Difference between revisions of "Vnx-labo-fw"

From VNX
Jump to: navigation, search
Line 11: Line 11:
  
 
<ul>
 
<ul>
<li>Download escenario bundle and unpack it:</li>
+
<li>Download the escenario bundle and unpack it:</li>
 
  wget idefix.dit.upm.es/vnx/examples/fw/fw-v01.tgz
 
  wget idefix.dit.upm.es/vnx/examples/fw/fw-v01.tgz
 
  vnx --unpack fw-v01.tgz
 
  vnx --unpack fw-v01.tgz

Revision as of 14:11, 6 June 2015

VNX Security laboratory

This scenario has been designed to allow 14 student groups to work together configuring firewalls and using security related tools and Linux security oriented distributions like Kali Linux and Metasploitable.

The full scenario is divided on 7 basic scenarios (Fig. 1) that include the virtual machines used by two student groups. Each student pod is made of a simple corporate network with a DMZ network running a vulnerable server and an internal network with some hosts, as well as an attacker host on Internet with Kali Linux. Additionaly, a server on Internet is included to allow testing connectivity from inside the corporate network to Internet.

Figure 1: basic scenario for two student groups

Installation

  • Download the escenario bundle and unpack it:
  • wget idefix.dit.upm.es/vnx/examples/fw/fw-v01.tgz
    vnx --unpack fw-v01.tgz
    
  • Download and create the root filesystems needed:
  • cd fw/filesystems
    # Create LXC rootfs for firewalls and clients
    ./create-rootfs
    # Download Kali rootfs for attackers
    vnx_download_rootfs -l -r vnx_rootfs_kvm_kali-1.1.0-v025.qcow2 -y
    # Download metasploitable for DMZ server
    vnx_download_rootfs -l -r vnx_rootfs_kvm_ubuntu-8.04-metasploitable-v023.qcow2 -y