Lab 02 - NAT and firewall setup
Concepts:
- DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
- Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
- Lastly, we'll provide a NAT rule to access the Ubuntu VM via RDP and enable remote desktop access for the Ubuntu VM.
Completing the Lab:
The best approach completes the three items above in order. From networking class, you should know how DHCP works.
- You will need the MAC address of each VM. Go and get them and write them down.
- In the service menu, click on DCHP server and make sure the LAN is selected at the top.
- At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
Ubuntu 20.04 Desktop --> 192.168.1.2
Windows 2019 --> 192.168.1.3
Kali --> 192.168.1.4
Metasploitable 3 --> 192.168.1.5
The result looks like the:
Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.
Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Ubuntu machine using RDP by connecting to the public IP side of your pfSense box.
Show Me:
- Show me that you can remote use RDP to connect to your Ubuntu machine from outside your network.
- Show me that you have DHCP reservations for each of your five computers on pfSense
- Show me that the rule to block all outgoing and incoming packets to the metasploitable VM actually works (from metasploitable you should not be able to access the internet - login and do a ping of google)