SEC 350:Lab 4.1 - WanderlustPenguin/Charles-Tech-Journal GitHub Wiki

Fw01 Second Header
set firewall name LAN-to-MGMT default-action 'drop'
set firewall name LAN-to-MGMT enable-default-log
set firewall name LAN-to-MGMT rule 1 action 'accept'
set firewall name LAN-to-MGMT rule 1 state established 'enable'
set firewall name LAN-to-MGMT rule 10 action 'accept'
set firewall name LAN-to-MGMT rule 10 description 'wazuh agent to wazuh server'
set firewall name LAN-to-MGMT rule 10 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 10 destination port '1515,1514'
set firewall name LAN-to-MGMT rule 10 protocol 'tcp'
set firewall name LAN-to-MGMT rule 20 action 'accept'
set firewall name LAN-to-MGMT rule 20 description 'web interface to wazuh for mgmt01'
set firewall name LAN-to-MGMT rule 20 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 20 destination port '443'
set firewall name LAN-to-MGMT rule 20 protocol 'tcp'
set firewall name LAN-to-MGMT rule 20 source address '0.0.0.0/0'
set firewall name LAN-to-MGMT rule 30 action 'accept'
set firewall name LAN-to-MGMT rule 30 description 'ssh to wazuh from mgmt01'
set firewall name LAN-to-MGMT rule 30 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 30 destination port '22'
set firewall name LAN-to-MGMT rule 30 protocol 'tcp'
set firewall name LAN-to-MGMT rule 30 source address '0.0.0.0/0'
set firewall name MGMT-to-LAN default-action 'drop'
set firewall name MGMT-to-LAN enable-default-log
set firewall name MGMT-to-LAN rule 1 action 'accept'
set firewall name MGMT-to-LAN rule 1 description 'allow established and related back to MGMT'
set firewall name MGMT-to-LAN rule 1 state established 'enable'
set firewall name MGMT-to-LAN rule 1 state related 'enable'
set firewall name MGMT-to-LAN rule 3 action 'accept'
set firewall name MGMT-to-LAN rule 3 description 'allow all mgmt to DMZ'
set firewall name MGMT-to-LAN rule 3 destination address '172.16.50.0/29'
set firewall name MGMT-to-LAN rule 3 log 'enable'
set firewall name MGMT-to-LAN rule 3 source address '0.0.0.0/0'
set firewall name MGMT-to-LAN rule 3 state established 'enable'
set firewall name MGMT-to-LAN rule 110 action 'accept'
set firewall name MGMT-to-LAN rule 110 description 'allow all MGMT to LAN'
set firewall name MGMT-to-LAN rule 110 destination address '172.16.150.0/24'
set firewall name MGMT-to-LAN rule 110 log 'enable'
set firewall name MGMT-to-LAN rule 110 source address '0.0.0.0/0'
set interfaces ethernet eth0 address '172.16.150.3/24'
set interfaces ethernet eth0 description 'SEC350-LAN'
set interfaces ethernet eth0 hw-id '00:50:56:a1:4a:72'
set interfaces ethernet eth1 address '172.16.200.2/28'
set interfaces ethernet eth1 description 'SEC350-MGMT'
set interfaces ethernet eth1 hw-id '00:50:56:a1:89:8f'
set interfaces loopback lo
set nat source rule 30 description 'MGMT-LAN'
set nat source rule 30 outbound-interface 'eth0'
set nat source rule 30 source address '172.16.200.0'
set nat source rule 30 translation address 'masquerade'
set protocols rip interface eth0
set protocols rip network '172.16.200.0/28'
set protocols rip network '172.16.150.0/24'
set protocols static route 0.0.0.0/0 next-hop 172.16.150.2
set protocols static route 172.16.50.0/24 next-hop 172.16.150.3
set protocols static route 172.16.50.0/29 next-hop 172.16.150.2
set service dns forwarding allow-from '172.16.200.0/28'
set service dns forwarding listen-address '172.16.200.2'
set service dns forwarding system
set service ssh listen-address '0.0.0.0'
set system config-management commit-revisions '100'
set system conntrack modules ftp
set system conntrack modules h323
set system conntrack modules nfs
set system conntrack modules pptp
set system conntrack modules sip
set system conntrack modules sqlnet
set system conntrack modules tftp
set system console device ttyS0 speed '115200'
set system host-name 'fw-mgmt'
set system login user vyos authentication encrypted-password '$6$YUTCBnIl7XuxPfv7$UQXsMiDLSJsDs9mPJ2PQ.9IjjMks5MrKu6IlQRJsS.VIvkYeQXFvupJVrZMTQFYjkbTkRshVAYECJS337kHAS/'
set system login user vyos authentication plaintext-password ''
set system name-server '172.16.150.2'
set system ntp server time1.vyos.net
set system ntp server time2.vyos.net
set system ntp server time3.vyos.net
set system syslog global facility all level 'info'
set system syslog global facility protocols level 'debug'
set zone-policy zone LAN from MGMT firewall name 'MGMT-to-LAN'
set zone-policy zone LAN interface 'eth0'
set zone-policy zone MGMT from LAN firewall name 'LAN-to-MGMT'
set zone-policy zone MGMT interface 'eth1'
FWmgmt Second Header
set firewall name LAN-to-MGMT default-action 'drop'
set firewall name LAN-to-MGMT enable-default-log
set firewall name LAN-to-MGMT rule 1 action 'accept'
