|Deletions are marked like this.||Additions are marked like this.|
|Line 16:||Line 16:|
|1. Windows 10 --> 192.168.1.2||1. Ubuntu 20.04 Desktop --> 192.168.1.2|
|Line 18:||Line 18:|
| 1. Ubuntu 20.04 --> 192.168.1.4
1. Kali --> 192.168.1.5
1. Metasploitable 3 --> 192.168.1.6
| 1. Kali --> 192.168.1.4
1. Metasploitable 3 --> 192.168.1.5
Lab 02 - NAT and firewall setup
- DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
- Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
- Lastly, we'll provide a NAT rule to access the Windows 10 VM via RDP and enable remote desktop access for the Windows 10 VM.
Completing the Lab:
The best approach completes the three items above in order. From networking class, you should know how DHCP works.
- You will need the MAC address of each VM. Go and get them and write them down.
- In the service menu, click on DCHP server and make sure the LAN is selected at the top.
- At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
Ubuntu 20.04 Desktop --> 192.168.1.2
Windows 2019 --> 192.168.1.3
Kali --> 192.168.1.4
Metasploitable 3 --> 192.168.1.5
The result looks like the:
Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.
Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Windows 10 machine using RDP by connecting to the public IP side of your pfSense box.
- Show me that you can remote use RDP to connect to your windows 10 machine from outside your network.
- Show me that you have DHCP reservations for each of your five computers on pfSense
- Show me that the rule to block all outgoing and incoming packets to the metasploitable VM actually works (from metasploitable you should not be able to access the internet - login and do a ping of google)