Security Lab — current inventory

Current VM, network, and endpoint inventory for the security lab.

Host And Networks

ItemValue
Hypervisorlibvirt/KVM
Hostdl385
Management bridgebr30
Management gateway30.30.0.1
Management CIDR convention30.30.0.0/16
Isolated lab networkvapt-lab
Isolated lab bridgevirbr-vapt

br30 is used for VM management and web UI access. vapt-lab is used for controlled lab traffic between sensors and targets.

Virtual Machines

VMPurposeManagement IPPrimary access
kali-linuxOffensive workstation30.30.30.60SSH
kali-purplePurple-team Kali workstation30.30.30.61SSH
eve-ngNetwork emulation30.30.30.62http://30.30.30.62/
security-onionIDS/NSM/SOC stack30.30.30.63SSH / web after setup
wazuhSIEM/XDR30.30.30.64https://30.30.30.64/
greenboneVulnerability scanning30.30.30.65https://30.30.30.65/
linux-target-01Linux scan and hardening target30.30.30.68http://30.30.30.68/
juice-shopWeb app target30.30.30.69http://30.30.30.69:3000/
security-lab-runtime-01GitOps-managed runtime services30.30.30.70SSH and service ports

Shared infrastructure used by the lab:

VMRoleNotes
haproxyShared edge proxyPublishes selected lab services through *.apps.sub.comptech-lab.com
pdnsShared authoritative DNS and recursorProvides wildcard app DNS and lab DNS services
minioShared object storageDedicated security-lab bucket is used for backup replication

StorageGRID grid-host VMs also exist under 30.30.31.10-30.30.31.19. They are Linux grid hosts only; StorageGRID software installation is paused until official evaluation media and license are staged.

Runtime Services

ServicePurposeURL
NautobotSource of truth and inventory seed targethttp://30.30.30.70:8080/
OxidizedNetwork configuration backuphttp://30.30.30.70:8888/
BatfishNetwork validation and policy analysis APIhttp://30.30.30.70:9996/
TheHiveCase managementhttps://thehive.apps.sub.comptech-lab.com/
ShuffleSOAR workflow testinghttps://shuffle.apps.sub.comptech-lab.com/

Nexus EVPN/VXLAN Lab

NodeRoleLab
spine-01EVPN route-reflector spineEVE-NG
spine-02EVPN route-reflector spineEVE-NG
leaf-01VTEP leafEVE-NG
leaf-02VTEP leafEVE-NG
border-01Tenant borderEVE-NG
border-02Tenant borderEVE-NG

The current topology has BGP underlay, MP-BGP EVPN overlay, VXLAN tenant segments, dual-border upstream reachability, and services VRF route-leak controls.

Lab NICs

These VMs also have a second NIC on vapt-lab:

VMLab MAC
wazuh52:54:00:40:30:64
greenbone52:54:00:40:30:65
security-onion52:54:00:40:30:63
linux-target-0152:54:00:40:30:68
juice-shop52:54:00:40:30:69

Quick Health Checks

virsh list --all
tmux ls
curl -Is http://30.30.30.62/
curl -kIs https://30.30.30.64/
curl -kIs https://30.30.30.65/
curl -Is http://30.30.30.68/
curl -Is http://30.30.30.69:3000/

Expected healthy results are HTTP responses from all endpoints, a clean Git state in the agent repo, and no unexpected Nexus validation sessions left in tmux.

Last reviewed: 2026-05-15