set firewall name LAN-to-MGMT rule 1 state established 'enable'
set firewall name LAN-to-MGMT rule 10 action 'accept'
set firewall name LAN-to-MGMT rule 10 description 'wazuh agent to wazuh server'
set firewall name LAN-to-MGMT rule 10 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 10 destination port '1515,1514'
set firewall name LAN-to-MGMT rule 10 protocol 'tcp'
set firewall name LAN-to-MGMT rule 20 action 'accept'
set firewall name LAN-to-MGMT rule 20 description 'web interface to wazuh for mgmt01'
set firewall name LAN-to-MGMT rule 20 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 20 destination port '443'
set firewall name LAN-to-MGMT rule 20 protocol 'tcp'
set firewall name LAN-to-MGMT rule 20 source address '0.0.0.0/0'
set firewall name LAN-to-MGMT rule 30 action 'accept'
set firewall name LAN-to-MGMT rule 30 description 'ssh to wazuh from mgmt01'
set firewall name LAN-to-MGMT rule 30 destination address '172.16.200.10'
set firewall name LAN-to-MGMT rule 30 destination port '22'
set firewall name LAN-to-MGMT rule 30 protocol 'tcp'
set firewall name LAN-to-MGMT rule 30 source address '0.0.0.0/0'
set firewall name MGMT-to-LAN default-action 'drop'
set firewall name MGMT-to-LAN enable-default-log
set firewall name MGMT-to-LAN rule 1 action 'accept'
set firewall name MGMT-to-LAN rule 1 description 'allow established and related back to MGMT'
set firewall name MGMT-to-LAN rule 1 state established 'enable'
set firewall name MGMT-to-LAN rule 1 state related 'enable'
set firewall name MGMT-to-LAN rule 3 action 'accept'
set firewall name MGMT-to-LAN rule 3 description 'allow all mgmt to DMZ'
set firewall name MGMT-to-LAN rule 3 destination address '172.16.50.0/29'
set firewall name MGMT-to-LAN rule 3 log 'enable'
set firewall name MGMT-to-LAN rule 3 source address '0.0.0.0/0'
set firewall name MGMT-to-LAN rule 3 state established 'enable'
set firewall name MGMT-to-LAN rule 110 action 'accept'
set firewall name MGMT-to-LAN rule 110 description 'allow all MGMT to LAN'
set firewall name MGMT-to-LAN rule 110 destination address '172.16.150.0/24'
set firewall name MGMT-to-LAN rule 110 log 'enable'
set firewall name MGMT-to-LAN rule 110 source address '0.0.0.0/0'
set interfaces ethernet eth0 address '172.16.150.3/24'
set interfaces ethernet eth0 description 'SEC350-LAN'
set interfaces ethernet eth0 hw-id '00:50:56:a1:4a:72'
set interfaces ethernet eth1 address '172.16.200.2/28'
set interfaces ethernet eth1 description 'SEC350-MGMT'
set interfaces ethernet eth1 hw-id '00:50:56:a1:89:8f'
set interfaces loopback lo
set nat source rule 30 description 'MGMT-LAN'
set nat source rule 30 outbound-interface 'eth0'
set nat source rule 30 source address '172.16.200.0'
set nat source rule 30 translation address 'masquerade'
set protocols rip interface eth0
set protocols rip network '172.16.200.0/28'
set protocols rip network '172.16.150.0/24'
set protocols static route 0.0.0.0/0 next-hop 172.16.150.2
set protocols static route 172.16.50.0/24 next-hop 172.16.150.3
set protocols static route 172.16.50.0/29 next-hop 172.16.150.2
set service dns forwarding allow-from '172.16.200.0/28'
set service dns forwarding listen-address '172.16.200.2'
set service dns forwarding system
set service ssh listen-address '0.0.0.0'
set system config-management commit-revisions '100'
set system conntrack modules ftp
set system conntrack modules h323
set system conntrack modules nfs
set system conntrack modules pptp
set system conntrack modules sip
set system conntrack modules sqlnet
set system conntrack modules tftp
set system console device ttyS0 speed '115200'
set system host-name 'fw-mgmt'
set system login user vyos authentication encrypted-password '$6$YUTCBnIl7XuxPfv7$UQXsMiDLSJsDs9mPJ2PQ.9IjjMks5MrKu6IlQRJsS.VIvkYeQXFvupJVrZMTQFYjkbTkRshVAYECJS337kHAS/'
set system login user vyos authentication plaintext-password ''
set system name-server '172.16.150.2'
set system ntp server time1.vyos.net
set system ntp server time2.vyos.net
set system ntp server time3.vyos.net
set system syslog global facility all level 'info'
set system syslog global facility protocols level 'debug'
set zone-policy zone LAN from MGMT firewall name 'MGMT-to-LAN'
set zone-policy zone LAN interface 'eth0'
set zone-policy zone MGMT from LAN firewall name 'LAN-to-MGMT'
set zone-policy zone MGMT interface 'eth1'

  • show configuration commands- prints configuration commands, which can then be copy pasted into a document
  • set zone-policy zone XXX interface 'eth0'- set each zone to a specific interface
  • set zone-policy zone XXX from YYY firewall name 'YYY-to-XXX'- set up a firewall connecting the two zones
  • if an error occurs between networks, double check the zone and firewall setups to see if communication is interrupted or prevented from returning