Lab 6.1 Port Forwarding and Jump Boxes - zacharylongo/Tech-Journals GitHub Wiki
Lab 6.1: Port Forwarding and Jump Boxes
Summary:
During this lab we setup our jumpbox and configured port forwarding. No large issues were present.
RW01:
Configuring Default Routes: (RW01)
sudo ip route delete 172.16.50.0/29
Making SSH Key w/ Comment: (RW01)
- Make sure to specify where the key is to be stored, in this case I stored it at /home/zach/keys/jump-zach
FW01:
Web Server
set nat destination rule 10 destination port 80set nat destination rule 10 inbound-interface eth0set nat destination rule 10 protocol tcpset nat destination rule 10 translation address 172.16.50.3set nat destination rule 10 translation port 80set nat destination rule 10 description HTTP->WEB01
SSH Listen Address:
set service ssh listen-address 172.16.150.2del service ssh listen-address 0.0.0.0
SSH for WAN to JUMP:
set nat destination rule 20 destination port 22set nat destination rule 20 inbound-interface eth0set nat destination rule 20 protocol tcpset nat destination rule 20 translation address 172.16.50.4set nat destination rule 20 translation port 22set nat destination rule 20 description WAN->JUMP
SSH Edit WAN-to-DMZ
set firewall name WAN-to-DMZ rule 20 action 'accept'set firewall name WAN-to-DMZ rule 20 description 'Allow SSH from WAN to DMZ'set firewall name WAN-to-DMZ rule 20 destination address '172.16.50.4'set firewall name WAN-to-DMZ rule 20 destination port 22set firewall name WAN-to-DMZ rule 20 protocol 'tcp'
Jump:
Base Setup:
sudo nano /etc/hostname
Create: zach-jump ## Netplan
sudo nano /etc/netplan/00-installer-config.yaml
Enable and Apply
sudo netplan try
Create User:
Sudo adduser zachSudo usermod -aG sudo zachSudo Reboot
Login with newly created user and delete champuser:
sudo deluser champuser
Make Jump user:
sudo useradd -mk /etc/skel -s /bin/bash -d /home/paul-jump paul-jumpSudo -iCd /home/paul-jumpMkdir .ssh
Copy pub key rw01 ----> Jump
Mgmt01:
sftp [email protected]:/home/zach/keys/jump-zach.pub jump-zach.pubscp ./jump-zach.pub [email protected]:
Jump
sudo -icd /home/zach/cat jump-zach.pub > /home/zach-jump/.ssh/authorized_keyschown zach-jump:zach-jump -R /home/zach-jump/.ssh/
Add Wazuh Agent to jump:
mgmt01:
curl -so wazuh-agent-4.3.10.deb https://packages.wazuh.com/4.x/apt/pool/main/w/wazuh-agent/wazuh-agent_4.3.10-1_amd64.debScp wazuh-agent-4.3.10.deb [email protected]:
Jump:
sudo WAZUH_MANAGER='172.16.200.10' WAZUH_AGENT_GROUP='linux' dpkg -i ./wazuh-agent-4.3.10.debsudo systemctl daemon-reloadsudo systemctl enable wazuh-agentsudo systemctl start wazuh-agent
My FW01 Config
set firewall name DMZ-to-LAN default-action 'drop'set firewall name DMZ-to-LAN enable-default-logset firewall name DMZ-to-LAN rule 1 action 'accept'set firewall name DMZ-to-LAN rule 1 state established 'enable'set firewall name DMZ-to-LAN rule 10 action 'accept'set firewall name DMZ-to-LAN rule 10 description 'wazuh agent communications with wazuh server'set firewall name DMZ-to-LAN rule 10 destination address '172.16.200.10'set firewall name DMZ-to-LAN rule 10 destination port '1514-1515'set firewall name DMZ-to-LAN rule 10 protocol 'tcp'set firewall name DMZ-to-WAN default-action 'drop'set firewall name DMZ-to-WAN enable-default-logset firewall name DMZ-to-WAN rule 1 action 'accept'set firewall name DMZ-to-WAN rule 1 state established 'enable'set firewall name DMZ-to-WAN rule 999 action 'accept'set firewall name DMZ-to-WAN rule 999 source address '172.16.50.3'set firewall name LAN-to-DMZ default-action 'drop'set firewall name LAN-to-DMZ enable-default-logset firewall name LAN-to-DMZ rule 1 action 'accept'set firewall name LAN-to-DMZ rule 1 state established 'enable'set firewall name LAN-to-DMZ rule 10 action 'accept'set firewall name LAN-to-DMZ rule 10 description 'Allow HTTP from LAN to web01'set firewall name LAN-to-DMZ rule 10 destination address '172.16.50.3'set firewall name LAN-to-DMZ rule 10 destination port '80'set firewall name LAN-to-DMZ rule 10 protocol 'tcp'set firewall name LAN-to-DMZ rule 20 action 'accept'set