Lab 3.1 Segmentation

Network Diagram

In this lab, we are going to segment our network by adding a new firewall and a new network (MGMT). We will retire our log01 server and replace it with a new server on the MGMT network.

Step 1: Configure WKS01

This system will be a Windows 10 VM that represents a typical client in our internal LAN (SEC-350-LAN). You should have set the LAN interface on FW1 last week.

Make a named user on windows:

  1. Open Settings

  2. Select Accounts

  3. Select Family & other users

  4. Under Other users, click Add someone else to this PC

Add user to local admin group on windows:

Change Windows hostname:

  1. Open Settings

  2. Select System

  3. Select About

  4. Select Rename this PC

  5. Enter a new name

  6. Select Next

  7. Choose to restart your computer now or later

Configure Interface

circle-info

IP Address: 172.16.150.50

Netmask: 255.255.255.0

Gateway: 172.16.150.2

DNS: 172.16.150.2

Go to Settings > Network & Internet > Ethernet (or Wi-Fi) > Change adapter options > right-click your network adapter > Properties > Internet Protocol Version 4 (TCP/IPv4) > Properties, then select "Use the following IP address"

Step 2: Update fw01 - LAN Configuration

In week 1 you created a NAT source rule 10 for the DMZ. In week 2, you created a new NAT source rule 20 for the LAN.

Create a source rule 30 for NAT FROM MGMT to WAN (you will delete this later)

Deliverable 1: Validate LAN access (you will test MGMT later) Provide a screenshot similar (change the IP address) to the one below. From WKS01:

  • show results of the whoami command

  • hostname command

  • ping champlain.edu

Deliverable 2: You should also be able to get to your DMZ based web server from WKS01. Provide a screenshot from WKS01 similar to the one below:

Step 3: Configure fw-mgmt

The Management Firewall is going to separate the main LAN production network from the systems used by administrators to manage this network (MGMT).

Set hostname

Set new system password

Delete DHCP Interfaces

  • show interfaces to check system interfaces

Set Interfaces with commands below

Set the corresponding IP addresses for each interface

Set static route

Set DNS forwarding

Step 4: Configure mgmt02

Place on correct adapter

Make a named user

  • Open Settings

  • Select Accounts

  • Select Family & other users

  • Under Other users, click Add someone else to this PC

triangle-exclamation

Make user a local admin

Change Hostname

  • Open Settings

  • Select System

  • Select About

  • Select Rename this PC

  • Enter a new name

  • Select Next

  • Choose to restart your computer now or later

Configure Interface

circle-info

IP Address: 172.16.200.11

Netmask: 255.255.255.240 (yes this is a /28)

Gateway: 172.16.200.2

DNS: 172.16.200.2

Step 5: RIP on FW1 and FW-MGMT

circle-info

Rather than double NAT from MGMT to LAN and LAN to WAN we will implement RIP which will greatly simplify the routing from MGMT to LAN. It will also increase our visibility for sensors outside of the MGMT network.

On fw01 Enable RIP on eth2 (LAN) and advise the DMZ network

On fw-mgmt Enable RIP on eth0 (LAN) and advise the MGMT network

On fw01, you should have already allowed NAT traffic from the MGMT network (rule 30).

Create a source rule 30 for NAT FROM MGMT to WAN

circle-exclamation
triangle-exclamation

Deliverable 3. On mgmt02, provide a screenshot similar to the following one

Step 6: Shutdown log01

Say goodbye to your syslog server, if you are done with all previous labs, feel free to turn it off. We are going to configure a new box called wazuh that will capture security relevant logs from configured systems.

Step 7: Configure server wazuh

Wazuh is a new ubuntu server. Configure it on the SEC350-MGMT network with the following address information. It may take some time to boot because it's looking for a non-existent dhcp server.

Add user

Use netplan to configure interface

  • /etc/netplan/00-installer-config.yaml is the config file

Set hostname

  • hostnamectl set-hostname

Deliverable 4. On Wazuh, provide a screenshot similar to the one below that shows your correct hostname, named administrative (sudo) user logged in and able to ping google.com and curl your web server.

Step 8: Update client logging configurations

circle-info

fw01 and web01 have stale syslog configurations because we have decommissioned log01. Remove those log forwarding messages from the vyos syslog configuration and the web01 client configuration. In the near future, our wazuh agents will forward specific messages (instead of all of them)

On web01, remove your rsyslog dropin configuration

On fw1, remove syslog host 172.16.50.5 setting from configuration

Deliverable 5. On mgmt1, provide a screenshot similar to the one below showing:

  • ssh from mgmt1 on LAN to wazuh on MGMT

  • another ping to google

  • traceroute to champlain.edu with 4 hops

Deliverable 6. A screenshot similar to the one below that shows a ping from web01 to wazuh.

Deliverable 7. export the firewall configurations at the end of week 3 for fw-mgmt and fw1. The following command line will provide the most usable format. Provide screenshots or links to your firewall configurations in github.

Install Git on Vyos

Configure Github

  • ssh-keygen

  • sudo cat /home/vyos/.ssh/id_rsa.pub

  • copy paste the key into github

Last updated