SEC 350:Lab 1 - WanderlustPenguin/Charles-Tech-Journal GitHub Wiki
Walkthrough: https://youtu.be/JxH-qxOjzS0?si=pj51JAmTEfWI4tMO
-
sudo hostnamectl set-hostname lets you set actual names for devices
-
logger -n (logger IP) -P (port#, set up as 514) "text goes here" sends the logger a test message
FW01
-
set up network 1 WAN, network 2 DMZ, network 3 LAN
-
configure, commit, save
-
set interfaces ethernet eth(0/1/2) description SEC350-(WAN/DMZ/LAN) helps keep track of which interface connects to what
-
set system name-server 10.0.17.2 sets the gateway and DNS to the firewall
- configure forwarding from DMZ to WAN
- set nat source rule 10 decription "NAT from DMZ to WAN"
- set nat source rule 10 outbound-interface eth0
- set nat source rule 10 source address 172.16.50.0/29
- set nat source rule 10 translation address masquerade
-
configure DNS forwarding
-
set service dns forwarding listening-address 172.16.50.2
-
set service dns forwarding allow-from 172.16.50.0/29
-
set service dns forwarding system
-
set up log forwarding
-
set system syslog host 172.16.50.5 facility all level info
- set up firewall to work with logger
- set firewall name WAN-to-DMZ rule 10 action accept
- set firewall name WAN-to-DMZ rule 10 source address 10.0.17.26
- set firewall name WAN-to-DMZ rule 10 destination address 172.16.50.3
- set firewall name WAN-to-DMZ rule 10 protocol tcp
- set firewall name WAN-to-DMZ rule 10 port 80
RW01
-
on WAN
-
set up another account with different password
-
go to network connection, address 10.0.17.26, netmask /24, default gateway 10.0.17.126, DNS 10.17.0.2
-
set up in terminal: /etc/netplan/01-netcf.yaml, then edit in the info in the picture
-
sudo systemctl restart NetworkManager
-
ssh charlie@(ip) lets you ssh into other devices
WEB01
-
Sudo nano /etc/sysconfig/network-scripts/ifcfg-ens192 opens up network setup, change settings to picture
-
httpd installation
-
yum install httpd
-
Sudo systemctl start httpd
-
Sudo stsremctl enable httpd
- set up ports
- sudo firewall-cmd --permanent --add-service=http
- sudo firewall-cmd --permanent --add-service=https
- sudo firewall-cmd --permanent --add-port=514/tcp
- sudo firewall-cmd --permanent --add-port=514/udp
- sudo firewall-cmd --reload
- sudo firewall-cmd --list-all public
- RSYS
- sudo tum install -y rsyslog
- sudo nano/etc/rsyslog.d/sec350.conf
- user.notice @172.16.50.5:514
LOG01
- set up in terminal: /etc/netplan/01-netcf.yaml, then edit in the info in the picture
- sudo systemctl restart NetworkManager
- set up RSYS
- sudo tum install -y rsyslog
- sudo systemctl enable --now rsyslog
- sudo nano /etc/rsyslog.conf
- uncomment udp and tcp
- sudo firewall-cmd --permanent --add-service=http
- sudo firewall-cmd --permanent --add-service=https
- sudo firewall-cmd --permanent --add-port=514/tcp
- sudo firewall-cmd --permanent --add-port=514/udp
- sudo firewall-cmd --reload
- sudo tail /var/log/messages brings up logs
New
-
network configuration commands, crucial for ensuring the devices are accurate
-
using terminal rather than gui fixes a large portion of hard to resolve problems
-
/etc/sysconfig/network-scripts/ifcfg-ens192 allows direct editing of network information