firewall name LAN-to-DMZ rule 20 description 'ssh from mgmt01 to DMZ'set firewall name LAN-to-DMZ rule 20 destination address '172.16.50.0/29'set firewall name LAN-to-DMZ rule 20 destination port '22'set firewall name LAN-to-DMZ rule 20 protocol 'tcp'set firewall name LAN-to-DMZ rule 20 source address '172.16.150.10'set firewall name LAN-to-WAN default-action 'drop'set firewall name LAN-to-WAN enable-default-logset firewall name LAN-to-WAN rule 1 action 'accept'set firewall name WAN-to-DMZ default-action 'drop'set firewall name WAN-to-DMZ enable-default-logset firewall name WAN-to-DMZ rule 1 action 'accept'set firewall name WAN-to-DMZ rule 1 state established 'enable'set firewall name WAN-to-DMZ rule 10 action 'accept'set firewall name WAN-to-DMZ rule 10 description 'Allow HTTP from WAN to DMZ'set firewall name WAN-to-DMZ rule 10 destination address '172.16.50.3'set firewall name WAN-to-DMZ rule 10 destination port '80'set firewall name WAN-to-DMZ rule 10 protocol 'tcp'set firewall name WAN-to-DMZ rule 20 action 'accept'set firewall name WAN-to-DMZ rule 20 description 'Allow SSH from WAN to DMZ'set firewall name WAN-to-DMZ rule 20 destination address '172.16.50.4'set firewall name WAN-to-DMZ rule 20 destination port '22'set firewall name WAN-to-DMZ rule 20 protocol 'tcp'set firewall name WAN-to-LAN default-action 'drop'set firewall name WAN-to-LAN enable-default-logset firewall name WAN-to-LAN rule 1 action 'accept'set firewall name WAN-to-LAN rule 1 state established 'enable'set interfaces ethernet eth0 address '10.0.17.127/24'set interfaces ethernet eth0 description 'SEC350-WAN'set interfaces ethernet eth1 address '172.16.50.2/29'set interfaces ethernet eth1 description 'PAUL-DMZ'set interfaces ethernet eth2 address '172.16.150.2/24'set interfaces ethernet eth2 description 'PAUL-LAN'set nat destination rule 10 description 'HTTP->WEB01'set nat destination rule 10 destination port '80'set nat destination rule 10 inbound-interface 'eth0'set nat destination rule 10 protocol 'tcp'set nat destination rule 10 translation address '172.16.50.3'set nat destination rule 10 translation port '80'set nat destination rule 20 description 'WAN->JUMP'set nat destination rule 20 destination port '22'set nat destination rule 20 inbound-interface 'eth0'set nat destination rule 20 protocol 'tcp'set nat destination rule 20 translation address '172.16.50.4'set nat destination rule 20 translation port '22'set nat source rule 10 description 'NAT FROM DMZ to WAN'set nat source rule 10 outbound-interface 'eth0'set nat source rule 10 source address '172.16.50.0/29'set nat source rule 10 translation address 'masquerade'set nat source rule 20 description 'NAT FROM LAN to WAN'set nat source rule 20 outbound-interface 'eth0'set nat source rule 20 source address '172.16.150.0/24'set nat source rule 20 translation address 'masquerade'set nat source rule 30 description 'NAT FROM MGMT to WAN'set nat source rule 30 outbound-interface 'eth0'set nat source rule 30 source address '172.16.200.0/28'set nat source rule 30 translation address 'masquerade'set protocols rip interface eth2set protocols rip network '172.16.50.0/29'set protocols static route 0.0.0.0/0 next-hop 10.0.17.2set service dns forwarding allow-from '172.16.50.0/29'set service dns forwarding allow-from '172.16.150.0/24'set service dns forwarding listen-address '172.16.50.2'set service dns forwarding listen-address '172.16.150.2'set service dns forwarding systemset service ssh listen-address '172.16.150.2'set system host-name 'fw1-paul'set system name-server '10.0.17.2'set zone-policy zone DMZ from LAN firewall name 'LAN-to-DMZ'set zone-policy zone DMZ from WAN firewall name 'WAN-to-DMZ'set zone-policy zone DMZ interface 'eth1'set zone-policy zone LAN from DMZ firewall name 'DMZ-to-LAN'set zone-policy zone LAN from WAN firewall name 'WAN-to-LAN'set zone-policy zone LAN interface 'eth2'set zone-policy zone WAN from DMZ firewall name 'DMZ-to-WAN'set zone-policy zone WAN from LAN firewall name 'LAN-to-WAN'set zone-policy zone WAN interface 'eth0'