Lab 6.1 Port Forwarding and Jump Boxes - zacharylongo/Tech-Journals GitHub Wiki

Lab 6.1: Port Forwarding and Jump Boxes

Summary:

During this lab we setup our jumpbox and configured port forwarding. No large issues were present.

RW01:

Configuring Default Routes: (RW01)

sudo ip route delete 172.16.50.0/29

Making SSH Key w/ Comment: (RW01)

  • Make sure to specify where the key is to be stored, in this case I stored it at /home/zach/keys/jump-zach

FW01:

Web Server

  • set nat destination rule 10 destination port 80
  • set nat destination rule 10 inbound-interface eth0
  • set nat destination rule 10 protocol tcp
  • set nat destination rule 10 translation address 172.16.50.3
  • set nat destination rule 10 translation port 80
  • set nat destination rule 10 description HTTP->WEB01

SSH Listen Address:

  • set service ssh listen-address 172.16.150.2
  • del service ssh listen-address 0.0.0.0

SSH for WAN to JUMP:

  • set nat destination rule 20 destination port 22
  • set nat destination rule 20 inbound-interface eth0
  • set nat destination rule 20 protocol tcp
  • set nat destination rule 20 translation address 172.16.50.4
  • set nat destination rule 20 translation port 22
  • set nat destination rule 20 description WAN->JUMP

SSH Edit WAN-to-DMZ

  • set firewall name WAN-to-DMZ rule 20 action 'accept'
  • set firewall name WAN-to-DMZ rule 20 description 'Allow SSH from WAN to DMZ'
  • set firewall name WAN-to-DMZ rule 20 destination address '172.16.50.4'
  • set firewall name WAN-to-DMZ rule 20 destination port 22
  • set firewall name WAN-to-DMZ rule 20 protocol 'tcp'

Jump:

Base Setup:

  • sudo nano /etc/hostname

Create: zach-jump ## Netplan

  • sudo nano /etc/netplan/00-installer-config.yaml

Enable and Apply

  • sudo netplan try

Create User:

  • Sudo adduser zach
  • Sudo usermod -aG sudo zach
  • Sudo Reboot

Login with newly created user and delete champuser:

  • sudo deluser champuser

Make Jump user:

  • sudo useradd -mk /etc/skel -s /bin/bash -d /home/paul-jump paul-jump
  • Sudo -i
  • Cd /home/paul-jump
  • Mkdir .ssh

Copy pub key rw01 ----> Jump

Mgmt01:

Jump

  • sudo -i
  • cd /home/zach/
  • cat jump-zach.pub > /home/zach-jump/.ssh/authorized_keys
  • chown zach-jump:zach-jump -R /home/zach-jump/.ssh/

Add Wazuh Agent to jump:

mgmt01:

  • curl -so wazuh-agent-4.3.10.deb https://packages.wazuh.com/4.x/apt/pool/main/w/wazuh-agent/wazuh-agent_4.3.10-1_amd64.deb
  • Scp wazuh-agent-4.3.10.deb [email protected]:

Jump:

  • sudo WAZUH_MANAGER='172.16.200.10' WAZUH_AGENT_GROUP='linux' dpkg -i ./wazuh-agent-4.3.10.deb
  • sudo systemctl daemon-reload
  • sudo systemctl enable wazuh-agent
  • sudo systemctl start wazuh-agent

