Lab 02 - NAT and firewall setup


  1. DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
  2. Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
  3. Lastly, we'll provide a NAT rule to access the Ubuntu VM via RDP and enable remote desktop access for the Ubuntu VM.

Completing the Lab:

The best approach completes the three items above in order. From networking class, you should know how DHCP works.

  1. You will need the MAC address of each VM. Go and get them and write them down.
  2. In the service menu, click on DCHP server and make sure the LAN is selected at the top.
  3. At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
    1. Ubuntu 20.04 Desktop -->

    2. Windows 2019 -->

    3. Kali -->

    4. Metasploitable 3 -->

The result looks like the:

Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.

Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Ubuntu machine using RDP by connecting to the public IP side of your pfSense box.

Show Me:

  1. Show me that you can remote use RDP to connect to your Ubuntu machine from outside your network.
  2. Show me that you have DHCP reservations for each of your five computers on pfSense
  3. Show me that the rule to block all outgoing and incoming packets to the metasploitable VM actually works (from metasploitable you should not be able to access the internet - login and do a ping of google)