@MrTiberius:
Hey guys,
I am setting up a virtual security lab environment as part of a senior project at my school using a VMware esxi host (mostly managed via vcenter).
Currently, I have three separate networks I am configuring, a LAN network, a DMZ network, and an external network (this one is outside the firewall and internet facing). The idea is to have students on the external network us Kali Linux VMs to attempt to penetrate the two internal networks (DMZ & LAN).
There would be a second group of students on the inside of the network, monitoring traffic on the firewall as wells as hardening and maintaining the internal servers. The internal networks are made up of a mix of windows and Linux servers.
I was wondering what would potentially be the steps to configure the firewall for this type of environment? Also I have limited experience with pfSense and was wondering if this could also function as a router?
I have also attached a diagram of the lab environment.
Ok, some more feedback.
I have been playing with this on my own lab and came to some conclusions. I haven't tested NAT yet so nothing there yet.
If your networks are composed of just one IP subnet per color then you have a lot less work. The routing will be setup automatically. Automatic outbound NAT rules as well.
The firewall management will be activated on the lan interface so assign interfaces and then only configure the LAN interface's IP address. This will give you access to the webconfigurator (it will show you the ip you can connect to). It will ask you if you want to convert the protocol to http. Don't, https is better for security reasons.
Connect on the webconfigurator and go through the wizard. At this point you will probably need to configure the rest of the interfaces ip addresses. If internet access is indeed on the red side, then the next hop on that path should be your default gateway, configured on the WAN interface (red) and on the same ip subnet.
Routing should now work between the different ip segments connected to the firewall interfaces. But to access services you need to configurre firewall rules.
From what I figured through testing you need to configure floating rules. Make things as specific as possible (use the any option as less as possible).
Monitor the firewall logs (provided you checked the logging option in the rules) to see what is passed and what is dropped. The logs are under status->system logs->firewall
In case you need more complex static routing, check what you currently have in Diagnostics->Routes, and then add more if necessary in system->Routing.
If you can configure the firewalls own internet access correctly, you can check for available packages (addons). These include a lot you may find usufull such as snort, ospf routing, ntopng, etc.
Let me know if you need any specific help.