Difference between revisions of "Vnx-labo-fw"

From VNX
Jump to: navigation, search
(Installation)
Line 3: Line 3:
 
This scenario has been designed to allow 14 student groups to work together configuring firewalls and using security related tools and Linux security oriented distributions like [https://www.kali.org/ Kali Linux] and [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Metasploitable].  
 
This scenario has been designed to allow 14 student groups to work together configuring firewalls and using security related tools and Linux security oriented distributions like [https://www.kali.org/ Kali Linux] and [http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Metasploitable].  
  
 
+
The full scenario is divided on 7 basic scenarios (Fig. 1) that include the virtual machines used by two student groups. Each student pod is made of a simple corporate network with a DMZ network with a vulnerable server and an internal network with some hosts, as well as an attacker host on Internet with Kali Linux. Additionaly, a server on Internet is included to allow testing connectivity from inside the corporate network to Internet.
  
 
[[File:Fw-basic-scenario2.png|center|thumb|600px|<div align=center>
 
[[File:Fw-basic-scenario2.png|center|thumb|600px|<div align=center>
 
'''Figure 1: basic scenario for two student groups'''</div>]]
 
'''Figure 1: basic scenario for two student groups'''</div>]]
 
The full scenario is made of 7 basic scenarios that include the virtual machines used by two student groups, as well as a central scenario representing the Internet.
 
  
 
== Installation ==
 
== Installation ==

Revision as of 15:10, 6 June 2015

VNX Security laboratory

This scenario has been designed to allow 14 student groups to work together configuring firewalls and using security related tools and Linux security oriented distributions like Kali Linux and Metasploitable.

The full scenario is divided on 7 basic scenarios (Fig. 1) that include the virtual machines used by two student groups. Each student pod is made of a simple corporate network with a DMZ network with a vulnerable server and an internal network with some hosts, as well as an attacker host on Internet with Kali Linux. Additionaly, a server on Internet is included to allow testing connectivity from inside the corporate network to Internet.

Figure 1: basic scenario for two student groups

Installation

  • Download escenario bundle and unpack it:
  • wget idefix.dit.upm.es/vnx/examples/fw/fw-v01.tgz
    vnx --unpack fw-v01.tgz
    
  • Download and create the root filesystems needed:
  • cd fw/filesystems
    # Create LXC rootfs for firewalls and clients
    ./create-rootfs
    # Download Kali rootfs for attackers
    vnx_download_rootfs -l -r vnx_rootfs_kvm_kali-1.1.0-v025.qcow2 -y
    # Download metasploitable for DMZ server
    vnx_download_rootfs -l -r vnx_rootfs_kvm_ubuntu-8.04-metasploitable-v023.qcow2 -y