My FW01 Config

  • set firewall name DMZ-to-LAN default-action 'drop'
  • set firewall name DMZ-to-LAN enable-default-log
  • set firewall name DMZ-to-LAN rule 1 action 'accept'
  • set firewall name DMZ-to-LAN rule 1 state established 'enable'
  • set firewall name DMZ-to-LAN rule 10 action 'accept'
  • set firewall name DMZ-to-LAN rule 10 description 'wazuh agent communications with wazuh server'
  • set firewall name DMZ-to-LAN rule 10 destination address '172.16.200.10'
  • set firewall name DMZ-to-LAN rule 10 destination port '1514-1515'
  • set firewall name DMZ-to-LAN rule 10 protocol 'tcp'
  • set firewall name DMZ-to-WAN default-action 'drop'
  • set firewall name DMZ-to-WAN enable-default-log
  • set firewall name DMZ-to-WAN rule 1 action 'accept'
  • set firewall name DMZ-to-WAN rule 1 state established 'enable'
  • set firewall name DMZ-to-WAN rule 999 action 'accept'
  • set firewall name DMZ-to-WAN rule 999 source address '172.16.50.3'
  • set firewall name LAN-to-DMZ default-action 'drop'
  • set firewall name LAN-to-DMZ enable-default-log
  • set firewall name LAN-to-DMZ rule 1 action 'accept'
  • set firewall name LAN-to-DMZ rule 1 state established 'enable'
  • set firewall name LAN-to-DMZ rule 10 action 'accept'
  • set firewall name LAN-to-DMZ rule 10 description 'Allow HTTP from LAN to web01'
  • set firewall name LAN-to-DMZ rule 10 destination address '172.16.50.3'
  • set firewall name LAN-to-DMZ rule 10 destination port '80'
  • set firewall name LAN-to-DMZ rule 10 protocol 'tcp'
  • set firewall name LAN-to-DMZ rule 20 action 'accept'
  • set firewall name LAN-to-DMZ rule 20 description 'ssh from mgmt01 to DMZ'
  • set firewall name LAN-to-DMZ rule 20 destination address '172.16.50.0/29'
  • set firewall name LAN-to-DMZ rule 20 destination port '22'
  • set firewall name LAN-to-DMZ rule 20 protocol 'tcp'
  • set firewall name LAN-to-DMZ rule 20 source address '172.16.150.10'
  • set firewall name LAN-to-WAN default-action 'drop'
  • set firewall name LAN-to-WAN enable-default-log
  • set firewall name LAN-to-WAN rule 1 action 'accept'
  • set firewall name WAN-to-DMZ default-action 'drop'
  • set firewall name WAN-to-DMZ enable-default-log
  • set firewall name WAN-to-DMZ rule 1 action 'accept'
  • set firewall name WAN-to-DMZ rule 1 state established 'enable'
  • set firewall name WAN-to-DMZ rule 10 action 'accept'
  • set firewall name WAN-to-DMZ rule 10 description 'Allow HTTP from WAN to DMZ'
  • set firewall name WAN-to-DMZ rule 10 destination address '172.16.50.3'
  • set firewall name WAN-to-DMZ rule 10 destination port '80'
  • set firewall name WAN-to-DMZ rule 10 protocol 'tcp'
  • set firewall name WAN-to-DMZ rule 20 action 'accept'
  • set firewall name WAN-to-DMZ rule 20 description 'Allow SSH from WAN to DMZ'
  • set firewall name WAN-to-DMZ rule 20 destination address '172.16.50.4'
  • set firewall name WAN-to-DMZ rule 20 destination port '22'
  • set firewall name WAN-to-DMZ rule 20 protocol 'tcp'
  • set firewall name WAN-to-LAN default-action 'drop'
  • set firewall name WAN-to-LAN enable-default-log
  • set firewall name WAN-to-LAN rule 1 action 'accept'
  • set firewall name WAN-to-LAN rule 1 state established 'enable'
  • set interfaces ethernet eth0 address '10.0.17.127/24'
  • set interfaces ethernet eth0 description 'SEC350-WAN'
  • set interfaces ethernet eth1 address '172.16.50.2/29'
  • set interfaces ethernet eth1 description 'PAUL-DMZ'
  • set interfaces ethernet eth2 address '172.16.150.2/24'
  • set interfaces ethernet eth2 description 'PAUL-LAN'
  • set nat destination rule 10 description 'HTTP->WEB01'
  • set nat destination rule 10 destination port '80'
  • set nat destination rule 10 inbound-interface 'eth0'
  • set nat destination rule 10 protocol 'tcp'
  • set nat destination rule 10 translation address '172.16.50.3'
  • set nat destination rule 10 translation port '80'
  • set nat destination rule 20 description 'WAN->JUMP'
  • set nat destination rule 20 destination port '22'
  • set nat destination rule 20 inbound-interface 'eth0'
  • set nat destination rule 20 protocol 'tcp'
  • set nat destination rule 20 translation address '172.16.50.4'
  • set nat destination rule 20 translation port '22'
  • set nat source rule 10 description 'NAT FROM DMZ to WAN'
  • set nat source rule 10 outbound-interface 'eth0'
  • set nat source rule 10 source address '172.16.50.0/29'
  • set nat source rule 10 translation address 'masquerade'
  • set nat source rule 20 description 'NAT FROM LAN to WAN'
  • set nat source rule 20 outbound-interface 'eth0'
  • set nat source rule 20 source address '172.16.150.0/24'
  • set nat source rule 20 translation address 'masquerade'
  • set nat source rule 30 description 'NAT FROM MGMT to WAN'
  • set nat source rule 30 outbound-interface 'eth0'
  • set nat source rule 30 source address '172.16.200.0/28'
  • set nat source rule 30 translation address 'masquerade'
  • set protocols rip interface eth2
  • set protocols rip network '172.16.50.0/29'
  • set protocols static route 0.0.0.0/0 next-hop 10.0.17.2
  • set service dns forwarding allow-from '172.16.50.0/29'
  • set service dns forwarding allow-from '172.16.150.0/24'
  • set service dns forwarding listen-address '172.16.50.2'
  • set service dns forwarding listen-address '172.16.150.2'
  • set service dns forwarding system
  • set service ssh listen-address '172.16.150.2'
  • set system host-name 'fw1-paul'
  • set system name-server '10.0.17.2'
  • set zone-policy zone DMZ from LAN firewall name 'LAN-to-DMZ'
  • set zone-policy zone DMZ from WAN firewall name 'WAN-to-DMZ'
  • set zone-policy zone DMZ interface 'eth1'
  • set zone-policy zone LAN from DMZ firewall name 'DMZ-to-LAN'
  • set zone-policy zone LAN from WAN firewall name 'WAN-to-LAN'
  • set zone-policy zone LAN interface 'eth2'
  • set zone-policy zone WAN from DMZ firewall name 'DMZ-to-WAN'
  • set zone-policy zone WAN from LAN firewall name 'LAN-to-WAN'
  • set zone-policy zone WAN interface 'eth0'