internet pfSense Port Forward Caddy Proxy 192.168.5.8 WireGuard UDP :51820 GNS3 Server :3080 (41 nodes) Guacamole :8080 (OOB) MAESTRO Automation Host Ansible • Nornir • Terraform Infrahub VM 10.66.6.10:8000 GNS3 Topology (10.66.6.0/24) INT Zone Firewalls Dist/Access WAN Zone Dist/Access Switches FLOOR01 Arista vEOS Access DATA Core Leaf Sw TCP 80/443 Host Network Reverse Proxy Automation control Source-of-truth sync libvirt NAT VPN Tunnel