Lab 02 - NAT and firewall setup

Concepts:

  1. DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
  2. Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
  3. Lastly, we'll provide a NAT rule to access the Windows 10 VM via RDP and enable remote desktop access for the Windows 10 VM.

Completing the Lab:

The best approach completes the three items above in order. From networking class, you should know how DHCP works.

  1. You will need the MAC address of each VM. Go and get them and write them down.
  2. In the service menu, click on DCHP server and make sure the LAN is selected at the top.
  3. At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
    1. Windows 10 --> 192.168.1.2

    2. Windows 2016 --> 192.168.1.3

    3. Ubuntu 18.04 --> 192.168.1.4

    4. Kali --> 192.168.1.5

    5. Metasploitable 3 --> 192.168.1.6

The result looks like the:

http://db.cs.southern.edu/videos/images/CPTR427/Lab02/dhcpmap.png

Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.

http://db.cs.southern.edu/videos/images/CPTR427/Lab02/firewallrule.png

Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Windows 10 machine using RDP by connecting to the public IP side of your pfSense box.

http://db.cs.southern.edu/videos/images/CPTR427/Lab02/nat.png

Show Me:

  1. Show me that you have DHCP reservations for each of your five computers on pfSense
  2. Show me that the rule to block all outgoing and incoming packets to the metasploitable VM actually works (from metasploitable you should not be able to access the internet - login and do a ping of google)
  3. Show me that you can remote use RDP to connect to your windows 10 machine from outside your network.